CN115766052A - System and method for authentication, storage and instant query based on block chain data - Google Patents

System and method for authentication, storage and instant query based on block chain data Download PDF

Info

Publication number
CN115766052A
CN115766052A CN202211064323.8A CN202211064323A CN115766052A CN 115766052 A CN115766052 A CN 115766052A CN 202211064323 A CN202211064323 A CN 202211064323A CN 115766052 A CN115766052 A CN 115766052A
Authority
CN
China
Prior art keywords
data
core enterprise
enterprise
business
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211064323.8A
Other languages
Chinese (zh)
Inventor
于中阳
梅雪
陈平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wangchain Information Technology Co ltd
Original Assignee
Shanghai Wangchain Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wangchain Information Technology Co ltd filed Critical Shanghai Wangchain Information Technology Co ltd
Priority to CN202211064323.8A priority Critical patent/CN115766052A/en
Publication of CN115766052A publication Critical patent/CN115766052A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application provides a system and a method for authentication, storage and instant query based on block chain data. The business system stores the whole non-secret data and target data belonging to the core enterprise into a database as packed data, and then maps the storage positions of the encrypted target data and the non-secret data in the database to uuid marks in an enterprise information module of the core enterprise corresponding to the block chain system to realize data binding; the service system is also used for requesting a security token from the blockchain system, and after the security token is obtained, the service system adds the security token into a data header (head) of the packed data; the block chain system is also used for receiving the packed data sent by the service system after the security token is verified to be correct, and performing uplink chain storage operation on the packed data. The method ensures the authenticity of the uplink data to the maximum extent and ensures the perfection and maturity of the supply chain.

Description

System and method for authentication, storage and instant query based on block chain data
Technical Field
The application relates to a data authentication processing technology, in particular to a system and a method for authenticating, storing and instantly inquiring data based on a block chain.
Background
With the prevalence of credit commerce internationally and domestically, businesses upstream of the supply chain are generally confronted with the dilemma of extended pressure account periods of capital shortages.
Meanwhile, as market competition is intensified, competition among single enterprises is transforming into competition among supply chains, and the interdependence degree of all the parties in the same supply chain is deepened. Under the background, supply chain financial services aiming at enhancing the supply chain viability, improving the supply chain capital operation efficiency and reducing the overall supply chain management cost are rapidly developed.
The following technical ideas were set up for this researcher: and constructing a supply chain financial scene taking the core enterprise as a reference, wherein the core enterprise opens cloud credit for the multi-stage suppliers thereof, the core enterprise credit is transmitted along a credible trade link, and the suppliers at all stages can split and transfer the cloud credit to the upper-stage suppliers according to the real trade background. And in the splitting and circulation processes, the endorsement utility of the core enterprise is unchanged. The whole processes of splitting and circulating the certificate can be verified and traced on the platform. Since supply chain finance is a financial financing, enterprises mortgage financial institutions with not fixed assets but mobile assets such as accounts receivable, accounts payable or inventory, the longer the supply chain of a core enterprise, the more enterprises involved, the more complex the data; in traditional supply chain finance, the problems that information among enterprises on a supply chain is asymmetric, important information is falsified when the information is fake and shared, the information lacks transparency and the like exist, so that credit of a bank cannot be transmitted to a lower-level provider behind a first-level provider; the business volume is damaged, small and medium-sized enterprises cannot be financed, and the completeness and maturity of a supply chain are restricted while the development of the enterprises is restricted.
Therefore, how to solve the technical problem is an urgent task for those skilled in the art to overcome.
Disclosure of Invention
In view of the above, the present application discloses a system and method for authentication, storage and instant query based on block chain data, which are used to solve the above technical problems pointed out in the background art.
The invention provides a block chain data authentication, evidence storage and instant query system, which comprises a block chain system and a plurality of service systems; the block chain system establishes communication connection with a plurality of service systems through communication interfaces or communication protocols; the business system is deployed into each core enterprise;
the block chain system is used for receiving a request issued by a core enterprise certificate, acquiring enterprise information of a core enterprise, constructing a uuid belonging to the current core enterprise based on the enterprise information of the core enterprise and issuing the uuid to a service system;
the business system is used for carrying out Hash algorithm encryption on the asset data and the business data belonging to the core enterprise to obtain encrypted target data; the business system is also used for storing the non-secret data and the target data which belong to the core enterprise as a whole into a database as packed data, and mapping the storage position of the database where the encrypted target data and the non-secret data (namely the packed data which does not need to be encrypted) are located to the uuid identifier in the corresponding enterprise information module of the core enterprise in the block chain system to realize data binding; the business system is also used for requesting a security token from the blockchain system, and after the security token is obtained, the business system adds the security token into a data head (head) of the packed data;
the block chain system is also used for receiving packed data sent by the service system after the safety token is verified to be correct, and performing chain storage operation on the packed data; the hash code returned by the uplink is stored in the service system.
Preferably, as one possible embodiment; each core enterprise is internally connected with a plurality of sub enterprise modules; the sub-enterprise module is used for firstly changing the asset data and the business data of the core enterprise, then sending the changed asset data and business data to the business system of the core enterprise, and carrying out first verification and verification on the business system of the core enterprise.
Correspondingly, the invention provides a block chain data authentication, evidence storage and instant query method, which comprises the following push operations executed by a block chain data authentication, evidence storage and instant query system:
the block chain system receives a request issued by a core enterprise certificate, acquires enterprise information of a core enterprise, constructs a uuid belonging to the current core enterprise based on the enterprise information of the core enterprise, and issues the uuid to a service system; the only uuid distributed to the core enterprise by the business system is the uuid identifier; the uuid is also a public key of the core enterprise in the current business system;
the business system carries out Hash algorithm encryption on the asset data and the business data belonging to the core enterprise to obtain encrypted target data; the business system also stores the non-secret data and the target data which belong to the core enterprise as packed data into a database, and then maps the storage position of the encrypted target data and the non-secret data (namely the packed data which do not need to be encrypted) in the database to the uuid in the corresponding enterprise information module of the core enterprise in the block chain system to realize data binding;
the service system requests a security token from the blockchain system, and after the security token is obtained, the service system adds the security token into a data header (head) of the packed data; after the block chain system verifies that the security token is correct, the block chain system receives the packed data sent by the service system and executes chain storage operation on the packed data;
the hash code returned by the uplink on the block chain system is stored in the service system.
Preferably, as one possible embodiment; the service system requests a security token from the blockchain system, and after obtaining the security token, adds the security token into a data header (head) of the packed data, and specifically includes:
a core enterprise sends an uplink request to a block chain system through a service system; the uplink request is also a security token application request;
the core enterprise signs the security token application request by using a private key to obtain signature information;
sending the uuid identification and the signature information of the core enterprise to a block chain system for application; when the blockchain system judges that the uuid and the signature information of the current core enterprise are in a preset mapping relation, the blockchain system verifies and confirms that the current verification information is real information, and returns an issuing security token to the service system of the current core enterprise;
after the business system where the core enterprise is located obtains the security token, the business system adds the security token into a data header (head) of the packed data.
Preferably, as one possible embodiment; the hash code returned by the uplink in the block chain system is stored in the service system, and specifically includes:
and the block chain system judges the running device of the current uplink certificate storage, and stores the hash code returned to the service system of the core enterprise in the service system after all the packaged data of the current core enterprise finish the uplink certificate storage.
Preferably, as one possible embodiment; after the hash code returned by the uplink in the blockchain system is stored in the service system, the method also comprises a processing process of starting the inquiry of the blockchain certificate by the core enterprise.
Preferably, as one possible embodiment; the core enterprise starts a processing process of inquiring the block chain certificate storage, and the processing process comprises the following steps:
after a business system where a core enterprise is located finishes block chain chaining, generating a two-dimensional code link through a hash code returned by the block chain chaining;
compressing the two-dimension code link into a short link, and converting the short link into a two-dimension code picture again;
and attaching the converted two-dimension code picture to a two-dimension code picture corresponding storage module reserved by the digital certificate.
Preferably, as one possible embodiment; before the business system carries out Hash algorithm encryption on the asset data and the business data belonging to the core enterprise to obtain the encrypted target data, the method also comprises the following steps of changing the asset data and the business data of the core enterprise:
a plurality of sub-enterprise modules are arranged in a business system where a core enterprise is located;
the sub-enterprise module firstly changes the asset data and the business data of the core enterprise and then sends the changed asset data and business data to a business system where the core enterprise is located;
and after the auditing of the business system of the core enterprise is passed, executing the step that the business system carries out Hash algorithm encryption on the asset data and the business data belonging to the core enterprise to obtain encrypted target data.
Compared with the prior art, the invention has at least the following technical effects:
the embodiment of the invention provides a system and a method for authenticating, storing and instantly inquiring data based on a block chain, which comprises the following steps: wherein the system includes: the system comprises a block chain system and a plurality of business systems; the block chain system establishes communication connection with a plurality of service systems through communication interfaces or communication protocols; the business system is deployed into each core enterprise;
in a specific technical scheme, the block chain system is used for receiving a request issued by a core enterprise certificate, acquiring enterprise information of a core enterprise, constructing a uuid belonging to the current core enterprise based on the enterprise information of the core enterprise and issuing the uuid to the business system; the business system is used for carrying out Hash algorithm encryption on the asset data and the business data belonging to the core enterprise to obtain encrypted target data; the business system is also used for storing the non-secret data and the target data which belong to the core enterprise as the whole packaged data into a database, and mapping the storage position of the encrypted target data and the non-secret data (namely the packaged data which do not need to be encrypted) in the database to the uuid in the corresponding enterprise information module of the core enterprise in the block chain system to realize data binding; the business system is also used for requesting a security token from the blockchain system, and after the security token is obtained, the business system adds the security token into a data head (head) of the packed data; the block chain system is also used for receiving the packed data sent by the service system after the security token is verified to be correct, and performing chain storage operation on the packed data; the hash code returned by the uplink is stored in the service system.
The authentication, storage and instant query system based on the blockchain data can map the storage positions of the database where the encrypted target data and the non-encrypted data are located to uuid identifications in the enterprise information modules of the core enterprises corresponding to the blockchain system to realize data binding; after obtaining the security token, the service system adds the security token into a data head (head) of the packed data; the block chain system is also used for receiving the packed data sent by the service system after the safety token is verified to be correct, and executing chain certificate storing operation on the packed data; the hash code returned by the uplink is stored in the service system, so that the safety of data transmission is obviously improved; meanwhile, in the process, each time the business system data is modified and added and then the chain is stored, two verification processes are required, firstly, the business related to each business is checked, after the enterprise checking result is obtained, the data chain applying party sends a chain loading request to the block chain system through the business system, and the chain loading mode can be carried out only after the block chain system verifies the information, so that the authenticity of chain loading data is ensured to the maximum extent, the linkage response of the core enterprise and each small enterprise supply chain is formed, and the completeness and maturity of the supply chain are guaranteed.
Drawings
The drawings that will be used in the description of the embodiments or the related art will be briefly described below.
Fig. 1 is a schematic diagram illustrating a main principle of a system for authentication, storage and instant query based on block chain data according to an embodiment of the present application;
fig. 2 is a schematic main flowchart of an authentication, verification and instant query method based on block chain data according to an embodiment of the present disclosure;
fig. 3 is a flowchart illustrating a specific step S300 of the method for authentication, storage and instant query based on block chain data according to the embodiment of the present application;
fig. 4 is a flowchart illustrating a specific step S400 of the method for authentication, storage and instant query based on block chain data according to the embodiment of the present application;
fig. 5 is a schematic diagram illustrating another specific flowchart of a method for authentication, storage and instant query based on block chain data according to an embodiment of the present disclosure;
fig. 6 is a schematic flowchart illustrating another specific process of the authentication, verification and instant query method based on block chain data according to an embodiment of the present disclosure.
Reference numbers: a blockchain system 10; a business system 20.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. It should also be understood that the word "if" as used herein may be interpreted as "at 8230; \8230when or" when 8230; \8230, when "or" in response to a determination ", depending on the context.
Example one
Referring to fig. 1, an embodiment of the present invention provides a system for authentication, storage and instant query based on blockchain data, which includes a blockchain system 10 and a plurality of service systems 20; the block chain system establishes communication connection with a plurality of service systems through communication interfaces or communication protocols; the business system is deployed into each core enterprise;
the block chain system 10 is configured to receive a request issued by a core enterprise certificate, obtain enterprise information of a core enterprise, construct a uuid belonging to a current core enterprise based on the enterprise information of the core enterprise, and issue the uuid to a service system
The business system 20 is configured to perform hash algorithm encryption on the asset data and the business data belonging to the core enterprise to obtain encrypted target data; the business system is also used for storing the non-secret data and the target data which belong to the core enterprise as a whole into a database as packed data, and mapping the storage position of the database where the encrypted target data and the non-secret data (namely the packed data which does not need to be encrypted) are located to the uuid identifier in the corresponding enterprise information module of the core enterprise in the block chain system to realize data binding; the business system is also used for requesting a security token from the blockchain system, and after the security token is obtained, the business system adds the security token into a data head (head) of the packed data;
the block chain system 10 is further configured to receive the packed data sent by the service system after verifying that the security token is correct, and perform chain storage operation on the packed data; the hashcode returned by the uplink is stored in the service system.
In a specific technical scheme of the application, each core enterprise is internally connected with a plurality of sub-enterprise modules; the sub-enterprise module is used for firstly changing the asset data and the business data of the core enterprise, then sending the changed asset data and the changed business data to the business system of the core enterprise, and carrying out first audit verification on the business system of the core enterprise. After the core enterprise verifies and checks, the chain linking operation can be carried out; in the subsequent uplink operation process, the secondary verification such as encryption of the packed data of the core enterprise and application of the security token is further required, and the final uplink storage operation of the packed data can be performed only after the secondary verification is qualified.
In the specific technical scheme of the application, since the chain data of the block chain is traceable and not falsifiable, a very important problem in the existing application is how to guarantee the authenticity and credibility of the source data, that is, how to guarantee that the uplink data of an enterprise is based on the authentic trade background, rather than being forged or falsified.
The system comprises a business system and a block chain system, wherein the business system stores assets or business data, and the block chain system is the chain mapping of the business system. Considering that the prior blockchain system is not suitable for storing larger files, blockchain storage data is designed, different services are packaged into functional modules, the modules interact through interfaces and communicate with the outside, and the transaction modules select necessary key data according to the requirements of service and privacy protection, encrypt the data by adopting different encryption modes (mainly a Hash algorithm in the scheme), correspond to the unique code of an enterprise in the system and record the encrypted data on a blockchain.
Example two
Referring to fig. 2, correspondingly, a second embodiment of the present invention provides a method for authenticating, storing and instant querying based on block chain data, including performing the following push operation by using the system for authenticating, storing and instant querying based on block chain data:
step S100, a block chain system receives a request issued by a core enterprise certificate, acquires enterprise information of a core enterprise, constructs a uuid belonging to the current core enterprise based on the enterprise information of the core enterprise and issues the uuid to a service system; the only uuid distributed to the core enterprise by the business system is the uuid identifier; the uuid is also a public key of the core enterprise in the current business system;
s200, the business system carries out Hash algorithm encryption on the asset data and the business data belonging to the core enterprise to obtain encrypted target data; the business system also stores the non-secret data and the target data which belong to the core enterprise as packed data into a database, and then maps the storage position of the encrypted target data and the non-secret data (namely the packed data which do not need to be encrypted) in the database to the uuid in the corresponding enterprise information module of the core enterprise in the block chain system to realize data binding;
step S300, the business system requests a security token from the blockchain system, and after obtaining the security token, the business system adds the security token into a data header (head) of the packed data; after the block chain system verifies that the security token is correct, the block chain system receives the packed data sent by the service system and executes chain storage operation on the packed data;
in step S400, the hash code returned from the uplink in the block chain system is stored in the service system.
In the execution process of the step S100, the blockchain system receives a request for establishing a core enterprise credential, obtains enterprise information of a core enterprise, and constructs a uuid belonging to the current core enterprise based on the enterprise information of the core enterprise; the unique uuid distributed to the core enterprise by the service system is a uuid identifier; the uuid is also a public key of the core enterprise in the current business system;
it should be noted that, the above technical solution relates to the following initialization operation, that is, a request issued by a core enterprise certificate is received, enterprise information of a core enterprise is obtained, if the core enterprise is not registered, registration is required and data update is completed, the enterprise information is packaged as a main module, a unique uuid allocated to the core enterprise by the business system in the system is an identifier, and the uuid is also a public key of the core enterprise in the system. Core enterprise key = (uuid, core enterprise private key uuid _ sk); obviously, during operation, only the core enterprise can enjoy the authority of applying the uuid identifier, the subsidiary enterprises which are attached to the core enterprise do not have the authority, if the subsidiary enterprises want to change the uplink packed data, the subsidiary enterprises need to apply to the internal core enterprise, and uplink operation can be performed after the core enterprise verifies and audits the uplink packed data; in the subsequent uplink operation process, secondary verification such as encryption and security token application on the packaged data of the core enterprise is further required, and the final packaged data uplink certificate storage operation can be performed after the secondary verification is qualified.
During the execution of step S200, there may be a plurality of methods for packaging asset data and service data: under the condition that a core enterprise wants to keep business data and asset data secret, the business data and the asset data can be encrypted through a Hash algorithm and then mapped onto the data of the enterprise information module: data = (uuid, hash (asset/traffic)); if there is no special encryption requirement, the storage position of the service and asset data in the database can be directly mapped to the uuid: data = (uuid, database location (asset/business Data)).
Referring to fig. 3, in the process of executing step S300, the service system requests a security token from the blockchain system, and after obtaining the security token, the service system adds the security token into a header (head) of the packed data, specifically including:
step S310, a core enterprise sends a uplink request to a block chain system through a service system; the uplink request is also a security token application request;
step S320, the core enterprise signs the security token application request by using the private key to obtain signature information;
step S330, the uuid identification and the signature information of the core enterprise are sent to a block chain system for application; when the blockchain system judges that the uuid identification and the signature information of the current core enterprise are in a preset mapping relation, the blockchain system verifies and confirms that the current verification information is real information, and returns an issuing safety token to a service system of the current core enterprise;
step S340, after the business system where the core enterprise is located obtains the security token, the business system adds the security token into a data header (head) of the packed data.
Referring to fig. 4, in the process of executing step S300, the hash code returned by the uplink in the blockchain system is stored in the service system, which specifically includes:
step S410, the block chain system determines the running device of the current uplink certificate, and stores the hash code returned to the service system where the core enterprise is located in the service system after all the packaged data of the current core enterprise completes the uplink certificate.
Referring to fig. 5, after the hash code returned by the chain on the blockchain system is stored in the service system, the method further includes a process of the core enterprise starting to query the blockchain certificate. The core enterprise starts a processing process of inquiring the block chain certificate storage, and the processing process comprises the following steps:
step S510, after a business system where a core enterprise is located finishes block chain chaining, generating a two-dimensional code link through a hash code returned by the block chain chaining;
step S520, compressing the two-dimension code link into a short link, and converting the short link into a two-dimension code picture again;
and S530, attaching the converted two-dimension code picture to a two-dimension code picture corresponding storage module reserved by the digital certificate.
Referring to fig. 6, before step S200, the method further includes modifying the asset data and the business data of the core enterprise:
step S110, a business system where a core enterprise is located is provided with a plurality of sub-enterprise modules;
step S120, the sub-enterprise module firstly changes the asset data and the service data of the core enterprise, and then sends the changed asset data and the changed service data to a service system of the core enterprise;
and step S130, after the business system where the core enterprise is located passes the audit, executing step S200.
The system and the method for authenticating, storing and instantly inquiring data based on the block chain ensure the authenticity of uplink data to the maximum extent, thereby constituting linkage response of a core enterprise and supply chains of all small enterprises and ensuring the completeness and maturity of the supply chains. .
One skilled in the art will recognize that one or more embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, one or more embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (which may include, but are not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
In this application "and/or" means having at least one of the two. The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the data processing apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to part of the description of the method embodiment.
Although this application contains many specific implementation details, these should not be construed as limiting the scope of any disclosure or of what is claimed, but rather as merely describing the features of particular embodiments of the disclosure. Certain features that are described in this application in the context of separate embodiments can also be implemented in combination in a single embodiment. In another aspect, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous. Moreover, the separation of various system modules and components in the embodiments described should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
The above description is intended only to serve as a preferred embodiment of the one or more embodiments of the present application, and should not be taken as limiting the one or more embodiments of the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the one or more embodiments of the present application should be included in the scope of protection of the one or more embodiments of the present application.

Claims (8)

1. A system for authentication, evidence storage and instant query based on blockchain data, the system comprising: a block chain system and a plurality of business systems; the block chain system establishes communication connection with a plurality of service systems through communication interfaces or communication protocols; the business system is deployed into each core enterprise;
the block chain system is used for receiving a request issued by a core enterprise certificate, acquiring enterprise information of a core enterprise, constructing a uuid belonging to the current core enterprise based on the enterprise information of the core enterprise and issuing the uuid to a service system;
the business system is used for carrying out Hash algorithm encryption on asset data and business data belonging to the core enterprise to obtain encrypted target data; the business system is also used for storing the non-secret data and the target data which belong to the core enterprise as a whole into a database as packed data, and mapping the storage positions of the encrypted target data and the non-secret data in the database to uuid marks in the enterprise information module of the core enterprise corresponding to the block chain system to realize data binding; the business system is also used for requesting a security token from the blockchain system, and after the security token is obtained, the business system adds the security token into a data header of the packed data;
the block chain system is also used for receiving packed data sent by the service system after the safety token is verified to be correct, and performing chain storage operation on the packed data; the hash code returned by the uplink is stored in the service system.
2. The system of claim 1, wherein each of said core enterprises has a plurality of sub-enterprise modules interconnected therein; the sub-enterprise module is used for firstly changing the asset data and the business data of the core enterprise, then sending the changed asset data and business data to the business system of the core enterprise, and carrying out first verification and verification on the business system of the core enterprise.
3. A method for authentication, verification and instant query based on blockchain data, comprising the following push operations performed by the system for authentication, verification and instant query based on blockchain data of any one of claims 1-2:
the block chain system receives a request issued by a core enterprise certificate, acquires enterprise information of a core enterprise, constructs a uuid belonging to the current core enterprise based on the enterprise information of the core enterprise, and issues the uuid to a service system; the unique uuid distributed to the core enterprise by the business system is a uuid identifier; the uuid is also a public key of the core enterprise in the current business system;
the business system carries out Hash algorithm encryption on the asset data and the business data belonging to the core enterprise to obtain encrypted target data; the business system also stores the non-secret data and the target data which belong to the core enterprise as packed data into a database, and then maps the storage positions of the encrypted target data and the non-secret data in the database to uuid marks in an enterprise information module of the core enterprise corresponding to the block chain system to realize data binding;
the service system requests a security token from the blockchain system, and after the security token is obtained, the service system adds the security token into a data header of the packed data; after the block chain system verifies that the security token is correct, the block chain system receives packed data sent by a service system and performs chain storage and certification operation on the packed data;
the hash code returned by the uplink on the block chain system is stored in the service system.
4. The method of claim 3, wherein the service system requests the blockchain system for a security token, and after obtaining the security token, the service system adds the security token to a header of the packed data, and specifically comprises:
a core enterprise sends an uplink request to a block chain system through a service system; the uplink request is also a security token application request;
the core enterprise signs the security token application request by using a private key to obtain signature information;
sending the uuid identification and the signature information of the core enterprise to a block chain system for application; when the blockchain system judges that the uuid and the signature information of the current core enterprise are in a preset mapping relation, the blockchain system verifies and confirms that the current verification information is real information, and returns an issuing security token to the service system of the current core enterprise;
and after the business system where the core enterprise is located obtains the security token, the business system adds the security token into the data header of the packed data.
5. The method of claim 4 wherein the hash code returned on the block chain system is stored in a service system, comprising:
and the block chain system judges the running device of the current chain loading certificate, and stores the hash code returned to the service system of the core enterprise in the service system after all the packaged data of the current core enterprise finish the chain loading certificate storage.
6. The method of claim 4 further comprising the core enterprise initiating a process for querying blockchain credentials after the hashcode returned on the blockchain system is stored in the business system.
7. The method of claim 6, wherein the core enterprise initiates a process of querying blockchain credentials, comprising:
after a business system where a core enterprise is located finishes block chain chaining, generating a two-dimensional code link through a hash code returned by the block chain chaining;
compressing the two-dimension code link into a short link, and converting the short link into a two-dimension code picture again;
and attaching the converted two-dimension code picture to a two-dimension code picture corresponding storage module reserved by the digital certificate.
8. The method according to claim 4, further comprising, before the step of the business system performing hash algorithm encryption on the asset data and the business data belonging to the core enterprise to obtain the encrypted target data, modifying the asset data and the business data of the core enterprise:
a plurality of sub-enterprise modules are arranged in a business system where a core enterprise is located;
the sub-enterprise module firstly changes the asset data and the service data of the core enterprise and then sends the changed asset data and the changed service data to a service system of the core enterprise;
and after the auditing of the business system of the core enterprise is passed, executing the step that the business system carries out Hash algorithm encryption on the asset data and the business data belonging to the core enterprise to obtain encrypted target data.
CN202211064323.8A 2022-09-01 2022-09-01 System and method for authentication, storage and instant query based on block chain data Pending CN115766052A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211064323.8A CN115766052A (en) 2022-09-01 2022-09-01 System and method for authentication, storage and instant query based on block chain data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211064323.8A CN115766052A (en) 2022-09-01 2022-09-01 System and method for authentication, storage and instant query based on block chain data

Publications (1)

Publication Number Publication Date
CN115766052A true CN115766052A (en) 2023-03-07

Family

ID=85349494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211064323.8A Pending CN115766052A (en) 2022-09-01 2022-09-01 System and method for authentication, storage and instant query based on block chain data

Country Status (1)

Country Link
CN (1) CN115766052A (en)

Similar Documents

Publication Publication Date Title
US11531981B2 (en) Digital contracts in blockchain environments
CN110147994B (en) Instant execution method of block chain based on homomorphic encryption
CN109635585A (en) Method, agent node and the medium of Transaction Information are inquired in block chain network
CN112508578B (en) Resource transfer request verification and sending method and device based on block chain
CA3014385A1 (en) Platform for generating authenticated data objects
US20190139039A1 (en) Electronic payment method and electronic device using id-based public key cryptography
US9705681B2 (en) System and method for encryption
CN111639923B (en) Digital currency transaction accounting method and system based on zero knowledge proof
CN108092778B (en) Method and system for inquiring related account based on digital currency wallet
CN108197214B (en) Method and system for inquiring digital currency transaction information
CN111047321A (en) Service processing method and device, electronic equipment and storage medium
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
US11716200B2 (en) Techniques for performing secure operations
US20190081794A1 (en) Systems and methods for user identity
CN110969531A (en) Borrowing deposit verification and online checking method and system
CN113015991A (en) Secure digital wallet processing system
CN111178840A (en) Service processing method, device, system, electronic equipment and storage medium
WO2022206433A1 (en) Method and apparatus for pre-executing chaincode in fabric blockchain
CN112287311A (en) Service implementation method and device based on block chain
CN115766052A (en) System and method for authentication, storage and instant query based on block chain data
KR102263220B1 (en) E-commerce Payment Method using Block Chain
TWI759838B (en) A graphical code generation method, apparatus, mobile device, service platform, and computer-readable storage medium
CN117061089B (en) Voting management method, device, equipment and storage medium
KR102472427B1 (en) Artificial intelligence-based counterfeit screening inspection and digital certificate issuance method, device and program
US20230055866A1 (en) Device and Method for Digital Utilization of Certificate Data, and Program Therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination