CN113259105A - Block chain data sharing method and system - Google Patents

Block chain data sharing method and system Download PDF

Info

Publication number
CN113259105A
CN113259105A CN202110694721.7A CN202110694721A CN113259105A CN 113259105 A CN113259105 A CN 113259105A CN 202110694721 A CN202110694721 A CN 202110694721A CN 113259105 A CN113259105 A CN 113259105A
Authority
CN
China
Prior art keywords
node
data sharing
nodes
block chain
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110694721.7A
Other languages
Chinese (zh)
Other versions
CN113259105B (en
Inventor
林晓华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Zhongteng Borun Blockchain Network Technology Co ltd
Original Assignee
Invention House Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Invention House Beijing Technology Co ltd filed Critical Invention House Beijing Technology Co ltd
Priority to CN202110694721.7A priority Critical patent/CN113259105B/en
Publication of CN113259105A publication Critical patent/CN113259105A/en
Application granted granted Critical
Publication of CN113259105B publication Critical patent/CN113259105B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention provides a block chain data sharing method and a block chain data sharing system. The method comprises the following steps: the current block chain node acquires other block chain nodes in a block chain needing data sharing, and determines other block chain nodes in the block chain needing data sharing as data sharing nodes; pre-authorizing a data sharing node which needs to share data with the current block chain node; after the pre-authorization is carried out on the data sharing nodes in the block chain needing data sharing at the current block chain link point, the data access authority of each data sharing node is confirmed in a data access activation mode; for the authorized data sharing nodes, sharing the on-chain data of the current block chain node by a secret key; and after the pre-authorization, adding a new data sharing node to the current block chain node in a node judgment mode. The system comprises modules corresponding to the method steps.

Description

Block chain data sharing method and system
Technical Field
The invention provides a block chain data sharing method and system, and belongs to the technical field of block chains.
Background
Based on the technical background that the blockchain cannot be tampered and the data can be traced, the data is either completely transparent or the encryption is only visible to the user. In the prior art environment, two methods are generally used to authorize the encrypted data of the chain: one is data pre-authorization and one is key authorization.
Pre-authorization, namely, an authorized user who knows the data on the chain to be shared in advance, encrypts the data by using the public key of the authorized user, and decrypts the data by using the public key of the authorized user, so as to realize data sharing, in this method, after data is uplink, the encrypted data can not be modified, namely, the authorization can not be cancelled or the authorized object can not be changed, and for the authorization of a plurality of users, the plaintext data needs to be encrypted once each time, and the uplink data is huge; the encryption key of the authorized user is leaked by using the key authorization, so that in order to avoid one-time key authorization, all data is leaked, different symmetric keys need to be distributed to different data, and the management cost of the symmetric keys is increased.
Disclosure of Invention
The invention provides a block chain data sharing method and a block chain data sharing system, which are used for solving the problems that in the data sharing process of the existing block chain network, pre-authorization cannot be added with data sharing users newly and uplink data are huge due to excessive verification times of secret keys:
the invention provides a block chain data sharing method, which comprises the following steps:
the current block chain node acquires other block chain nodes in a block chain needing data sharing, and determines other block chain nodes in the block chain needing data sharing as data sharing nodes;
pre-authorizing a data sharing node which needs to share data with the current block chain node;
after the pre-authorization is carried out on the data sharing nodes in the block chain needing data sharing at the current block chain link point, the data access authority of each data sharing node is confirmed in a data access activation mode;
for the authorized data sharing nodes, sharing the on-chain data of the current block chain node by a secret key;
and after the pre-authorization, adding a new data sharing node to the current block chain node in a node judgment mode.
Further, after the pre-authorization is performed on the data sharing node in the block chain that needs to perform data sharing at the current block link point, the method for determining the data access authority of each data sharing node in a data access activation manner includes:
the current block chain node sets a private key corresponding to each pre-authorized data sharing node aiming at each pre-authorized data sharing node, and sends the private key to the corresponding data sharing node;
after the current block chain node sends the corresponding private key to each data sharing node, setting different authorization starting time periods and private key updating time periods for each data sharing node; sending the authorized starting time period to a corresponding data sharing node;
after receiving the authorized starting time period, the data sharing node takes the time point of receiving a private key as the starting point of the time period of the authorized starting time period, and utilizes the private key to access the data of the current block link point within the last 3 minutes of the time period of the authorized starting time period;
the current block link point determines a data sharing node which completes data access by using a private key within the last 3 minutes of the time period of the authorized starting time period as an authorized data sharing node, and establishes a shared data chain;
performing pre-authorization failure marking on data sharing nodes with data access failure, and canceling pre-authorization authority of the data sharing nodes with the data access failure, wherein the data sharing nodes with the data access failure comprise data sharing nodes which do not perform data access on the current block link point within a specified time by using a private key, and data sharing nodes which do not perform data access by using a correct secret key due to decryption errors of the private key;
in the process of data sharing between the data sharing node and the current block chain node, the current block chain node updates the private key for the private key updating time period corresponding to each data sharing node and sends the updated private key to the corresponding data sharing node, and the data sharing node shares the data with the current block chain node by using the updated private key until the next private key is updated.
Further, the setting of different authorized starting time periods for each data sharing node includes:
dividing every three data sharing nodes into a group to obtain a plurality of data sharing node groups;
randomly carrying out authorized activation sequence sequencing numbering on a plurality of data sharing node groups, and acquiring a corresponding authorized activation sequence number by each data sharing node;
setting an authorized starting time period for a first group of data sharing groups for authorized activation, and marking the authorized starting time of the first group of data sharing groups for authorized activation as an initial authorized starting time period, wherein the initial authorized starting time period is greater than 16 minutes;
setting an authorized starting time period for each data sharing group in sequence according to the authorized activation sequence number; moreover, the authorized starting time period of each data sharing node group is increased by an extension time period compared with the starting time period of the previous group of data sharing node groups; wherein, the time length of the extended time period is 20% of the initial authorized starting time period (the time length of the extended time period is in seconds, if the extended time period cannot be divided evenly, the time length of the second-level unit is rounded downwards).
Further, after the pre-authorization, the adding, by the current block chain node, a new data sharing node in a node judgment manner includes:
other nodes in the block chain send data sharing requests to the current block chain node;
the current block chain node acquires the establishment time of other nodes in the block chain after receiving the data sharing request, and determines whether the other nodes in the block chain are initial nodes in the block chain network (wherein the initial nodes are the block chain nodes formed when the block chain network is established);
if other nodes in the block chain are initial nodes, acquiring a data sharing record between the initial node and other block chain nodes, and judging whether the initial nodes are safe nodes according to the key verification condition in the data sharing record; when the initial node has the condition that the key verification fails and the data sharing is not completed, judging that the initial node is an unsafe node, otherwise, judging that the initial node is a safe node; when the initial node is a security node, the current block link node increases the security node to be a data sharing node, and sets a corresponding private key, an authorized starting time period and a private key updating time period for the security node;
if the other nodes in the block chain are not the initial nodes, judging whether the other nodes in the block chain are data sharing nodes with failed authorized activation; if other nodes in the block chain are data sharing nodes with failed authorization activation, setting a private key for the data sharing nodes with failed authorization activation, sending the data sharing nodes with failed authorization activation through the private key for authorization activation again, if the authorization activation is successful, taking the data sharing nodes with failed authorization activation as the data sharing nodes, and if the authorization activation is failed, not allowing the data sharing nodes with failed authorization activation to perform data sharing verification and permission;
and if the other nodes in the block chain are neither the initial node nor the data sharing nodes with failed authorized activation, acquiring the node establishment time of the other nodes in the block chain and the data sharing record in the node establishment time, and determining the data sharing rule according to the node establishment time and the data sharing record in the node establishment time.
Further, if other nodes in the block chain are not the initial node, extracting the node establishment time of the other nodes and the data sharing record in the node establishment time, and determining a data sharing rule according to the node establishment time and the data sharing record in the node establishment time, including:
judging whether the time length from the node establishment time of other nodes in the block chain to the time of sending the data sharing request exceeds the preset block link point establishment time length or not;
if the time length from the node establishing time to the time of sending the data sharing request exceeds the preset block chain link point establishing time length, performing security verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged as security nodes through the security verification, allowing the other nodes in the block chain to be added as data sharing nodes of the current node, and performing data sharing according to a first data sharing rule;
if the time length from the node establishing time to the time of sending the data sharing request does not exceed the preset block link point establishing time length, extracting the number of the data sharing block link points with other nodes in the block chain; if the number of the data sharing block chain nodes with other nodes in the block chain exceeds a preset sharing node number threshold, performing security verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged as security nodes through the security verification, allowing the other nodes in the block chain to be added as the data sharing nodes of the current node, and performing data sharing according to a first data sharing rule;
if the number of the chain nodes of the block chain for data sharing with other nodes in the block chain exceeds a preset sharing node number threshold value, extracting data transaction records, intelligent contract records and node identity authentication records of other nodes in the block chain, simultaneously calling data sharing records between other nodes in the block chain and other block chain nodes in a block chain network, and judging whether other nodes in the block chain are safe nodes or not by combining a secret key verification condition in the data sharing records; when verification failure exists in secret key verification between other nodes in the block chain and block chain link points in other block chain networks or data transaction records of the secret key verification, and potential safety hazard information exists in any record of intelligent contract records and node identity authentication records, judging that the other nodes in the block chain are unsafe nodes, otherwise, judging that the other nodes are safe nodes; when other nodes in the block chain are safety nodes, the current block chain node increases the safety nodes as data sharing nodes, and data sharing is carried out according to a second data sharing rule;
wherein the first data sharing rule is: allowing the data sharing node to share all data with the current blockchain node;
the second data sharing rule is as follows: and in fifteen private key updating time periods after other nodes in the block chain become the current block chain node, not allowing other nodes in the block chain to start data sharing requests to other new block chain nodes, carrying out security monitoring on the data sharing process of the other nodes in the block chain in the fifteen private key updating time periods, and if the other nodes in the block chain do not meet the security standard in the data sharing process of the fifteen private key updating time periods, releasing the authorization of the other nodes in the block chain and the data sharing node of the current block chain node.
A blockchain data sharing system, the system comprising:
an obtaining module, configured to obtain, by a current blockchain node, other blockchain nodes in a blockchain that needs to perform data sharing, and determine the other blockchain nodes in the blockchain that needs to perform data sharing as data sharing nodes;
the pre-authorization module is used for pre-authorizing the data sharing node which needs to share data with the current block chain link point;
the right confirming module is used for confirming the right of data access of each data sharing node in a data access activation mode after the data sharing node in the block chain needing data sharing is pre-authorized at the current block chain link point;
the data sharing module is used for sharing the data on the current block chain node by a key aiming at the data sharing node with the determined right;
and the node adding module is used for adding a new data sharing node to the current block chain node in a node judgment mode after the pre-authorization.
Further, the right determining module comprises:
the private key setting module is used for setting a private key corresponding to each pre-authorized data sharing node by the current block chain node aiming at each pre-authorized data sharing node and sending the private key to the corresponding data sharing node;
the time setting module is used for setting different authorization starting time periods and private key updating time periods for each data sharing node after the current blockchain node sends the corresponding private key to each data sharing node; sending the authorized starting time period to a corresponding data sharing node;
the data access module is used for the data sharing node to use the time point of receiving a private key as the starting point of the time period of the authorized starting time period after receiving the authorized starting time period, and to use the private key to perform data access on the current block link point within the last 3 minutes of the time period of the authorized starting time period;
a data chain establishing module, configured to determine, by the current block link node, a data sharing node that completes data access by using a private key within the last 3 minutes of the time period of the authorized starting time period as an authorized data sharing node, and establish a shared data chain;
the cancellation module is used for marking the data sharing nodes with failed data access in a pre-authorization mode and canceling the pre-authorization authority of the data sharing nodes with failed data access, wherein the data sharing nodes with failed data access comprise the data sharing nodes which do not use a private key to perform data access on the current block link point within a specified time and the data sharing nodes which have wrong decryption of the private key and do not use a correct private key to perform data access;
and the updating module is used for updating the private key of the current block chain node aiming at the private key updating time period corresponding to each data sharing node and sending the updated private key to the corresponding data sharing node in the data sharing process of the data sharing node and the current block chain node, and the data sharing node shares the data with the current block chain node by using the updated private key until the next private key is updated.
Further, the time setting module includes:
the grouping module is used for grouping every three data sharing nodes into a group to obtain a plurality of data sharing node groups;
the system comprises a numbering module, a data sharing module and a data processing module, wherein the numbering module is used for randomly carrying out authorized activation sequence sequencing numbering on a plurality of data sharing node groups, and each data sharing node acquires a corresponding authorized activation sequence number;
the starting time setting module is used for setting an authorized starting time period for a first group of data sharing groups for authorized activation and marking the authorized starting time of the first group of data sharing groups for authorized activation as an initial authorized starting time period, wherein the initial authorized starting time period is greater than 16 minutes;
the sequential time period setting module is used for sequentially setting the authorized starting time period for each data sharing group according to the authorized activation sequence number; moreover, the authorized starting time period of each data sharing node group is increased by an extension time period compared with the starting time period of the previous group of data sharing node groups; wherein, the time length of the extended time period is 20% of the initial authorized starting time period (the time length of the extended time period is in seconds, if the extended time period cannot be divided evenly, the time length of the second-level unit is rounded downwards).
Further, the node adding module includes:
a request initiating module, configured to initiate a data sharing request to the current block link point by another node in the block chain;
a first node determining module, configured to obtain, by the current blockchain node, establishment time of other nodes in the blockchain after receiving the data sharing request, and determine whether the other nodes in the blockchain are initial nodes in the blockchain network (where the initial nodes are blockchain nodes formed when the blockchain network is established);
a second node determination module, configured to, if other nodes in the block chain are initial nodes, obtain a data sharing record between the initial node and the other block chain nodes, and determine whether the initial nodes are security nodes according to a key verification condition in the data sharing record; when the initial node has the condition that the key verification fails and the data sharing is not completed, judging that the initial node is an unsafe node, otherwise, judging that the initial node is a safe node; when the initial node is a security node, the current block link node increases the security node to be a data sharing node, and sets a corresponding private key, an authorized starting time period and a private key updating time period for the security node;
a third node judgment module, configured to judge whether other nodes in the block chain are data sharing nodes that are failed in authorized activation if the other nodes in the block chain are not initial nodes; if other nodes in the block chain are data sharing nodes with failed authorization activation, setting a private key for the data sharing nodes with failed authorization activation, sending the data sharing nodes with failed authorization activation through the private key for authorization activation again, if the authorization activation is successful, taking the data sharing nodes with failed authorization activation as the data sharing nodes, and if the authorization activation is failed, not allowing the data sharing nodes with failed authorization activation to perform data sharing verification and permission;
and a fourth node determination module, configured to, if the other node in the block chain is neither the initial node nor the data sharing node for which the authorization activation fails, obtain the node establishment time of the other node in the block chain and the data sharing record in the node establishment time, and determine the data sharing rule according to the node establishment time and the data sharing record in the node establishment time.
Further, the node determination module four includes:
the time judging module is used for judging whether the time length from the node establishing time of other nodes in the block chain to the time of sending the data sharing request exceeds the preset block link point establishing time length or not;
the first safety judgment module is used for carrying out safety verification on other nodes in the block chain according to an initial node mode if the time length from the node establishment time to the time of sending the data sharing request exceeds the preset block chain link point establishment time length, and if the other nodes in the block chain are judged as safety nodes through the safety verification, the other nodes in the block chain are allowed to be added as data sharing nodes of the current node, and data sharing is carried out according to a first data sharing rule;
the safety judgment module II is used for extracting the number of the block link points sharing data with other nodes in the block chain if the time length from the node establishment time to the time of sending the data sharing request does not exceed the preset block link point establishment time length; if the number of the data sharing block chain nodes with other nodes in the block chain exceeds a preset sharing node number threshold, performing security verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged as security nodes through the security verification, allowing the other nodes in the block chain to be added as the data sharing nodes of the current node, and performing data sharing according to a first data sharing rule;
the safety judgment module III is used for extracting data transaction records, intelligent contract records and node identity authentication records of other nodes in the block chain if the number of the data sharing block chain link points with other nodes in the block chain exceeds a preset sharing node number threshold value, simultaneously calling data sharing records between other nodes in the block chain and other block chain nodes in a block chain network, and judging whether the other nodes in the block chain are safety nodes or not by combining a secret key verification condition in the data sharing records; when verification failure exists in secret key verification between other nodes in the block chain and block chain link points in other block chain networks or data transaction records of the secret key verification, and potential safety hazard information exists in any record of intelligent contract records and node identity authentication records, judging that the other nodes in the block chain are unsafe nodes, otherwise, judging that the other nodes are safe nodes; when other nodes in the block chain are safety nodes, the current block chain node increases the safety nodes as data sharing nodes, and data sharing is carried out according to a second data sharing rule;
wherein the first data sharing rule is: allowing the data sharing node to share all data with the current blockchain node;
the second data sharing rule is as follows: and in fifteen private key updating time periods after other nodes in the block chain become the current block chain node, not allowing other nodes in the block chain to start data sharing requests to other new block chain nodes, carrying out security monitoring on the data sharing process of the other nodes in the block chain in the fifteen private key updating time periods, and if the other nodes in the block chain do not meet the security standard in the data sharing process of the fifteen private key updating time periods, releasing the authorization of the other nodes in the block chain and the data sharing node of the current block chain node.
The invention has the beneficial effects that:
the block chain data sharing method and system provided by the invention allow the increase of data sharing users under the condition of pre-authorizing the data sharing users through the judgment and verification aiming at the data sharing block chain nodes; meanwhile, the data sharing node is authorized and activated in a mode of verifying through the secret key, primary verification and activation can be carried out on the data sharing node, and safety verification of the data sharing node is improved; meanwhile, data encryption is carried out without carrying out data sharing at the data sharing node every time in a key replacing mode, and only unified key setting and key updating are carried out on all block chain data, and accumulation of uplink data is reduced in a mode of clearing the updated key.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
fig. 2 is a system block diagram of the system of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
As shown in fig. 1, the method for sharing block chain data according to the present invention includes:
s1, acquiring other block chain nodes in the block chain needing data sharing by the current block chain node, and determining the other block chain nodes in the block chain needing data sharing as data sharing nodes;
s2, pre-authorizing the data sharing node which needs to share data with the current block chain link point;
s3, after pre-authorizing the data sharing nodes in the block chain needing data sharing at the current block chain link point, determining the data access authority of each data sharing node in a data access activation mode;
s4, aiming at the data sharing node with the determined right, sharing the on-chain data of the current block chain node through a secret key;
and S5, after the pre-authorization, adding a new data sharing node to the current block chain node by a node judgment mode.
The working principle of the technical scheme is as follows: firstly, acquiring other block chain nodes in a block chain needing data sharing by using a current block chain node, and determining the other block chain nodes in the block chain needing data sharing as data sharing nodes; then, pre-authorizing a data sharing node which needs to share data with the current block chain link point; then, after the pre-authorization is carried out on the data sharing nodes in the block chain needing data sharing at the current block chain link point, the data access authority of each data sharing node is confirmed in a data access activation mode; then, aiming at the data sharing node with the determined right, sharing the on-chain data of the current block chain node through a secret key; and finally, after the pre-authorization, adding a new data sharing node to the current block chain node in a node judgment mode.
The effect of the above technical scheme is as follows: by judging and verifying the data sharing block chain node, the data sharing users are allowed to be increased under the condition of pre-authorizing the data sharing users; meanwhile, the data sharing node is authorized and activated in a mode of verifying through the secret key, primary verification and activation can be carried out on the data sharing node, and safety verification of the data sharing node is improved; meanwhile, data encryption is carried out without carrying out data sharing at the data sharing node every time in a key replacing mode, and only unified key setting and key updating are carried out on all block chain data, and accumulation of uplink data is reduced in a mode of clearing the updated key.
In an embodiment of the present invention, after the pre-authorization is performed on the data sharing node in the block chain that needs to perform data sharing at the current block chain link point, the method for determining the data access right of each data sharing node in a data access activation manner includes:
s301, the current block chain node sets a private key corresponding to each pre-authorized data sharing node for each pre-authorized data sharing node, and sends the private key to the corresponding data sharing node;
s302, after the current blockchain node sends the corresponding private key to each data sharing node, setting different authorization starting time periods and private key updating time periods for each data sharing node; sending the authorized starting time period to a corresponding data sharing node;
s303, after receiving the authorized starting time period, the data sharing node takes the time point of receiving a private key as the starting point of the time period of the authorized starting time period, and performs data access on the current block link point by using the private key within the last 3 minutes of the time period of the authorized starting time period;
s304, the current block chain node determines a data sharing node which completes data access by using a private key within the last 3 minutes of the time period of the authorized starting time period as an authorized data sharing node, and establishes a shared data chain;
s305, performing pre-authorization failure marking on data sharing nodes with data access failure, and canceling pre-authorization authority of the data sharing nodes with the data access failure, wherein the data sharing nodes with the data access failure comprise data sharing nodes which do not perform data access on the current block link point within a specified time by using a private key, and data sharing nodes which do not perform data access by using a correct private key due to a private key decryption error;
s306, in the process of data sharing between the data sharing node and the current block chain node, the current block chain node updates the private key according to the private key updating time period corresponding to each data sharing node, and sends the updated private key to the corresponding data sharing node, and the data sharing node shares the data with the current block chain node by using the updated private key until the next private key is updated.
The working principle of the technical scheme is as follows: firstly, the current block chain node sets a private key corresponding to each pre-authorized data sharing node aiming at each pre-authorized data sharing node, and sends the private key to the corresponding data sharing node; then, after the current blockchain node sends the corresponding private key to each data sharing node, setting different authorization starting time periods and private key updating time periods for each data sharing node; sending the authorized starting time period to a corresponding data sharing node; then, after receiving the authorized starting time period, the data sharing node takes the time point of receiving the private key as the starting point of the time period of the authorized starting time period, and utilizes the private key to access the data of the current block link point within the last 3 minutes of the time period of the authorized starting time period; then, the current block link point determines a data sharing node which completes data access by using a private key within the last 3 minutes of the time period of the authorized starting time period as an authorized data sharing node, and establishes a shared data chain; then, making a pre-authorization failure mark for the data sharing node with the data access failure, and canceling the pre-authorization authority of the data sharing node with the data access failure, wherein the data sharing node with the data access failure comprises the data sharing node without performing data access on the current block link point by using a private key within a specified time, and the data sharing node without performing data access by using a correct private key due to a private key decryption error; and finally, in the process of data sharing between the data sharing node and the current block chain node, the current block chain node updates the private key according to the private key updating time period corresponding to each data sharing node and sends the updated private key to the corresponding data sharing node, and the data sharing node shares the data with the current block chain node by using the updated private key until the next private key is updated.
The effect of the above technical scheme is as follows: by the method, the right of the data access authority is confirmed, the verification strength of the data sharing node can be effectively improved, and the safety performance of data sharing is improved. Meanwhile, the data sharing nodes which are not matched with the current block link point-to-point rule can be effectively and accurately removed through the method, and the block link points fulfilling the data sharing activation rule are reserved, so that the subsequent data sharing efficiency is effectively improved. Meanwhile, sufficient time can be provided for the setting of the authorized starting time and the setting of the private key updating time of the current block chain before the authorized starting by performing authorized activation within the last 3 minutes of the time period of the authorized starting time period, so that the problem that the data processing amount is increased due to the fact that the time when the subsequent first group of data sharing nodes start performing authorized activation is overlapped with the time when the authorized starting time periods of other groups are set is solved.
In an embodiment of the present invention, the setting of different authorized start time periods for each data sharing node includes:
s3021, dividing every three data sharing nodes into a group, and obtaining a plurality of data sharing node groups;
s3022, randomly performing authorized activation sequence sequencing numbering on a plurality of data sharing node groups, and acquiring a corresponding authorized activation sequence number by each data sharing node;
s3023, setting an authorized starting time period for the first group of authorized activated data sharing groups, and marking the authorized starting time of the first group of authorized activated data sharing groups as an initial authorized starting time period, wherein the initial authorized starting time period is greater than 16 minutes;
s3024, sequentially setting an authorized starting time period for each data sharing group according to the authorized activation sequence number; moreover, the authorized starting time period of each data sharing node group is increased by an extension time period compared with the starting time period of the previous group of data sharing node groups; wherein, the time length of the extended time period is 20% of the initial authorized starting time period (the time length of the extended time period is in seconds, if the extended time period cannot be divided evenly, the time length of the second-level unit is rounded downwards).
The working principle of the technical scheme is as follows: firstly, dividing every three data sharing nodes into a group to obtain a plurality of data sharing node groups; then, randomly carrying out authorization activation sequence sequencing numbering on a plurality of data sharing node groups, and obtaining a corresponding authorization activation sequence number by each data sharing node; then, setting an authorized starting time period for the first group of data sharing groups for authorized activation, and marking the authorized starting time of the first group of data sharing groups for authorized activation as an initial authorized starting time period, wherein the initial authorized starting time period is greater than 16 minutes; finally, sequentially setting an authorized starting time period for each data sharing group according to the authorized activation sequence number; moreover, the authorized starting time period of each data sharing node group is increased by an extension time period compared with the starting time period of the previous group of data sharing node groups; wherein, the time length of the extended time period is 20% of the initial authorized starting time period (the time length of the extended time period is in seconds, if the extended time period cannot be divided evenly, the time length of the second-level unit is rounded downwards).
The effect of the above technical scheme is as follows: the authorization starting time period set by the method can be combined with the authorization starting rule to provide sufficient authorization starting time, meanwhile, under the condition that the number of data sharing nodes is large, the authorization starting time set by the method can enable each batch of data sharing nodes to be authorized and started in time-staggered time periods, the authorization activation processing amount in the same time period is effectively reduced, the authorization activation processing efficiency and the processing speed are improved, each group of data sharing nodes are enabled to be sequentially authorized and activated, and the problems that the data processing efficiency is reduced and the block chain data processing burden is too heavy due to the fact that authorization activation actions are accumulated in the same time period are prevented.
In an embodiment of the present invention, after the pre-authorization, the adding, by the current blockchain node, a new data sharing node in a node judgment manner includes:
s501, other nodes in the block chain start a data sharing request to the current block chain node;
s502, the current blockchain node obtains the establishment time of other nodes in the blockchain after receiving the data sharing request, and determines whether the other nodes in the blockchain are initial nodes in the blockchain network (where the initial nodes are blockchain nodes formed when the blockchain network is established);
s503, if other nodes in the block chain are initial nodes, acquiring data sharing records between the initial nodes and other block chain nodes, and judging whether the initial nodes are safe nodes according to key verification conditions in the data sharing records; when the initial node has the condition that the key verification fails and the data sharing is not completed, judging that the initial node is an unsafe node, otherwise, judging that the initial node is a safe node; when the initial node is a security node, the current block link node increases the security node to be a data sharing node, and sets a corresponding private key, an authorized starting time period and a private key updating time period for the security node;
s504, if the other nodes in the block chain are not the initial nodes, judging whether the other nodes in the block chain are data sharing nodes with failed authorized activation; if other nodes in the block chain are data sharing nodes with failed authorization activation, setting a private key for the data sharing nodes with failed authorization activation, sending the data sharing nodes with failed authorization activation through the private key for authorization activation again, if the authorization activation is successful, taking the data sharing nodes with failed authorization activation as the data sharing nodes, and if the authorization activation is failed, not allowing the data sharing nodes with failed authorization activation to perform data sharing verification and permission;
and S505, if the other nodes in the block chain are neither the initial node nor the data sharing node with failed authorized activation, acquiring the node establishment time of the other nodes in the block chain and the data sharing record in the node establishment time, and determining the data sharing rule according to the node establishment time and the data sharing record in the node establishment time.
The working principle of the technical scheme is as follows: firstly, other nodes in the block chain start a data sharing request to the current block chain node; then, the current blockchain node acquires the establishment time of other nodes in the blockchain after receiving the data sharing request, and determines whether the other nodes in the blockchain are initial nodes in the blockchain network (wherein the initial nodes are blockchain nodes formed when the blockchain network is established); if other nodes in the block chain are initial nodes, acquiring a data sharing record between the initial node and other block chain nodes, and judging whether the initial nodes are safe nodes according to the key verification condition in the data sharing record; when the initial node has the condition that the key verification fails and the data sharing is not completed, judging that the initial node is an unsafe node, otherwise, judging that the initial node is a safe node; when the initial node is a security node, the current block link node increases the security node to be a data sharing node, and sets a corresponding private key, an authorized starting time period and a private key updating time period for the security node; if the other nodes in the block chain are not the initial nodes, judging whether the other nodes in the block chain are data sharing nodes with failed authorized activation; if other nodes in the block chain are data sharing nodes with failed authorization activation, setting a private key for the data sharing nodes with failed authorization activation, sending the data sharing nodes with failed authorization activation through the private key for authorization activation again, if the authorization activation is successful, taking the data sharing nodes with failed authorization activation as the data sharing nodes, and if the authorization activation is failed, not allowing the data sharing nodes with failed authorization activation to perform data sharing verification and permission; and if the other nodes in the block chain are neither the initial node nor the data sharing nodes with failed authorized activation, acquiring the node establishment time of the other nodes in the block chain and the data sharing record in the node establishment time, and determining the data sharing rule according to the node establishment time and the data sharing record in the node establishment time.
The effect of the above technical scheme is as follows: through the mode, the security screening of the data sharing nodes to be newly added can be effectively improved through the mode of judging the node types of the data sharing nodes to be newly added, meanwhile, different types of verification are carried out through the nodes of different types, the node verification efficiency can be effectively improved aiming at the nodes of different types, the problems that the verification efficiency is reduced and the verification time is too long due to the fact that the verification process is complex due to the fact that the unified and consistent verification mode is adopted aiming at the nodes of different types are prevented from happening.
In an embodiment of the present invention, if other nodes in the block chain are not the initial nodes, extracting the node establishment time of the other nodes and the data sharing record in the node establishment time, and determining the data sharing rule according to the node establishment time and the data sharing record in the node establishment time includes:
s5051, judging whether the time length from the node establishment time of other nodes in the block chain to the time of sending the data sharing request exceeds the preset block link point establishment time length or not;
s5052, if the time length from the node establishing time to the data sharing request sending time exceeds the preset block link point establishing time length, performing security verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged to be security nodes through the security verification, allowing the other nodes in the block chain to be added as data sharing nodes of the current node, and performing data sharing according to a first data sharing rule;
s5053, if the time length from the node establishing time to the data sharing request sending time does not exceed the preset block link point establishing time length, extracting the number of the data sharing block link points with other nodes in the block chain; if the number of the data sharing block chain nodes with other nodes in the block chain exceeds a preset sharing node number threshold, performing security verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged as security nodes through the security verification, allowing the other nodes in the block chain to be added as the data sharing nodes of the current node, and performing data sharing according to a first data sharing rule;
s5054, if the number of the chain nodes of the block chain sharing data with other nodes in the block chain exceeds a preset sharing node number threshold value, extracting data transaction records, intelligent contract records and node identity authentication records of other nodes in the block chain, simultaneously calling data sharing records between other nodes in the block chain and other block chain nodes in a block chain network, and judging whether other nodes in the block chain are safe nodes or not by combining a secret key verification condition in the data sharing records; when verification failure exists in secret key verification between other nodes in the block chain and block chain link points in other block chain networks or data transaction records of the secret key verification, and potential safety hazard information exists in any record of intelligent contract records and node identity authentication records, judging that the other nodes in the block chain are unsafe nodes, otherwise, judging that the other nodes are safe nodes; when other nodes in the block chain are safety nodes, the current block chain node increases the safety nodes as data sharing nodes, and data sharing is carried out according to a second data sharing rule;
wherein the first data sharing rule is: allowing the data sharing node to share all data with the current blockchain node;
the second data sharing rule is as follows: and in fifteen private key updating time periods after other nodes in the block chain become the current block chain node, not allowing other nodes in the block chain to start data sharing requests to other new block chain nodes, carrying out security monitoring on the data sharing process of the other nodes in the block chain in the fifteen private key updating time periods, and if the other nodes in the block chain do not meet the security standard in the data sharing process of the fifteen private key updating time periods, releasing the authorization of the other nodes in the block chain and the data sharing node of the current block chain node.
The working principle of the technical scheme is as follows: firstly, judging whether the time length from the node establishment time of other nodes in the block chain to the time of sending the data sharing request exceeds the preset block link point establishment time length or not; if the time length from the node establishing time to the time of sending the data sharing request exceeds the preset block chain link point establishing time length, performing security verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged as security nodes through the security verification, allowing the other nodes in the block chain to be added as data sharing nodes of the current node, and performing data sharing according to a first data sharing rule; if the time length from the node establishing time to the time of sending the data sharing request does not exceed the preset block link point establishing time length, extracting the number of the data sharing block link points with other nodes in the block chain; if the number of the data sharing block chain nodes with other nodes in the block chain exceeds a preset sharing node number threshold, performing security verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged as security nodes through the security verification, allowing the other nodes in the block chain to be added as the data sharing nodes of the current node, and performing data sharing according to a first data sharing rule; if the number of the chain nodes of the block chain for data sharing with other nodes in the block chain exceeds a preset sharing node number threshold value, extracting data transaction records, intelligent contract records and node identity authentication records of other nodes in the block chain, simultaneously calling data sharing records between other nodes in the block chain and other block chain nodes in a block chain network, and judging whether other nodes in the block chain are safe nodes or not by combining a secret key verification condition in the data sharing records; when verification failure exists in secret key verification between other nodes in the block chain and block chain link points in other block chain networks or data transaction records of the secret key verification, and potential safety hazard information exists in any record of intelligent contract records and node identity authentication records, judging that the other nodes in the block chain are unsafe nodes, otherwise, judging that the other nodes are safe nodes; when other nodes in the block chain are safety nodes, the current block chain node increases the safety nodes as data sharing nodes, and data sharing is carried out according to a second data sharing rule;
the effect of the above technical scheme is as follows: through the mode, the security screening of the data sharing nodes to be newly added can be effectively improved through the mode of judging the node types of the data sharing nodes to be newly added, meanwhile, different types of verification are carried out through the nodes of different types, the node verification efficiency can be effectively improved aiming at the nodes of different types, the problems that the verification efficiency is reduced and the verification time is too long due to the fact that the verification process is complex due to the fact that the unified and consistent verification mode is adopted aiming at the nodes of different types are prevented from happening. On the other hand, different data sharing rules are combined through different node types, so that the data sharing safety can be effectively improved, and the data sharing safety monitoring strength of the newly added data sharing nodes is improved.
An embodiment of the present invention provides a block chain data sharing system, as shown in fig. 2, the system includes:
an obtaining module, configured to obtain, by a current blockchain node, other blockchain nodes in a blockchain that needs to perform data sharing, and determine the other blockchain nodes in the blockchain that needs to perform data sharing as data sharing nodes;
the pre-authorization module is used for pre-authorizing the data sharing node which needs to share data with the current block chain link point;
the right confirming module is used for confirming the right of data access of each data sharing node in a data access activation mode after the data sharing node in the block chain needing data sharing is pre-authorized at the current block chain link point;
the data sharing module is used for sharing the data on the current block chain node by a key aiming at the data sharing node with the determined right;
and the node adding module is used for adding a new data sharing node to the current block chain node in a node judgment mode after the pre-authorization.
The working principle of the technical scheme is as follows: firstly, acquiring other block chain nodes in a block chain needing data sharing through a current block chain node of an acquisition module, and determining the other block chain nodes in the block chain needing data sharing as data sharing nodes; then, pre-authorizing a data sharing node which needs to share data with the current block chain link point by using a pre-authorization module; then, after pre-authorizing the data sharing nodes in the block chain needing data sharing at the current block chain link point through a right confirming module, confirming the right of the data access right of each data sharing node in a data access activation mode; then, a data sharing module is used for sharing the on-chain data of the current block chain node by a key aiming at the data sharing node with the determined right; and finally, after the node adding module is adopted for pre-authorization, adding a new data sharing node to the current block link node in a node judgment mode.
The effect of the above technical scheme is as follows: by judging and verifying the data sharing block chain node, the data sharing users are allowed to be increased under the condition of pre-authorizing the data sharing users; meanwhile, the data sharing node is authorized and activated in a mode of verifying through the secret key, primary verification and activation can be carried out on the data sharing node, and safety verification of the data sharing node is improved; meanwhile, data encryption is carried out without carrying out data sharing at the data sharing node every time in a key replacing mode, and only unified key setting and key updating are carried out on all block chain data, and accumulation of uplink data is reduced in a mode of clearing the updated key.
In an embodiment of the present invention, the right determining module includes:
the private key setting module is used for setting a private key corresponding to each pre-authorized data sharing node by the current block chain node aiming at each pre-authorized data sharing node and sending the private key to the corresponding data sharing node;
the time setting module is used for setting different authorization starting time periods and private key updating time periods for each data sharing node after the current blockchain node sends the corresponding private key to each data sharing node; sending the authorized starting time period to a corresponding data sharing node;
the data access module is used for the data sharing node to use the time point of receiving a private key as the starting point of the time period of the authorized starting time period after receiving the authorized starting time period, and to use the private key to perform data access on the current block link point within the last 3 minutes of the time period of the authorized starting time period;
a data chain establishing module, configured to determine, by the current block link node, a data sharing node that completes data access by using a private key within the last 3 minutes of the time period of the authorized starting time period as an authorized data sharing node, and establish a shared data chain;
the cancellation module is used for marking the data sharing nodes with failed data access in a pre-authorization mode and canceling the pre-authorization authority of the data sharing nodes with failed data access, wherein the data sharing nodes with failed data access comprise the data sharing nodes which do not use a private key to perform data access on the current block link point within a specified time and the data sharing nodes which have wrong decryption of the private key and do not use a correct private key to perform data access;
and the updating module is used for updating the private key of the current block chain node aiming at the private key updating time period corresponding to each data sharing node and sending the updated private key to the corresponding data sharing node in the data sharing process of the data sharing node and the current block chain node, and the data sharing node shares the data with the current block chain node by using the updated private key until the next private key is updated.
The working principle of the technical scheme is as follows: firstly, a private key setting module controls the current block chain node to set a private key corresponding to each pre-authorized data sharing node aiming at each pre-authorized data sharing node, and sends the private key to the corresponding data sharing node; then, a time setting module is used for controlling the current block chain node to set different authorization starting time periods and private key updating time periods for each data sharing node after the corresponding private key is sent to each data sharing node; sending the authorized starting time period to a corresponding data sharing node; then, a data access module is adopted to perform data access on the current block chain link point by using the private key within the last 3 minutes of the time period of the authorized starting time period by taking the time point of receiving the private key as the starting point of the time period of the authorized starting time period after the data sharing node receives the authorized starting time period; then, a data chain establishing module is adopted to control the current block chain link point to determine a data sharing node which completes data access by using a private key within the last 3 minutes of the time period of the authorized starting time period as an authorized data sharing node, and a shared data chain is established; then, a cancellation module is used for carrying out pre-authorization failure marking on the data sharing nodes with data access failure and canceling pre-authorization authority of the data sharing nodes with data access failure, wherein the data sharing nodes with data access failure comprise the data sharing nodes which do not carry out data access on the current block link point by using a private key within a specified time and the data sharing nodes which have wrong private key decryption and do not carry out data access by using a correct private key; and finally, in the process of data sharing between the data sharing node and the current block chain node through an updating module, the current block chain node updates the private key according to the private key updating time period corresponding to each data sharing node and sends the updated private key to the corresponding data sharing node, and the data sharing node shares the data with the current block chain node by using the updated private key until the next private key is updated.
The effect of the above technical scheme is as follows: by the method, the right of the data access authority is confirmed, the verification strength of the data sharing node can be effectively improved, and the safety performance of data sharing is improved. Meanwhile, the data sharing nodes which are not matched with the current block link point-to-point rule can be effectively and accurately removed through the method, and the block link points fulfilling the data sharing activation rule are reserved, so that the subsequent data sharing efficiency is effectively improved. Meanwhile, sufficient time can be provided for the setting of the authorized starting time and the setting of the private key updating time of the current block chain before the authorized starting by performing authorized activation within the last 3 minutes of the time period of the authorized starting time period, so that the problem that the data processing amount is increased due to the fact that the time when the subsequent first group of data sharing nodes start performing authorized activation is overlapped with the time when the authorized starting time periods of other groups are set is solved.
In one embodiment of the present invention, the time setting module includes:
the grouping module is used for grouping every three data sharing nodes into a group to obtain a plurality of data sharing node groups;
the system comprises a numbering module, a data sharing module and a data processing module, wherein the numbering module is used for randomly carrying out authorized activation sequence sequencing numbering on a plurality of data sharing node groups, and each data sharing node acquires a corresponding authorized activation sequence number;
the starting time setting module is used for setting an authorized starting time period for a first group of data sharing groups for authorized activation and marking the authorized starting time of the first group of data sharing groups for authorized activation as an initial authorized starting time period, wherein the initial authorized starting time period is greater than 16 minutes;
the sequential time period setting module is used for sequentially setting the authorized starting time period for each data sharing group according to the authorized activation sequence number; moreover, the authorized starting time period of each data sharing node group is increased by an extension time period compared with the starting time period of the previous group of data sharing node groups; wherein, the time length of the extended time period is 20% of the initial authorized starting time period (the time length of the extended time period is in seconds, if the extended time period cannot be divided evenly, the time length of the second-level unit is rounded downwards).
The working principle of the technical scheme is as follows: firstly, dividing every three data sharing nodes into a group through a grouping module to obtain a plurality of data sharing node groups; then, a numbering module is adopted to randomly carry out authorization activation sequence sequencing numbering on a plurality of data sharing node groups, and each data sharing node obtains a corresponding authorization activation sequence number; then, a starting time setting module is used for setting an authorized starting time period for the first group of data sharing groups for authorized activation, and marking the authorized starting time of the first group of data sharing groups for authorized activation as an initial authorized starting time period, wherein the initial authorized starting time period is greater than 16 minutes; finally, the authorized starting time period setting is carried out on each data sharing group in sequence according to the authorized activation sequence number through a sequential time period setting module; moreover, the authorized starting time period of each data sharing node group is increased by an extension time period compared with the starting time period of the previous group of data sharing node groups; wherein, the time length of the extended time period is 20% of the initial authorized starting time period (the time length of the extended time period is in seconds, if the extended time period cannot be divided evenly, the time length of the second-level unit is rounded downwards).
The effect of the above technical scheme is as follows: the authorization starting time period set by the method can be combined with the authorization starting rule to provide sufficient authorization starting time, meanwhile, under the condition that the number of data sharing nodes is large, the authorization starting time set by the method can enable each batch of data sharing nodes to be authorized and started in time-staggered time periods, the authorization activation processing amount in the same time period is effectively reduced, the authorization activation processing efficiency and the processing speed are improved, each group of data sharing nodes are enabled to be sequentially authorized and activated, and the problems that the data processing efficiency is reduced and the block chain data processing burden is too heavy due to the fact that authorization activation actions are accumulated in the same time period are prevented.
In an embodiment of the present invention, the node adding module includes:
a request initiating module, configured to initiate a data sharing request to the current block link point by another node in the block chain;
a first node determining module, configured to obtain, by the current blockchain node, establishment time of other nodes in the blockchain after receiving the data sharing request, and determine whether the other nodes in the blockchain are initial nodes in the blockchain network (where the initial nodes are blockchain nodes formed when the blockchain network is established);
a second node determination module, configured to, if other nodes in the block chain are initial nodes, obtain a data sharing record between the initial node and the other block chain nodes, and determine whether the initial nodes are security nodes according to a key verification condition in the data sharing record; when the initial node has the condition that the key verification fails and the data sharing is not completed, judging that the initial node is an unsafe node, otherwise, judging that the initial node is a safe node; when the initial node is a security node, the current block link node increases the security node to be a data sharing node, and sets a corresponding private key, an authorized starting time period and a private key updating time period for the security node;
a third node judgment module, configured to judge whether other nodes in the block chain are data sharing nodes that are failed in authorized activation if the other nodes in the block chain are not initial nodes; if other nodes in the block chain are data sharing nodes with failed authorization activation, setting a private key for the data sharing nodes with failed authorization activation, sending the data sharing nodes with failed authorization activation through the private key for authorization activation again, if the authorization activation is successful, taking the data sharing nodes with failed authorization activation as the data sharing nodes, and if the authorization activation is failed, not allowing the data sharing nodes with failed authorization activation to perform data sharing verification and permission;
and a fourth node determination module, configured to, if the other node in the block chain is neither the initial node nor the data sharing node for which the authorization activation fails, obtain the node establishment time of the other node in the block chain and the data sharing record in the node establishment time, and determine the data sharing rule according to the node establishment time and the data sharing record in the node establishment time.
The working principle of the technical scheme is as follows: firstly, a request initiating module is used for controlling other nodes in the block chain to initiate a data sharing request to the current block chain node; then, controlling the current blockchain node to acquire the establishment time of other nodes in the blockchain after receiving the data sharing request through a first node judgment module, and determining whether the other nodes in the blockchain are initial nodes in the blockchain network (wherein the initial nodes are blockchain nodes formed when the blockchain network is established); if other nodes in the block chain are initial nodes, acquiring a data sharing record between the initial nodes and other block chain nodes by using a node judgment module II, and judging whether the initial nodes are safe nodes according to the key verification condition in the data sharing record; when the initial node has the condition that the key verification fails and the data sharing is not completed, judging that the initial node is an unsafe node, otherwise, judging that the initial node is a safe node; when the initial node is a security node, the current block link node increases the security node to be a data sharing node, and sets a corresponding private key, an authorized starting time period and a private key updating time period for the security node; if the other nodes in the block chain are not the initial nodes, judging whether the other nodes in the block chain are data sharing nodes with failed authorized activation by using a node judgment module III; if other nodes in the block chain are data sharing nodes with failed authorization activation, setting a private key for the data sharing nodes with failed authorization activation, sending the data sharing nodes with failed authorization activation through the private key for authorization activation again, if the authorization activation is successful, taking the data sharing nodes with failed authorization activation as the data sharing nodes, and if the authorization activation is failed, not allowing the data sharing nodes with failed authorization activation to perform data sharing verification and permission; if the other nodes in the block chain are neither the initial node nor the data sharing node with failed authorized activation, the node judgment module IV is used for acquiring the node establishment time of the other nodes in the block chain and the data sharing record in the node establishment time, and determining the data sharing rule according to the node establishment time and the data sharing record in the node establishment time.
The effect of the above technical scheme is as follows: through the mode, the security screening of the data sharing nodes to be newly added can be effectively improved through the mode of judging the node types of the data sharing nodes to be newly added, meanwhile, different types of verification are carried out through the nodes of different types, the node verification efficiency can be effectively improved aiming at the nodes of different types, the problems that the verification efficiency is reduced and the verification time is too long due to the fact that the verification process is complex due to the fact that the unified and consistent verification mode is adopted aiming at the nodes of different types are prevented from happening.
In an embodiment of the present invention, the node determining module four includes:
the time judging module is used for judging whether the time length from the node establishing time of other nodes in the block chain to the time of sending the data sharing request exceeds the preset block link point establishing time length or not;
the first safety judgment module is used for carrying out safety verification on other nodes in the block chain according to an initial node mode if the time length from the node establishment time to the time of sending the data sharing request exceeds the preset block chain link point establishment time length, and if the other nodes in the block chain are judged as safety nodes through the safety verification, the other nodes in the block chain are allowed to be added as data sharing nodes of the current node, and data sharing is carried out according to a first data sharing rule;
the safety judgment module II is used for extracting the number of the block link points sharing data with other nodes in the block chain if the time length from the node establishment time to the time of sending the data sharing request does not exceed the preset block link point establishment time length; if the number of the data sharing block chain nodes with other nodes in the block chain exceeds a preset sharing node number threshold, performing security verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged as security nodes through the security verification, allowing the other nodes in the block chain to be added as the data sharing nodes of the current node, and performing data sharing according to a first data sharing rule;
the safety judgment module III is used for extracting data transaction records, intelligent contract records and node identity authentication records of other nodes in the block chain if the number of the data sharing block chain link points with other nodes in the block chain exceeds a preset sharing node number threshold value, simultaneously calling data sharing records between other nodes in the block chain and other block chain nodes in a block chain network, and judging whether the other nodes in the block chain are safety nodes or not by combining a secret key verification condition in the data sharing records; when verification failure exists in secret key verification between other nodes in the block chain and block chain link points in other block chain networks or data transaction records of the secret key verification, and potential safety hazard information exists in any record of intelligent contract records and node identity authentication records, judging that the other nodes in the block chain are unsafe nodes, otherwise, judging that the other nodes are safe nodes; when other nodes in the block chain are safety nodes, the current block chain node increases the safety nodes as data sharing nodes, and data sharing is carried out according to a second data sharing rule;
wherein the first data sharing rule is: allowing the data sharing node to share all data with the current blockchain node;
the second data sharing rule is as follows: and in fifteen private key updating time periods after other nodes in the block chain become the current block chain node, not allowing other nodes in the block chain to start data sharing requests to other new block chain nodes, carrying out security monitoring on the data sharing process of the other nodes in the block chain in the fifteen private key updating time periods, and if the other nodes in the block chain do not meet the security standard in the data sharing process of the fifteen private key updating time periods, releasing the authorization of the other nodes in the block chain and the data sharing node of the current block chain node.
The working principle of the technical scheme is as follows: firstly, a time judgment module is used for judging whether the time length from the node establishment time of other nodes in the block chain to the time of sending the data sharing request exceeds the preset block link point establishment time length or not; then, if the time length from the node establishment time to the time of sending the data sharing request exceeds the preset block link point establishment time length, utilizing a first safety judgment module to perform safety verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged as safety nodes through the safety verification, allowing the other nodes in the block chain to be added as data sharing nodes of the current node, and performing data sharing according to a first data sharing rule; if the time length from the node establishing time to the time of sending the data sharing request does not exceed the preset block link point establishing time length, extracting the number of the data sharing block link points with other nodes in the block chain by using a second safety judgment module; if the number of the data sharing block chain nodes with other nodes in the block chain exceeds a preset sharing node number threshold, performing security verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged as security nodes through the security verification, allowing the other nodes in the block chain to be added as the data sharing nodes of the current node, and performing data sharing according to a first data sharing rule; if the number of the chain nodes of the block which share data with other nodes in the block chain exceeds a preset threshold value of the number of the sharing nodes, extracting data transaction records, intelligent contract records and node identity authentication records of other nodes in the block chain by using a third safety judgment module, calling data sharing records between other nodes in the block chain and other block chain nodes in a block chain network, and judging whether other nodes in the block chain are safety nodes or not by combining key verification conditions in the data sharing records; when verification failure exists in secret key verification between other nodes in the block chain and block chain link points in other block chain networks or data transaction records of the secret key verification, and potential safety hazard information exists in any record of intelligent contract records and node identity authentication records, judging that the other nodes in the block chain are unsafe nodes, otherwise, judging that the other nodes are safe nodes; when other nodes in the block chain are safety nodes, the current block chain node increases the safety nodes as data sharing nodes, and data sharing is carried out according to a second data sharing rule;
the effect of the above technical scheme is as follows: through the mode, the security screening of the data sharing nodes to be newly added can be effectively improved through the mode of judging the node types of the data sharing nodes to be newly added, meanwhile, different types of verification are carried out through the nodes of different types, the node verification efficiency can be effectively improved aiming at the nodes of different types, the problems that the verification efficiency is reduced and the verification time is too long due to the fact that the verification process is complex due to the fact that the unified and consistent verification mode is adopted aiming at the nodes of different types are prevented from happening. On the other hand, different data sharing rules are combined through different node types, so that the data sharing safety can be effectively improved, and the data sharing safety monitoring strength of the newly added data sharing nodes is improved.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A method for sharing block chain data, the method comprising:
the current block chain node acquires other block chain nodes in a block chain needing data sharing, and determines other block chain nodes in the block chain needing data sharing as data sharing nodes;
pre-authorizing a data sharing node which needs to share data with the current block chain node;
after the pre-authorization is carried out on the data sharing nodes in the block chain needing data sharing at the current block chain link point, the data access authority of each data sharing node is confirmed in a data access activation mode;
for the authorized data sharing nodes, sharing the on-chain data of the current block chain node by a secret key;
and after the pre-authorization, adding a new data sharing node to the current block chain node in a node judgment mode.
2. The method according to claim 1, wherein after the pre-authorization is performed on the data sharing node in the block chain that needs to perform data sharing at the current block chain link point, the method for determining the data access right of each data sharing node in a data access activation manner includes:
the current block chain node sets a private key corresponding to each pre-authorized data sharing node aiming at each pre-authorized data sharing node, and sends the private key to the corresponding data sharing node;
after the current block chain node sends the corresponding private key to each data sharing node, setting different authorization starting time periods and private key updating time periods for each data sharing node; sending the authorized starting time period to a corresponding data sharing node;
after receiving the authorized starting time period, the data sharing node takes the time point of receiving a private key as the starting point of the time period of the authorized starting time period, and utilizes the private key to access the data of the current block link point within the last 3 minutes of the time period of the authorized starting time period;
the current block link point determines a data sharing node which completes data access by using a private key within the last 3 minutes of the time period of the authorized starting time period as an authorized data sharing node, and establishes a shared data chain;
performing pre-authorization failure marking on data sharing nodes with data access failure, and canceling pre-authorization authority of the data sharing nodes with the data access failure, wherein the data sharing nodes with the data access failure comprise data sharing nodes which do not perform data access on the current block link point within a specified time by using a private key, and data sharing nodes which do not perform data access by using a correct secret key due to decryption errors of the private key;
in the process of data sharing between the data sharing node and the current block chain node, the current block chain node updates the private key for the private key updating time period corresponding to each data sharing node and sends the updated private key to the corresponding data sharing node, and the data sharing node shares the data with the current block chain node by using the updated private key until the next private key is updated.
3. The method according to claim 2, wherein the setting of the different authorized start time periods for each data sharing node comprises:
dividing every three data sharing nodes into a group to obtain a plurality of data sharing node groups;
randomly carrying out authorized activation sequence sequencing numbering on a plurality of data sharing node groups, and acquiring a corresponding authorized activation sequence number by each data sharing node;
setting an authorized starting time period for a first group of data sharing groups for authorized activation, and marking the authorized starting time of the first group of data sharing groups for authorized activation as an initial authorized starting time period, wherein the initial authorized starting time period is greater than 16 minutes;
setting an authorized starting time period for each data sharing group in sequence according to the authorized activation sequence number; moreover, the authorized starting time period of each data sharing node group is increased by an extension time period compared with the starting time period of the previous group of data sharing node groups; wherein the time length of the extended time period is 20% of the initial authorization initiation time period.
4. The method of claim 1, wherein adding a new data sharing node by the current blockchain node through a node judgment manner after the pre-authorization comprises:
other nodes in the block chain send data sharing requests to the current block chain node;
the current blockchain node acquires the establishment time of other nodes in the blockchain after receiving the data sharing request, and determines whether the other nodes in the blockchain are initial nodes in the blockchain network;
if other nodes in the block chain are initial nodes, acquiring a data sharing record between the initial node and other block chain nodes, and judging whether the initial nodes are safe nodes according to the key verification condition in the data sharing record; when the initial node has the condition that the key verification fails and the data sharing is not completed, judging that the initial node is an unsafe node, otherwise, judging that the initial node is a safe node; when the initial node is a security node, the current block link node increases the security node to be a data sharing node, and sets a corresponding private key, an authorized starting time period and a private key updating time period for the security node;
if the other nodes in the block chain are not the initial nodes, judging whether the other nodes in the block chain are data sharing nodes with failed authorized activation; if other nodes in the block chain are data sharing nodes with failed authorization activation, setting a private key for the data sharing nodes with failed authorization activation, sending the data sharing nodes with failed authorization activation through the private key for authorization activation again, if the authorization activation is successful, taking the data sharing nodes with failed authorization activation as the data sharing nodes, and if the authorization activation is failed, not allowing the data sharing nodes with failed authorization activation to perform data sharing verification and permission;
and if the other nodes in the block chain are neither the initial node nor the data sharing nodes with failed authorized activation, acquiring the node establishment time of the other nodes in the block chain and the data sharing record in the node establishment time, and determining the data sharing rule according to the node establishment time and the data sharing record in the node establishment time.
5. The method according to claim 4, wherein if other nodes in the blockchain are not initial nodes, extracting the node setup time of the other nodes and the data sharing record in the node setup time, and determining the data sharing rule according to the node setup time and the data sharing record in the node setup time comprises:
judging whether the time length from the node establishment time of other nodes in the block chain to the time of sending the data sharing request exceeds the preset block link point establishment time length or not;
if the time length from the node establishing time to the time of sending the data sharing request exceeds the preset block chain link point establishing time length, performing security verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged as security nodes through the security verification, allowing the other nodes in the block chain to be added as data sharing nodes of the current node, and performing data sharing according to a first data sharing rule;
if the time length from the node establishing time to the time of sending the data sharing request does not exceed the preset block link point establishing time length, extracting the number of the data sharing block link points with other nodes in the block chain; if the number of the data sharing block chain nodes with other nodes in the block chain exceeds a preset sharing node number threshold, performing security verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged as security nodes through the security verification, allowing the other nodes in the block chain to be added as the data sharing nodes of the current node, and performing data sharing according to a first data sharing rule;
if the number of the chain nodes of the block chain for data sharing with other nodes in the block chain exceeds a preset sharing node number threshold value, extracting data transaction records, intelligent contract records and node identity authentication records of other nodes in the block chain, simultaneously calling data sharing records between other nodes in the block chain and other block chain nodes in a block chain network, and judging whether other nodes in the block chain are safe nodes or not by combining a secret key verification condition in the data sharing records; when verification failure exists in secret key verification between other nodes in the block chain and block chain link points in other block chain networks or data transaction records of the secret key verification, and potential safety hazard information exists in any record of intelligent contract records and node identity authentication records, judging that the other nodes in the block chain are unsafe nodes, otherwise, judging that the other nodes are safe nodes; when other nodes in the block chain are safety nodes, the current block chain node increases the safety nodes as data sharing nodes, and data sharing is carried out according to a second data sharing rule;
wherein the first data sharing rule is: allowing the data sharing node to share all data with the current blockchain node;
the second data sharing rule is as follows: and in fifteen private key updating time periods after other nodes in the block chain become the current block chain node, not allowing other nodes in the block chain to start data sharing requests to other new block chain nodes, carrying out security monitoring on the data sharing process of the other nodes in the block chain in the fifteen private key updating time periods, and if the other nodes in the block chain do not meet the security standard in the data sharing process of the fifteen private key updating time periods, releasing the authorization of the other nodes in the block chain and the data sharing node of the current block chain node.
6. A system for sharing blockchain data, the system comprising:
an obtaining module, configured to obtain, by a current blockchain node, other blockchain nodes in a blockchain that needs to perform data sharing, and determine the other blockchain nodes in the blockchain that needs to perform data sharing as data sharing nodes;
the pre-authorization module is used for pre-authorizing the data sharing node which needs to share data with the current block chain link point;
the right confirming module is used for confirming the right of data access of each data sharing node in a data access activation mode after the data sharing node in the block chain needing data sharing is pre-authorized at the current block chain link point;
the data sharing module is used for sharing the data on the current block chain node by a key aiming at the data sharing node with the determined right;
and the node adding module is used for adding a new data sharing node to the current block chain node in a node judgment mode after the pre-authorization.
7. The system of claim 6, wherein the right determining module comprises:
the private key setting module is used for setting a private key corresponding to each pre-authorized data sharing node by the current block chain node aiming at each pre-authorized data sharing node and sending the private key to the corresponding data sharing node;
the time setting module is used for setting different authorization starting time periods and private key updating time periods for each data sharing node after the current blockchain node sends the corresponding private key to each data sharing node; sending the authorized starting time period to a corresponding data sharing node;
the data access module is used for the data sharing node to use the time point of receiving a private key as the starting point of the time period of the authorized starting time period after receiving the authorized starting time period, and to use the private key to perform data access on the current block link point within the last 3 minutes of the time period of the authorized starting time period;
a data chain establishing module, configured to determine, by the current block link node, a data sharing node that completes data access by using a private key within the last 3 minutes of the time period of the authorized starting time period as an authorized data sharing node, and establish a shared data chain;
the cancellation module is used for marking the data sharing nodes with failed data access in a pre-authorization mode and canceling the pre-authorization authority of the data sharing nodes with failed data access, wherein the data sharing nodes with failed data access comprise the data sharing nodes which do not use a private key to perform data access on the current block link point within a specified time and the data sharing nodes which have wrong decryption of the private key and do not use a correct private key to perform data access;
and the updating module is used for updating the private key of the current block chain node aiming at the private key updating time period corresponding to each data sharing node and sending the updated private key to the corresponding data sharing node in the data sharing process of the data sharing node and the current block chain node, and the data sharing node shares the data with the current block chain node by using the updated private key until the next private key is updated.
8. The system of claim 7, wherein the time setting module comprises:
the grouping module is used for grouping every three data sharing nodes into a group to obtain a plurality of data sharing node groups;
the system comprises a numbering module, a data sharing module and a data processing module, wherein the numbering module is used for randomly carrying out authorized activation sequence sequencing numbering on a plurality of data sharing node groups, and each data sharing node acquires a corresponding authorized activation sequence number;
the starting time setting module is used for setting an authorized starting time period for a first group of data sharing groups for authorized activation and marking the authorized starting time of the first group of data sharing groups for authorized activation as an initial authorized starting time period, wherein the initial authorized starting time period is greater than 16 minutes;
the sequential time period setting module is used for sequentially setting the authorized starting time period for each data sharing group according to the authorized activation sequence number; moreover, the authorized starting time period of each data sharing node group is increased by an extension time period compared with the starting time period of the previous group of data sharing node groups; wherein the time length of the extended time period is 20% of the initial authorization initiation time period.
9. The system of claim 6, wherein the node adding module comprises:
a request initiating module, configured to initiate a data sharing request to the current block link point by another node in the block chain;
a first node determining module, configured to obtain, by the current blockchain node, establishment time of other nodes in the blockchain after receiving the data sharing request, and determine whether the other nodes in the blockchain are initial nodes in the blockchain network;
a second node determination module, configured to, if other nodes in the block chain are initial nodes, obtain a data sharing record between the initial node and the other block chain nodes, and determine whether the initial nodes are security nodes according to a key verification condition in the data sharing record; when the initial node has the condition that the key verification fails and the data sharing is not completed, judging that the initial node is an unsafe node, otherwise, judging that the initial node is a safe node; when the initial node is a security node, the current block link node increases the security node to be a data sharing node, and sets a corresponding private key, an authorized starting time period and a private key updating time period for the security node;
a third node judgment module, configured to judge whether other nodes in the block chain are data sharing nodes that are failed in authorized activation if the other nodes in the block chain are not initial nodes; if other nodes in the block chain are data sharing nodes with failed authorization activation, setting a private key for the data sharing nodes with failed authorization activation, sending the data sharing nodes with failed authorization activation through the private key for authorization activation again, if the authorization activation is successful, taking the data sharing nodes with failed authorization activation as the data sharing nodes, and if the authorization activation is failed, not allowing the data sharing nodes with failed authorization activation to perform data sharing verification and permission;
and a fourth node determination module, configured to, if the other node in the block chain is neither the initial node nor the data sharing node for which the authorization activation fails, obtain the node establishment time of the other node in the block chain and the data sharing record in the node establishment time, and determine the data sharing rule according to the node establishment time and the data sharing record in the node establishment time.
10. The system of claim 9, wherein the node decision module four comprises:
the time judging module is used for judging whether the time length from the node establishing time of other nodes in the block chain to the time of sending the data sharing request exceeds the preset block link point establishing time length or not;
the first safety judgment module is used for carrying out safety verification on other nodes in the block chain according to an initial node mode if the time length from the node establishment time to the time of sending the data sharing request exceeds the preset block chain link point establishment time length, and if the other nodes in the block chain are judged as safety nodes through the safety verification, the other nodes in the block chain are allowed to be added as data sharing nodes of the current node, and data sharing is carried out according to a first data sharing rule;
the safety judgment module II is used for extracting the number of the block link points sharing data with other nodes in the block chain if the time length from the node establishment time to the time of sending the data sharing request does not exceed the preset block link point establishment time length; if the number of the data sharing block chain nodes with other nodes in the block chain exceeds a preset sharing node number threshold, performing security verification on other nodes in the block chain according to an initial node mode, and if the other nodes in the block chain are judged as security nodes through the security verification, allowing the other nodes in the block chain to be added as the data sharing nodes of the current node, and performing data sharing according to a first data sharing rule;
the safety judgment module III is used for extracting data transaction records, intelligent contract records and node identity authentication records of other nodes in the block chain if the number of the data sharing block chain link points with other nodes in the block chain exceeds a preset sharing node number threshold value, simultaneously calling data sharing records between other nodes in the block chain and other block chain nodes in a block chain network, and judging whether the other nodes in the block chain are safety nodes or not by combining a secret key verification condition in the data sharing records; when verification failure exists in secret key verification between other nodes in the block chain and block chain link points in other block chain networks or data transaction records of the secret key verification, and potential safety hazard information exists in any record of intelligent contract records and node identity authentication records, judging that the other nodes in the block chain are unsafe nodes, otherwise, judging that the other nodes are safe nodes; when other nodes in the block chain are safety nodes, the current block chain node increases the safety nodes as data sharing nodes, and data sharing is carried out according to a second data sharing rule;
wherein the first data sharing rule is: allowing the data sharing node to share all data with the current blockchain node;
the second data sharing rule is as follows: and in fifteen private key updating time periods after other nodes in the block chain become the current block chain node, not allowing other nodes in the block chain to start data sharing requests to other new block chain nodes, carrying out security monitoring on the data sharing process of the other nodes in the block chain in the fifteen private key updating time periods, and if the other nodes in the block chain do not meet the security standard in the data sharing process of the fifteen private key updating time periods, releasing the authorization of the other nodes in the block chain and the data sharing node of the current block chain node.
CN202110694721.7A 2021-06-23 2021-06-23 Block chain data sharing method and system Active CN113259105B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110694721.7A CN113259105B (en) 2021-06-23 2021-06-23 Block chain data sharing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110694721.7A CN113259105B (en) 2021-06-23 2021-06-23 Block chain data sharing method and system

Publications (2)

Publication Number Publication Date
CN113259105A true CN113259105A (en) 2021-08-13
CN113259105B CN113259105B (en) 2021-09-28

Family

ID=77189264

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110694721.7A Active CN113259105B (en) 2021-06-23 2021-06-23 Block chain data sharing method and system

Country Status (1)

Country Link
CN (1) CN113259105B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450910A (en) * 2018-11-26 2019-03-08 远光软件股份有限公司 Data sharing method, data sharing network and electronic equipment based on block chain
CN109639753A (en) * 2018-10-26 2019-04-16 众安信息技术服务有限公司 A kind of data sharing method and system based on block chain
US20190273620A1 (en) * 2017-07-18 2019-09-05 Zhongan Information Technology Service Co., Ltd. Data sharing method and data sharing system
CN111274599A (en) * 2020-02-17 2020-06-12 深圳壹账通智能科技有限公司 Data sharing method based on block chain and related device
US20200371995A1 (en) * 2019-05-22 2020-11-26 Salesforce.Com, Inc. System or method to implement right to be forgotten on metadata driven blockchain using shared secrets and consensus on read
CN112187826A (en) * 2020-10-14 2021-01-05 深圳壹账通智能科技有限公司 Data authorization and data access method and system in block chain network
CN112765640A (en) * 2021-01-29 2021-05-07 重庆卡歌科技有限公司 Data sharing method based on block chain technology

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190273620A1 (en) * 2017-07-18 2019-09-05 Zhongan Information Technology Service Co., Ltd. Data sharing method and data sharing system
CN109639753A (en) * 2018-10-26 2019-04-16 众安信息技术服务有限公司 A kind of data sharing method and system based on block chain
CN109450910A (en) * 2018-11-26 2019-03-08 远光软件股份有限公司 Data sharing method, data sharing network and electronic equipment based on block chain
US20200371995A1 (en) * 2019-05-22 2020-11-26 Salesforce.Com, Inc. System or method to implement right to be forgotten on metadata driven blockchain using shared secrets and consensus on read
CN111274599A (en) * 2020-02-17 2020-06-12 深圳壹账通智能科技有限公司 Data sharing method based on block chain and related device
CN112187826A (en) * 2020-10-14 2021-01-05 深圳壹账通智能科技有限公司 Data authorization and data access method and system in block chain network
CN112765640A (en) * 2021-01-29 2021-05-07 重庆卡歌科技有限公司 Data sharing method based on block chain technology

Also Published As

Publication number Publication date
CN113259105B (en) 2021-09-28

Similar Documents

Publication Publication Date Title
US11263298B2 (en) Persistent authentication system incorporating one time pass codes
CN112311735B (en) Credible authentication method, network equipment, system and storage medium
CN101981889B (en) Secure communications in computer cluster systems
CN106161032A (en) A kind of identity authentication method and device
DE102018216915A1 (en) System and method for secure communications between controllers in a vehicle network
CN109359464B (en) Wireless security authentication method based on block chain technology
CN112686668A (en) Alliance chain cross-chain system and method
CN111294349B (en) Method and device for sharing data of Internet of things equipment
CN110519300A (en) Client key method for secure storing based on password bidirectional authentication
CN112801664B (en) Intelligent contract supply chain trusted service method based on block chain
US20210105136A1 (en) Method for securing a data exchange in a distributed infrastructure
CN108737323A (en) A kind of digital signature method, apparatus and system
CN112069550A (en) Electronic contract deposit certificate system based on intelligent contract mode
CN106657002A (en) Novel crash-proof base correlation time multi-password identity authentication method
CN115865320A (en) Block chain-based security service management method and system
CN108075895B (en) Node permission method and system based on block chain
CN112035896A (en) Electronic contract deposit certificate system based on transaction mode
WO2015178597A1 (en) System and method for updating secret key using puf
CN117376026A (en) Internet of things equipment identity authentication method and system
CN113259105B (en) Block chain data sharing method and system
CN111614462A (en) Key calculation method and system based on block chain
CN101471775B (en) Authentication method for MS and BS of WiMAX system
CN116155483A (en) Block chain signing machine safety design method and signing machine
CN113055160B (en) Intelligent education safety protection method and system based on Kerberos identity authentication protocol
CN114154965A (en) Collaborative law enforcement and case handling management method and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230809

Address after: 528000 Room 101-2, Building D, No. 28 South Industrial Zone Road, Yongfeng Village, Lunjiao Street, Shunde District, Foshan City, Guangdong Province (Residence Application)

Patentee after: Guangdong Zhongteng Borun blockchain Network Technology Co.,Ltd.

Address before: Room 02A, 11 / F, 118 Jianguo Road, Chaoyang District, Beijing

Patentee before: Invention house (Beijing) Technology Co.,Ltd.