CN114662124A - Processing method of block chain trusted data and computer readable storage medium - Google Patents

Processing method of block chain trusted data and computer readable storage medium Download PDF

Info

Publication number
CN114662124A
CN114662124A CN202210142091.7A CN202210142091A CN114662124A CN 114662124 A CN114662124 A CN 114662124A CN 202210142091 A CN202210142091 A CN 202210142091A CN 114662124 A CN114662124 A CN 114662124A
Authority
CN
China
Prior art keywords
data
account
trusted
trusted data
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210142091.7A
Other languages
Chinese (zh)
Inventor
艾景海
马廷
鲍乐祥
纪玉翀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Refrigerator Co Ltd
Haier Smart Home Co Ltd
Original Assignee
Qingdao Haier Refrigerator Co Ltd
Haier Smart Home Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Refrigerator Co Ltd, Haier Smart Home Co Ltd filed Critical Qingdao Haier Refrigerator Co Ltd
Priority to CN202210142091.7A priority Critical patent/CN114662124A/en
Publication of CN114662124A publication Critical patent/CN114662124A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention provides a processing method of block chain trusted data and a computer readable storage medium. Wherein the method comprises the following steps: acquiring data application information by a management account of the trusted data; the management account determines whether to allow data to be checked according to the application information; under the condition of permission, the management account uses the account public key of the application account to encrypt the trusted data, and feeds back the encrypted trusted data to the application account; the application account is decrypted by using a private key corresponding to the account public key to obtain trusted data, the trusted data is generated according to a preset structured format, a data structure of the trusted data comprises a static data field and a dynamic data field, the static data field is used for storing the trusted real name information of a management account in the trusted data, and the dynamic data field is used for storing the data information and the digital assets in the trusted data. The scheme of the invention ensures that the credible data is convenient to encrypt, decrypt, transmit and analyze, and improves the data processing efficiency and the credibility.

Description

Processing method of block chain trusted data and computer readable storage medium
Technical Field
The present invention relates to internet information technology, and more particularly, to a method for processing block chain trusted data and a computer readable storage medium.
Background
The block chain is a distributed shared account book and a database, and has the characteristics of decentralization, no tampering, trace retaining in the whole process, traceability, collective maintenance, openness and transparency and the like. The characteristics ensure the honesty and the transparency of the block chain and lay a foundation for creating trust for the block chain. With the development of the block chain technology, the application scenarios thereof become more and more extensive, and many of the application scenarios have been gradually implemented. Where digital assets are one of the important responsibilities of a blockchain.
Digital assets (Digital assets) exist in the form of electronic data that can be used to hold non-monetary assets for sale or in the process of production. The generation of Non-homogeneous digital assets (Non-homogeneous tokens), enriching the form of blockchain digital assets. The NFT can mark physical assets, create a digital ownership certificate which can be freely bought and sold, and realize digital assets.
In the prior art, the problem still exists in data authorization use and storage of non-homogeneous digital assets and attribution information thereof, so that the popularization and application are inconvenient, and the large-scale popularization and application of the digital assets are limited.
Disclosure of Invention
An object of the present invention is to provide a method and a computer readable storage medium for processing blockchain trusted data that facilitates the use of trusted data.
It is a further object of the present invention to enable the management, storage, encryption/decryption, streaming and authorization of trusted data.
Particularly, the invention provides a processing method of block chain trusted data, which comprises the following steps:
acquiring data application information by a management account of the trusted data, wherein the application information comprises an application account address and an account public key;
the management account number processes the application information and determines whether to allow the checking of the trusted data;
under the condition that the trusted data is allowed to be checked, the management account uses the account public key of the application account to encrypt the trusted data, and feeds back the encrypted trusted data to the application account;
the application account is decrypted by using a private key corresponding to the account public key to obtain credible data, wherein the private key corresponds to the account public key
The trusted data is generated according to a preset structured format, and the data structure of the trusted data comprises a static data field and a dynamic data field, wherein the static data field is used for storing the trusted real-name information of the management account in the trusted data, and the dynamic data field is used for storing the data information and the digital assets in the trusted data.
Optionally, the dynamic data field includes a data information subfield to store version information of the trusted data and an asset subfield to store remaining digital assets and a streaming non-homogeneous token of the account.
Optionally, the remaining digital assets and the streaming non-homogeneous tokens are stored separately using a collection format, with elements within the collection set to fixed length arrays, and with different spacers set to separate between elements, between collections, between data information subfields and asset subfields, respectively.
Optionally, after the step of applying for the account to decrypt using the private key corresponding to the account public key to obtain the trusted data, the method further includes:
identifying a spacer in the trusted data;
data is extracted from between the spacers in a structured format to obtain the content of the trusted data.
Optionally, after the step of obtaining the content of the trusted data, the method further includes:
and calling the intelligent contract to process the trusted data, encrypting the running process of the intelligent contract, storing the encrypted running process on the block chain, and feeding back the running result of the intelligent contract to the trusted account.
Optionally, the trusted data is stored on the blockchain after being encrypted in advance, and the encrypted key is generated by the hash value of the trusted data and the public key of the management account.
Optionally, under the condition that the trusted data is refused to be viewed, the management account number feeds back refusing information to the application account, so that the application account can be displayed.
Optionally, the step of processing the application information by the management account includes:
verifying whether the application account has an authorization qualification and a data processing qualification, wherein the authorization qualification is used for representing the legality of the application account, and the data processing qualification is used for representing the data processing capacity of the application account;
and if the application account has authorization qualification and data processing qualification, determining that the management account allows the application account to view the trusted data.
Optionally, after the step of feeding back the encrypted trusted data to the application account, the method further includes:
and storing the data application record of the application account on the blockchain.
In particular, according to another aspect of the present invention, there is also provided a computer-readable storage medium having stored thereon a machine-executable program which, when executed by a processor, implements the method of processing blockchain trusted data of any one of the above.
According to the processing method of the block chain trusted data, the trusted data is generated according to a preset structured format, a static data field in the trusted data is used for storing the trusted real-name information of the management account in the trusted data, and a dynamic data field is used for storing the data information and the digital assets in the trusted data. The data structure can conveniently and intuitively organize, manage and encrypt the trusted data, and is favorable for the application of data assets such as NFT and the like on the block chain. Aiming at the trusted data, the method disclosed by the invention processes the application information of the application account, determines whether the trusted data is allowed to be checked, and provides the application account with the trusted data in an encryption mode under the condition that the trusted data is allowed to be checked, so that the data security is ensured, and the trusted data is authorized to be accessed.
Furthermore, according to the processing method of the block chain trusted data, the fields of the trusted data are reasonably arranged, so that the trusted data is convenient to encrypt, decrypt, transmit and analyze, and the data processing efficiency and the reliability are improved.
Furthermore, in the processing method of the block chain trusted data of the present invention, the data structure of the trusted data includes a static data field and a dynamic data field, where the static data field is used to store the real name information of the management account in the trusted data, the dynamic data field is used to store the data information and the digital assets in the trusted data, and the dynamic data field is updated according to the digital assets, taking the credibility and the real-time property of the data into consideration comprehensively.
The above and other objects, advantages and features of the present invention will become more apparent to those skilled in the art from the following detailed description of specific embodiments thereof, taken in conjunction with the accompanying drawings.
Drawings
Some specific embodiments of the invention will be described in detail hereinafter, by way of illustration and not limitation, with reference to the accompanying drawings. The same reference numbers in the drawings identify the same or similar elements or components. Those skilled in the art will appreciate that the drawings are not necessarily drawn to scale. In the drawings:
fig. 1 is a schematic diagram of a processing method of block chain trusted data according to an embodiment of the invention;
fig. 2 is a schematic diagram of a data structure of trusted data in a processing method of blockchain trusted data according to an embodiment of the invention;
fig. 3 is a schematic diagram of a structured storage form of trusted data in a processing method of blockchain trusted data according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating information transfer between a management account and an application account in a method for processing block chain trusted data according to an embodiment of the present invention; and
FIG. 5 is a schematic block diagram of a machine-readable storage medium according to one embodiment of the present invention.
Detailed Description
Fig. 1 is a schematic diagram of a processing method of block chain trusted data according to an embodiment of the invention. The method for processing block chain trusted data generally may include:
step S102, the management account of the trusted data acquires data application information. The application information contains an application account address and an account public key.
And step S104, the management account number processes the application information and determines whether to allow the checking of the trusted data.
And step S106, under the condition that the trusted data is allowed to be checked, the management account uses the account public key of the application account to encrypt the trusted data, and feeds back the encrypted trusted data to the application account.
And step S108, the application account uses a private key corresponding to the account public key to decrypt to obtain trusted data.
The method of the embodiment processes the application information of the application account, determines whether to allow the checking of the trusted data, and provides the application account with the trusted data in an encryption mode under the condition that the checking of the trusted data is allowed, so that the data security is ensured, and the authorized access to the trusted data is required.
The credibility of the credible data in the method of the embodiment is derived from that the management account number is an authenticated credible account. The trusted account is an account existing on the blockchain, is a distributed account created on the blockchain after the identity information is authenticated by an authority, and adopts a public and private key system to ensure the data security, so that the identity of an account manager in a legal level can be ensured, and the trusted data is data which is signed by the trusted account and then linked up, so that 'who data is responsible for' can be realized, and the credibility in the legal level is ensured because the data is signed by the trusted account and linked up.
The trusted account is an account authenticated by real name, and the establishment process can be as follows: acquiring real-name information of an account manager, and verifying the real-name information; after the verification is passed, acquiring a creation chain password provided by an account administrator; and creating a trusted account, taking the created chain password as a preset password of the trusted account, and carrying out managed storage on a private key of the trusted account. The specific real name information may be set according to the requirements of the regulatory department, for example, the identity information of the account creator may be used. The verification process of the real-name information is a process of comparing the real-name information with credible information prestored in a supervision department by an account creator. For example, the account administrator may provide identity information for verification through face recognition or other biometric identification of the person.
In order to solve the problem that data meets the requirements of supervision and privacy protection at the same time and solve the contradiction between technical development and supervision, after a trusted account is established, an anonymous account associated with the trusted account can be established. The anonymous account has the advantages that on one hand, the problem of leakage of real-name authentication information cannot occur, and on the other hand, the traceability of the trusted account is relied on, so that the requirements of relevant supervision can be met. Private keys and/or mnemonics for anonymous accounts may be escrowed. For example, the data may be stored in a server or computer isolated from the network, and when a private key and/or mnemonic is required, the data may be stored in a secure mobile storage device.
Fig. 2 is a schematic diagram of a data structure of trusted data in a processing method of blockchain trusted data according to an embodiment of the invention. The trusted data in the method of this embodiment is generated according to a preset structured format, and the data structure of the trusted data includes a static data field and a dynamic data field, where the static data field is used to store the real name information of the management account in the trusted data, and the dynamic data field is used to store the data information and the digital assets in the trusted data. The static data field is used for storing the credible real-name information of the management account in the credible data, the dynamic data field is used for storing the data information and the digital assets in the credible data, and the dynamic data field is updated according to the digital assets, so that the credibility and the real-time property of the data are comprehensively considered.
The trusted data may include: ID1, account name (e.g., personal name), ID2, identification (e.g., identification number), ID3, trusted data version number, ID4, mobile device number (e.g., cell phone number), ID5, account remaining value, ID6, streaming NFT. The dynamic data field may include a data information subfield to store version information of the trusted data and an asset subfield to store remaining digital assets of the account and the streaming non-homogeneous token.
The remaining digital assets and the streaming non-homogeneous tokens are stored separately using a collection format, with elements within the collection set to fixed-length arrays, and with different spacers set between elements, between collections, and between the data information subfield and the asset subfield, respectively, to separate.
Account name, identity, mobile device number, etc. are basic information and require trusted authentication. The method comprises the steps that a trusted data version number is the version and related information of current trusted data, account residual digital assets are digital assets which belong to a user and are not destroyed, flow NFT is all digital assets which pass through the current user in the circulation process and comprise destroyed digital assets, the account residual digital assets and the flow NFT are stored in a set (list) form, elements in the list are fixed-length arrays, elements in the arrays are related information of the NFT, user names and identity numbers in the components of the trusted data are static data and cannot be changed, and the trusted data version number, a mobile phone number, the account residual digital assets and the flow NFT are dynamic data and are updated in real time. Considering the security and privacy of trusted data, the naming rule of trusted data may be named according to a predetermined ID naming specification (e.g., the rule of ID 1-6), and the related information of NFT is named according to the related specification of NFT (e.g., NFT 1-17).
For the remaining value of the ID5 account, the list1 may include a number of fixed-length arrays. For digital assets corresponding to physical commodities, NFT1 to NFT17 may be, respectively, a trusted voucher ID, a commodity category, a commodity name, a commodity specification, a commodity place of production, a commodity manufacturer, a commodity appearance picture, a commodity two-dimensional code, a tag code, an integration code, a storage warehouse, a circulation state, whether to transfer money, a generation date, whether to destroy, and information on a chain.
For ID6 flow NFT, the list2 is also a plurality of fixed length arrays. For digital assets corresponding to physical commodities, NFT1 to NFT17 may also be a trusted voucher ID, a commodity category, a commodity name, a commodity specification, a commodity place of production, a commodity manufacturer, a commodity appearance picture, a commodity two-dimensional code, a tag code, an integration code, a storage warehouse, a circulation state, whether to transfer money, a generation date, whether to destroy, and information on a chain, respectively.
The data content indicated by the specific elements of the data can be flexibly adjusted according to specific conditions.
Fig. 3 is a schematic diagram of a structured storage form of trusted data in a processing method of blockchain trusted data according to an embodiment of the present invention. Different spacers are respectively set between elements in the set, between sets, between the data information subfield and the asset subfield for separation. For example, the trusted data structured store may be divided into 6 parts, using "|" as a separator for each part, where the account name, identity, trusted data version number, mobile device number are stored in character form, the account remaining digital assets and the mobile NFT use "{ }" to represent sets, and the symbol "{ }" as a separator between sets, each NFT inside a set is saved using "[ ]" as an array, that is, the symbol "[ ]" as a separator of an NFT, and the relevant information of the NFT is stored in an array as elements of the array, using "" as a separator.
The trusted data is stored on the blockchain after being encrypted in advance, and an encrypted key can be generated by the hash value of the trusted data and the public key of the management account. Namely, the trusted data is subjected to cochain storage after being encrypted, the encryption mode is cochain storage after the hash value and the trusted account public key are combined in an encryption mode, and the trusted data is hashed and then cochain storage is performed after the hash value is encrypted by using the trusted account public key.
After the step of obtaining the trusted data by decrypting the application account by using the private key corresponding to the account public key, the application account can identify the spacer in the trusted data; data is extracted from between the spacers in a structured format to obtain the content of the trusted data. Thereby conveniently parsing the data using the delimiters.
After the step of obtaining the content of the trusted data, the application account can also call the intelligent contract to process the trusted data, store the operation process of the intelligent contract on the block chain after encrypting the operation process of the intelligent contract, and feed back the operation result of the intelligent contract to the trusted account. The intelligent contracts can be compiled in advance according to data evaluation models provided by data utilization parties, and each data evaluation model is used for grading one data use scene. The data evaluation model is provided by a data utilization party, generates an intelligent contract and can be adjusted according to data application. The running process of the intelligent contract is encrypted and then stored on the block chain, and the running result of the intelligent contract is fed back to the data utilization party, so that the data is guaranteed to be real and not to be tampered under the condition that private data is not exposed, and corresponding data application is completed.
The application account can combine with the credible account, credible data and intelligent contract based on the block chain to process credible data such as identity certificate and asset data, and realize functions such as loan assessment, asset valuation and credit evaluation. The trusted account is a personal account existing on the blockchain, is a distributed account created on the blockchain after the identity information is authenticated by an authority, and adopts a public and private key system to ensure data security. The trusted account authorization application account uses the trusted data through the intelligent contract, the result obtained by the calculation of the intelligent contract is linked and stored, and the result is fed back to the data utilization parties such as the supervision department, the financial institution and the like. The credible account and credible data based on the block chain can ensure the authenticity and effectiveness of the private data. Meanwhile, the model intelligent contract on the chain is created and realized according to the data models of the supervision and financial institutions, and the real and effective data calculation result is provided according to the requirements of the supervision and financial institutions under the condition of not exposing personal privacy through the process.
And under the condition of refusing to view the credible data, the management account number feeds back refusing information to the application account for displaying the application account. The step of processing the application information by the management account in step S104 may include: verifying whether the application account has an authorization qualification and a data processing qualification, wherein the authorization qualification is used for representing the legality of the application account, and the data processing qualification is used for representing the data processing capacity of the application account; and if the application account has authorization qualification and data processing qualification, determining that the management account allows the application account to view the credible data. And if the application account does not have any authorization qualification or data processing qualification at the same time, determining that the application account is not allowed to view the credible data.
The management account can also store a data application record of the application account on the blockchain after the step of feeding back the encrypted trusted data to the application account. Therefore, the data use behavior of the application account is recorded by using the block chain, and the tracing of the behavior of the application account is realized.
Fig. 4 is a flowchart illustrating information transfer between a management account and an application account in a processing method of block chain trusted data according to an embodiment of the present invention. The process may include the steps of:
step S402, the application account number 11 sends data application information containing an application account address and an account public key to the management account number 12;
step S404, if the management account 12 allows the application account 11 to check the trusted data, replying the agreement information, and replying the trusted data encrypted by the account public key to the application account 11;
step S406, if the management account 12 does not allow the application account 11 to view the trusted data, replying the same rejection information;
step S408, if the data is acquired, analyzing the data for checking; and if the rejection information is received, outputting a rejection prompt.
In the above process, the trusted data is stored in an encrypted form on the blockchain, and only the specified account (the management account number 12) can be viewed. If other accounts (application account numbers 11) need to check the trusted data of the specified accounts, then an application for checking the trusted data needs to be sent to the specified accounts, and the application is automatically accompanied by the account addresses and the account public keys of the applicants.
After the appointed account receives the application, if the appointed account agrees to check, when the appointed account agrees to click, the appointed account automatically encrypts the trusted data through the public key of the application account and then replies the encrypted trusted data to the application account, the application account side receives the agreed reply and automatically displays the trusted data decrypted by the private key, and if the encrypted trusted data is rejected, the application account receives a message of rejecting checking.
In the whole process, the designated account owner only sees the checking application of the trusted data, the applicant only sees the application feedback information and the decrypted trusted data, and the transaction process and the public and private key encryption and decryption process are hidden.
In the method of the present embodiment, it is obvious that the steps can be decomposed and/or recombined. These decompositions and/or recombinations are to be regarded as equivalents of the present invention. Also, the steps of executing the series of processes described above may naturally be executed chronologically in the order described, but need not necessarily be executed chronologically. Some steps may be performed in parallel or independently of each other.
FIG. 5 is a schematic block diagram of a machine-readable storage medium 20 according to one embodiment of the present invention. The machine-readable storage medium 20 stores thereon a machine-executable program 210, and when executed by a processor, the machine-executable program 210 implements any one of the above methods for processing blockchain trusted data.
The technical solution of the present invention may be substantially implemented or partially implemented in the prior art, and the technical solution may be implemented in the form of a software product, which is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned readable storage medium 20 includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
Furthermore, it is to be noted that in the device and method of the invention, it is obvious that the individual components or steps can be decomposed and/or recombined. These decompositions and/or recombinations are to be regarded as equivalents of the present invention. Also, the steps of performing the series of processes described above may naturally be performed chronologically in the order described, but need not necessarily be performed chronologically, and some steps may be performed in parallel or independently of each other. It will be understood by those skilled in the art that all or any of the steps or elements of the method and apparatus of the present invention may be implemented in any computing device (including processors, storage media, etc.) or network of computing devices, in hardware, firmware, software, or any combination thereof, which can be implemented by those skilled in the art using their basic programming skills after reading the description of the present invention.
Thus, the objects of the invention may also be achieved by running a program or a set of programs on any computing device. The computing device may be a general purpose device as is well known. The object of the invention is thus also achieved solely by providing a program product comprising program code for implementing the method or the apparatus. That is, such a program product also constitutes the present invention, and a storage medium storing such a program product also constitutes the present invention. It is to be understood that the storage medium may be any known storage medium or any storage medium developed in the future. It is also noted that in the apparatus and method of the present invention, it is apparent that each component or step can be decomposed and/or recombined. These decompositions and/or recombinations are to be regarded as equivalents of the present invention. Also, the steps of executing the series of processes described above may naturally be executed chronologically in the order described, but need not necessarily be executed chronologically. Some steps may be performed in parallel or independently of each other.
Computing devices provided with the above-described readable storage medium 20 may be interconnected by a network, which may transfer data using any suitable interface or protocol, such as an internet small computer system interface or the like. The network may be a cellular network, a radio network, a Wide Area Network (WAN)), a Local Area Network (LAN), or the internet, among others, and thus may be connected to other computing devices through various networks.
The computing device may be, for example, a server, a desktop computer, a notebook computer, a tablet computer, or a smartphone. The computing device may also include input means and output means. The input means may receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic device of the processing method of the blockchain trusted data, such as input means like a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointer, one or more mouse buttons, a track ball, a joystick, etc. The output devices may include a display device, auxiliary lighting devices (e.g., LEDs), and haptic feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
In some examples, the computing device may be a cloud computing node. The computing device may be described in the general context of computer system-executable instructions, such as program modules, being executed by a computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, etc. that perform particular tasks or implement particular abstract data types. The computing devices may be implemented in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computer system storage media including memory storage devices.
The technical solution of the present invention may be substantially implemented or partially implemented in the prior art, and the technical solution may be implemented in the form of a software product, which is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention.
Furthermore, it is to be noted that in the device and method of the invention, it is obvious that the individual components or steps can be decomposed and/or recombined. These decompositions and/or recombinations are to be regarded as equivalents of the present invention.
The steps of performing the above-described series of processes may naturally be performed in chronological order in the order described, but need not necessarily be performed in chronological order, and some steps may be performed in parallel or independently of each other. It will be understood by those skilled in the art that all or any of the steps or elements of the method and apparatus of the present invention may be implemented in any computing device (including processors, storage media, etc.) or network of computing devices, in hardware, firmware, software, or any combination thereof, which can be implemented by those skilled in the art using their basic programming skills after reading the description of the present invention.
That is, the methods of the present invention may use various forms of the flows shown above, with steps reordered, added, or deleted. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, and the present invention is not limited thereto as long as the desired results of the technical solutions disclosed in the present application can be achieved.
From the above description, those skilled in the art can fully recognize that the method for processing block chain trusted data of the present embodiment has the following advantages: the trusted data is organized, managed and encrypted conveniently and intuitively, and is authorized to be accessed and safely analyzed according to the requirement.
Thus, it should be appreciated by those skilled in the art that while a number of exemplary embodiments of the invention have been illustrated and described in detail herein, many other variations or modifications consistent with the principles of the invention may be directly determined or derived from the disclosure of the present invention without departing from the spirit and scope of the invention. Accordingly, the scope of the invention should be understood and interpreted to cover all such other variations or modifications.

Claims (10)

1. A processing method of block chain trusted data comprises the following steps:
acquiring data application information by a management account of the trusted data, wherein the application information comprises an application account address and an account public key;
the management account number processes the application information and determines whether to allow the trusted data to be checked;
under the condition that the trusted data is allowed to be viewed, the management account uses the account public key of the application account to encrypt the trusted data, and feeds back the encrypted trusted data to the application account;
the application account is decrypted by using a private key corresponding to the account public key to obtain the trusted data, wherein
The trusted data is generated according to a preset structured format, and the data structure of the trusted data comprises a static data field and a dynamic data field, wherein the static data field is used for storing the trusted real-name information of the management account in the trusted data, and the dynamic data field is used for storing the data information and the digital assets in the trusted data.
2. The method of claim 1, wherein the processing of the blockchain trusted data is performed in a single processing unit
The dynamic data field includes a data information subfield to store version information of the trusted data and an asset subfield to store remaining digital assets and a streaming non-homogeneous token of the account.
3. The method of claim 2, wherein the processing of the blockchain trusted data is performed in a wireless communication system
The remaining digital assets and the flowing non-homogeneous tokens are each stored using a collection format, elements within the collection are arranged in fixed-length arrays, and different spacers are arranged between the elements, between the collections, between the data information subfield and the asset subfield for separation.
4. The method for processing blockchain trusted data according to claim 3, wherein after the step of decrypting the application account by using the private key corresponding to the account public key to obtain the trusted data, the method further comprises:
identifying a spacer in the trusted data;
and extracting data from the interval character according to the structured format to obtain the content of the credible data.
5. The method for processing blockchain trusted data according to claim 3, wherein after the step of obtaining the content of the trusted data, further comprising:
and calling an intelligent contract to process the trusted data, encrypting the running process of the intelligent contract, storing the encrypted running process on a block chain, and feeding back the running result of the intelligent contract to the trusted account.
6. The method of claim 1, wherein the processing of the blockchain trusted data is performed in a single processing unit
The trusted data is stored on the blockchain after being encrypted in advance, and the encrypted key is generated by the hash value of the trusted data and the public key of the management account.
7. The method of claim 1, wherein the processing of the blockchain trusted data is performed in a wireless communication system
And under the condition that the trusted data is refused to be viewed, the management account number feeds back refusing information to the application account for display of the application account.
8. The method for processing blockchain trusted data according to claim 1, wherein the step of processing the application information by the management account includes:
verifying whether the application account has authorization qualification and data processing qualification, wherein the authorization qualification is used for representing the legality of the application account, and the data processing qualification is used for representing the data processing capacity of the application account;
and if the application account has the authorization qualification and the data processing qualification simultaneously, determining that the management account allows the application account to view the trusted data.
9. The method for processing blockchain trusted data according to claim 1, wherein after the step of feeding back the encrypted trusted data to the application account, the method further comprises:
and storing the data application record of the application account on the blockchain.
10. A computer readable storage medium having stored thereon a machine executable program which when executed by a processor implements a method of processing blockchain trusted data according to any one of claims 1 to 9.
CN202210142091.7A 2022-02-16 2022-02-16 Processing method of block chain trusted data and computer readable storage medium Pending CN114662124A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210142091.7A CN114662124A (en) 2022-02-16 2022-02-16 Processing method of block chain trusted data and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210142091.7A CN114662124A (en) 2022-02-16 2022-02-16 Processing method of block chain trusted data and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN114662124A true CN114662124A (en) 2022-06-24

Family

ID=82026917

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210142091.7A Pending CN114662124A (en) 2022-02-16 2022-02-16 Processing method of block chain trusted data and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114662124A (en)

Similar Documents

Publication Publication Date Title
US10666684B2 (en) Security policies with probabilistic actions
US11296895B2 (en) Systems and methods for preserving privacy and incentivizing third-party data sharing
CN110602248B (en) Abnormal behavior information identification method, system, device, equipment and medium
EP3844934B1 (en) A computer system and method of operating same for handling anonymous data
Hoepman Privacy design strategies (the little blue book)
CN108389059A (en) Digital copyrighted work protection, transaction and distributing method based on ownership and system
CN111079197B (en) Audit result data storage method and device, electronic equipment and medium
CN110932859B (en) User information processing method, device and equipment and readable storage medium
CN113285954B (en) Verifiable statement verification method, system, electronic device and storage medium
CN111666460A (en) User portrait generation method and device based on privacy protection and storage medium
CN109271798A (en) Sensitive data processing method and system
US11621844B2 (en) Secure data transfer system and method
CN110209691B (en) Data processing method and device
CN111291394A (en) False information management method, false information management device and storage medium
CN110471908A (en) A kind of joint modeling method and device
CN115296794A (en) Key management method and device based on block chain
CN116560863A (en) Task management method and device based on block chain and computer equipment
CN115801317A (en) Service providing method, system, device, storage medium and electronic equipment
CN113364763B (en) Verifiable statement generation method and device, electronic equipment and storage medium
Iqbal et al. Advancing database security: a comprehensive systematic mapping study of potential challenges
CN115186301A (en) Information processing method, information processing device, computer equipment and computer readable storage medium
CN114662124A (en) Processing method of block chain trusted data and computer readable storage medium
CN111814193A (en) Information sharing method, device and equipment
US20220222367A1 (en) Data aggregation for analysis and secure storage
CN112567716B (en) Secure data transmission system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination