CN108449336A - Data traceability based on block chain and strong encryption method, apparatus, medium and system - Google Patents
Data traceability based on block chain and strong encryption method, apparatus, medium and system Download PDFInfo
- Publication number
- CN108449336A CN108449336A CN201810220660.9A CN201810220660A CN108449336A CN 108449336 A CN108449336 A CN 108449336A CN 201810220660 A CN201810220660 A CN 201810220660A CN 108449336 A CN108449336 A CN 108449336A
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- user
- traceability
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Abstract
The present invention relates to block chain technical applications, the data traceability based on block chain and strong encryption method, apparatus, medium and system;Its method includes obtaining the log-on message of user, generates user authorization code and query key according to log-on message, and be fed back to user;The data upload requests for receiving user, then receive the encrypted data I that the user being verified is uploaded again;Encrypted data I are implemented into data sharing, it records and encrypts all users and encrypted data II are formed to the operation information and attribute information that are encrypted data I, block is added in encrypted data II and block chain is written after being calculated using different common recognition algorithms according to application scenarios demand;User's inquiry request is received, authentication is carried out according to query key, the user to be verified provides block chain query and the permission of download realizes data traceability.The present invention allows user that can benefit from the addition value that shared data is brought, and enjoys complete data-privacy and data safety.
Description
Technical field
The present invention relates to block chain technical applications, be based especially on the data traceability of block chain and force decryption method,
Device, medium and system.
Background technology
Block chain technology is a subversive technology, and either Floor layer Technology or upper layer application are all forefronts at present
Direction of scientific rersearch.By taking finance data as an example, current pain spot is the data that many financing corporations have oneself, but everybody is not
It is ready to share out, although owner both knows about and can obtain individual data isolated island based on a shared big data pond and can not produce
Raw value.There are no a kind of method or systems, it is ensured that data trace and absolute data safety, with
Data could be opened as the computer only authorized, even if hard disk is removed, data are opened in other any unauthorized environment
It is also encrypted mess code, while a side of any shared data can only see and trace the data of oneself when and where by what
People, which authorizes, to open, and cannot see that other people any shared data information, can only see a chain shared by all participants
Item can not be distorted and can trace ensure to record.
Invention content
For the defects in the prior art, the present invention a kind of data traceability based on block chain is provided and force decryption method,
Device, medium and system realize both shared datas, can benefit from the addition value that shared data is brought, and enjoy complete
Data-privacy and data safety.
To achieve the goals above, in a first aspect, the data traceability provided by the invention based on block chain and strong encryption side
Method includes the following steps:
The log-on message for obtaining user generates user authorization code and query key according to the log-on message, and by institute
It states user authorization code and query key feeds back to user;
The data upload requests for receiving user carry out authentication according to the user authorization code and are connect if being verified
Receive the encrypted data I that user uploads;
The encrypted data I are implemented into data sharing, the behaviour for recording and encrypting all users to the encrypted data I
Make information and attribute information forms encrypted data II, and by the addition block of encrypted data II and according to application scenarios demand
Block chain is written after being calculated using different common recognition algorithms;
User's inquiry request is received, carrying out authentication according to the query key carries if being verified for the user
Data traceability is realized for the permission of block chain query and download.
As a kind of preferred embodiment of the application, the encrypted data I for receiving user's upload include:
Receive the encrypted data I that user uploads by that can encrypt client.
As a kind of preferred embodiment of the application, the encrypted data I for receiving user's upload include:
The data that user is uploaded by encrypted tunnel are received, and the data are formed into quilt by processing module strong encryption
Encryption data I.
As a kind of preferred embodiment of the application, the operation information includes:Add operation information, modification operation letter
Breath, delete operation information and/or access operation information.
As a kind of preferred embodiment of the application, the attribute information includes time, IP, user name and/or operation
Type.
As a kind of preferred embodiment of the application, the data traceability based on block chain is also wrapped with decryption method is forced
It includes:
The result of the algorithm iteration of shared information progress will be used to feed back to all users.
As a kind of preferred embodiment of the application, the calculation involved in the algorithm iteration carried out using shared information
Method is determined according to upper layer application and shared purpose.
Second aspect, a kind of data traceability based on block chain provided by the invention and strong encryption device, it is described to be based on area
The data traceability of block chain with strong encryption device includes memory, processor and is stored in the memory and can be at the place
The program run on reason device, the memory and processor are electrically connected, wherein the memory is for storing computer program, institute
It includes program instruction to state computer program, and the processor is configured for calling described program instruction, executes base as mentioned
In the step of data traceability of block chain is with decryption method is forced.
The third aspect, a kind of computer readable storage medium provided by the invention, the computer readable storage medium are deposited
Computer program is contained, the computer program includes program instruction, and described program instruction makes described when being executed by a processor
The step of processor executes the data traceability as mentioned based on block chain and forces decryption method.
Fourth aspect, a kind of data traceability based on block chain provided by the invention and strong encryption system, it is described to be based on area
The data traceability of block chain includes data traceability and strong encryption device and client based on block chain, the base with strong encryption system
Connect with strong encryption device with client communication in the data traceability of block chain, the data traceability based on block chain with force
The step of close device executes the data traceability as mentioned based on block chain and forces decryption method.
The beneficial effects of the invention are as follows:Data traceability provided by the invention based on block chain and strong encryption method, apparatus,
Medium and system realize both shared datas, can benefit from the addition value that shared data is brought, and enjoy complete data
Privacy and data safety, so that any other participates in shared third party can not all see data in the computer of unauthorized,
Even data hard disc, which is directly taken away, can not also see ciphertext data.Even participating in shared user oneself has downloaded oneself
Data after shared, can not also open, because of any calculating for participating in shared user all without can not also access system authorization
Machine.The strong encryption for realizing the data to participating in shared all users, to ensure data-privacy and safety.
Description of the drawings
Fig. 1 is that the present invention is based on the data traceabilities of block chain and the flow chart for forcing decryption method first embodiment;
Fig. 2 is that the present invention is based on the data traceabilities of block chain and the flow chart for forcing decryption method second embodiment;
Fig. 3 is that the present invention is based on the block diagrams of the data traceability of block chain and strong encryption device first embodiment;
Fig. 4 is that the present invention is based on the block diagrams of the data traceability of block chain and strong encryption system first embodiment.
Specific implementation mode
Specific embodiments of the present invention are described more fully below, it should be noted that the embodiments described herein is served only for illustrating
Illustrate, is not intended to restrict the invention.In the following description, in order to provide a thorough understanding of the present invention, a large amount of spies are elaborated
Determine details.It will be apparent, however, to one skilled in the art that:This hair need not be carried out using these specific details
It is bright.In other instances, in order to avoid obscuring the present invention, well known circuit, software or method are not specifically described.
Throughout the specification, meaning is referred to " one embodiment ", " embodiment ", " example " or " example "
It:A particular feature, structure, or characteristic described in conjunction with this embodiment or example is comprised at least one embodiment of the present invention.
Therefore, the phrase " in one embodiment ", " in embodiment ", " example " occurred in each place of the whole instruction
Or " example " is not necessarily all referring to the same embodiment or example.Furthermore, it is possible to it is any it is appropriate combination and or sub-portfolio will be specific
Feature, structure or characteristic combine in one or more embodiments or example.In addition, those of ordinary skill in the art should manage
Solution, diagram is provided to the purpose of explanation provided herein, and diagram is not necessarily drawn to scale.
Data traceability based on block chain and the first embodiment for forcing decryption method:
As shown in Figure 1, the data traceability based on block chain and forcing decryption method, include the following steps:
S101 obtains the log-on message of user, user authorization code and query key is generated according to the log-on message, by institute
It states user and authorizes and feed back to user with query key.
S102 receives the data upload requests of user, and authentication is carried out according to the user authorization code, if verification is logical
It crosses, thens follow the steps S103;If authentication failed, repeatedly step S102.
S103 receives the encrypted data I that user uploads.
The encrypted data I are implemented data sharing, record and encrypt all users to the encrypted data by S104
I operation information and attribute information forms encrypted data II, and by the addition block of encrypted data II and according to applied field
Block chain is written after being calculated using different common recognition algorithms in scape demand.
S105 receives user's inquiry request, and carry out authentication according to the query key executes if being verified
Step S106;If authentication failed, repeatedly step S105.
S106, the permission that block chain query and download are provided for the user realize data traceability.
Specifically, the present invention can benefit from the addition value that shared data brings, but enjoy complete data-privacy and
Data safety, so that any other participates in shared third party can not all see data in the computer of unauthorized, even
Data hard disc, which is directly taken away, can not also see ciphertext data.Even participate in shared user oneself downloaded oneself it is shared after
Data, can not also open, because of any computer for participating in shared user all without can not also access system authorization.It realizes
Strong encryption to the data for participating in shared all users, to ensure data-privacy and safety.
Data traceability based on block chain and the second embodiment for forcing decryption method:
As shown in Fig. 2, the data traceability based on block chain and forcing decryption method, include the following steps:
S201 obtains the log-on message of user, user authorization code and query key is generated according to the log-on message, by institute
It states user and authorizes and feed back to user with query key.
Specifically, the log-on message of user can include but is not limited to the name and address information of user, described address letter
Breath may include:Mail address, or with the unique corresponding number of mail address, can also be mobile communication terminal number, only
It can all should be within protection scope of the present invention with the address information of messaging if having corresponded to.
S202 receives the data upload requests of user, and authentication is carried out according to the user authorization code, if verification is logical
It crosses, thens follow the steps S203;If authentication failed, repeatedly step S202.
Specifically, the data upload requests of user can be received in the present invention by front-end A PI, and utilize the authorization code
Its identity is verified, the safety coefficient for uploading data is improved, can realize the purpose of limitation client uploads malicious data.
S203 receives the encrypted data I that user uploads.
Specifically, the encrypted data I for receiving user's upload include following two modes:
1, the encrypted data I that user uploads by that can encrypt client are received;The client of encrypting refers to specific
Safety coefficient higher encrypt client so that user has been complete encryption number by the data that the client uploads
According to that is, encrypted data I can comprehensively ensure data-privacy and safety in this way.
2, the data that user is uploaded by encrypted tunnel are received, and the data are formed by processing module strong encryption
It is encrypted data I;User can realize that data upload by common client, and data are transmitted by encrypted tunnel to rear
The processing module of platform, the processing module can be selected according to actual conditions the data that different Encryption Algorithm uploads user into
Row encryption, and then form ciphertext.
The encrypted data I are implemented data sharing, record and encrypt all users to the encrypted data by S204
I operation information and attribute information forms encrypted data II, and by the addition block of encrypted data II and according to applied field
Block chain is written after being calculated using different common recognition algorithms in scape demand.
Specifically, realizing data sharing by the way that encrypted data I are put into shared data pond, records and encrypt from the background
All users form encrypted data II to the operation information and attribute information of encryption data I;The operation information includes but not
It is limited to add operation information, modification operation information, delete operation information and access operation information;The attribute information includes but not
It is limited to time, IP, user name and action type.Block is added with payload in the encryption data II again, and according to applied field
Scape demand is calculated using a kind of algorithm of including but not limited to POW, POS, DPOS, dBFT, PBFT, Paxos and Raft, extensively
Broadcast write-in block chain after reaching common understanding.It needs to illustrate, the COMPREHENSIVE CALCULATING result on backstage is purely to be based on encryption data
Interface will not expose any private data or initial data.
S205 will use the result of the algorithm iteration of shared information progress to feed back to all users
Specifically, the specific algorithm of the algorithm iteration carried out using shared information is according to upper layer application and shared mesh
Depending on.For example, can calculate the quantity adduction of shared information, one kind average, that linear transformation etc. is carried out to shared information or
It is a variety of.
S206 receives user's inquiry request, and carry out authentication according to the query key executes if being verified
Step S207;If authentication failed, repeatedly step S206.
Specifically, when the former owner of data carries out wanting to inquire, feedback can be utilized to obtain
Query key carries out identity information verification, ensure that data-privacy and data safety.
S207, the permission that block chain query and download are provided for the user realize data traceability.
Specifically, user obtains the permission of block chain query and download after being verified, user can pass through web
Administration interface checks block chain, checks and trace operation information and the behaviour of the data that remaining all user has shared oneself
The encryption version of oneself shared data is inquired and downloaded to the attribute information of work.It needs to illustrate, the encryption number of download
Even possessing according to original data can not also open, because any user for participating in sharing does not possess authorized computer.
The first embodiment of data traceability and strong encryption device based on block chain:
As shown in figure 3, the data traceability based on block chain includes with strong encryption device:Processor 40, memory 41,
Bus 42, communication interface 43 and it is stored in the program that can be run in the memory and on the processor 40.
Specifically, memory 41 may include high-speed random access memory (RAM:Random Access Memory),
May also further include non-labile memory (non-volatile memory), for example, at least a magnetic disk storage.Pass through
At least one communication interface 43 (can be wired or wireless) is realized between the system network element and at least one other network element
Communication connection can use internet, wide area network, local network, Metropolitan Area Network (MAN) etc..
Bus 42 can be isa bus, pci bus or eisa bus etc..The bus can be divided into address bus, data
Bus, controlling bus etc..Only indicated with a four-headed arrow for ease of indicating, in Fig. 3, it is not intended that an only bus or
A type of bus.
Specifically, memory 41 is for storing program 401, the processor 40 executes institute after receiving and executing instruction
Program 401 is stated, the method performed by device that the stream process that aforementioned any embodiment of the embodiment of the present invention discloses defines can answer
It is realized in processor 40, or by processor 40.
Processor 40 may be a kind of IC chip, the processing capacity with signal.During realization, above-mentioned side
Each step of method can be completed by the integrated logic circuit of the hardware in processor 40 or the instruction of software form.Above-mentioned
Processor 40 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network
Processor (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (DSP), application-specific integrated circuit
(ASIC), ready-made programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor can also be any conventional processor etc..In conjunction with institute of the embodiment of the present invention
The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor
And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only
In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at
Memory 41, processor 40 read the information in memory 41, in conjunction with data traceability of its hardware completion based on block chain and by force
The step of encryption method.
In the present embodiment, the data traceability based on block chain and to force decryption method when executed include following step
Suddenly:
S301 obtains the log-on message of user, user authorization code and query key is generated according to the log-on message, by institute
It states user and authorizes and feed back to user with query key.
Specifically, the log-on message of user can include but is not limited to the name and address information of user, described address letter
Breath may include:Mail address, or with the unique corresponding number of mail address, can also be mobile communication terminal number, only
It can all should be within protection scope of the present invention with the address information of messaging if having corresponded to.
S302 receives the data upload requests of user, and authentication is carried out according to the user authorization code, if verification is logical
It crosses, thens follow the steps S303;If authentication failed, repeatedly step S302.
Specifically, the data upload requests of user can be received in the present invention by front-end A PI, and utilize the authorization code
Its identity is verified, the safety coefficient for uploading data is improved, can realize the purpose of limitation client uploads malicious data.
S303 receives the encrypted data I that user uploads.
Specifically, the encrypted data I for receiving user's upload include following two modes:
1, the encrypted data I that user uploads by that can encrypt client are received;The client of encrypting refers to specific
Safety coefficient higher encrypt client so that user has been complete encryption number by the data that the client uploads
According to that is, encrypted data I can comprehensively ensure data-privacy and safety in this way.
2, the data that user is uploaded by encrypted tunnel are received, and the data are formed by processing module strong encryption
It is encrypted data I;User can realize that data upload by common client, and data are transmitted by encrypted tunnel to rear
The processing module of platform, the processing module can be selected according to actual conditions the data that different Encryption Algorithm uploads user into
Row encryption, and then form ciphertext.
The encrypted data I are implemented data sharing, record and encrypt all users to the encrypted data by S304
I operation information and attribute information forms encrypted data II, and by the addition block of encrypted data II and according to applied field
Block chain is written after being calculated using different common recognition algorithms in scape demand.
Specifically, realizing data sharing by the way that encrypted data I are put into shared data pond, records and encrypt from the background
All users form encrypted data II to the operation information and attribute information of encryption data I;The operation information includes but not
It is limited to add operation information, modification operation information, delete operation information and access operation information;The attribute information includes but not
It is limited to time, IP, user name and action type.Block is added with payload in the encryption data II again, and according to applied field
Scape demand is calculated using a kind of algorithm of including but not limited to POW, POS, DPOS, dBFT, PBFT, Paxos and Raft, extensively
Broadcast write-in block chain after reaching common understanding.It needs to illustrate, the COMPREHENSIVE CALCULATING result on backstage is purely to be based on encryption data
Interface will not expose any private data or initial data.
S305 will use the result of the algorithm iteration of shared information progress to feed back to all users
Specifically, the specific algorithm of the algorithm iteration carried out using shared information is according to upper layer application and shared mesh
Depending on.For example, can calculate the quantity adduction of shared information, one kind average, that linear transformation etc. is carried out to shared information or
It is a variety of.
S306 receives user's inquiry request, and carry out authentication according to the query key executes if being verified
Step S307;If authentication failed, repeatedly step S306.
Specifically, when the former owner of data carries out wanting to inquire, feedback can be utilized to obtain
Query key carries out identity information verification, ensure that data-privacy and data safety.
S307, the permission that block chain query and download are provided for the user realize data traceability.
Specifically, user obtains the permission of block chain query and download after being verified, user can pass through web
Administration interface checks block chain, checks and trace operation information and the behaviour of the data that remaining all user has shared oneself
The encryption version of oneself shared data is inquired and downloaded to the attribute information of work.It needs to illustrate, the encryption number of download
Even possessing according to original data can not also open, because any user for participating in sharing does not possess authorized computer.
The first embodiment of computer readable storage medium:
It includes program instruction that the computer-readable recording medium storage, which has computer program, the computer program, institute
Stating program instruction when being executed by a processor makes data traceability of the processor execution as mentioned based on block chain and forces
The step of decryption method.
Specifically, the computer readable storage medium may include caching (Cache), high-speed random access memory
(RAM), such as common double data rate Synchronous Dynamic Random Access Memory (DDR SDRAM), and may also include non-volatile
Property memory (NVRAM), such as one or more read-only memory (ROM), disk storage equipment, flash memory (Flash) memory
Equipment or other non-volatile solid state memory equipment such as CDs (CD-ROM, DVD-ROM), floppy disk or data tape etc..
In the present embodiment, described program instruction makes the processor execute as based on block chain when being executed by a processor
Data traceability is specifically included with the step of forcing decryption method:
S401 obtains the log-on message of user, user authorization code and query key is generated according to the log-on message, by institute
It states user and authorizes and feed back to user with query key.
Specifically, the log-on message of user can include but is not limited to the name and address information of user, described address letter
Breath may include:Mail address, or with the unique corresponding number of mail address, can also be mobile communication terminal number, only
It can all should be within protection scope of the present invention with the address information of messaging if having corresponded to.
S402 receives the data upload requests of user, and authentication is carried out according to the user authorization code, if verification is logical
It crosses, thens follow the steps S403;If authentication failed, repeatedly step S402.
Specifically, the data upload requests of user can be received in the present invention by front-end A PI, and utilize the authorization code
Its identity is verified, the safety coefficient for uploading data is improved, can realize the purpose of limitation client uploads malicious data.
S403 receives the encrypted data I that user uploads.
Specifically, the encrypted data I for receiving user's upload include following two modes:
1, the encrypted data I that user uploads by that can encrypt client are received;The client of encrypting refers to specific
Safety coefficient higher encrypt client so that user has been complete encryption number by the data that the client uploads
According to that is, encrypted data I can comprehensively ensure data-privacy and safety in this way.
2, the data that user is uploaded by encrypted tunnel are received, and the data are formed by processing module strong encryption
It is encrypted data I;User can realize that data upload by common client, and data are transmitted by encrypted tunnel to rear
The processing module of platform, the processing module can be selected according to actual conditions the data that different Encryption Algorithm uploads user into
Row encryption, and then form ciphertext.
The encrypted data I are implemented data sharing, record and encrypt all users to the encrypted data by S404
I operation information and attribute information forms encrypted data II, and by the addition block of encrypted data II and according to applied field
Block chain is written after being calculated using different common recognition algorithms in scape demand.
Specifically, realizing data sharing by the way that encrypted data I are put into shared data pond, records and encrypt from the background
All users form encrypted data II to the operation information and attribute information of encryption data I;The operation information includes but not
It is limited to add operation information, modification operation information, delete operation information and access operation information;The attribute information includes but not
It is limited to time, IP, user name and action type.Block is added with payload in the encryption data II again, and according to applied field
Scape demand is calculated using a kind of algorithm of including but not limited to POW, POS, DPOS, dBFT, PBFT, Paxos and Raft, extensively
Broadcast write-in block chain after reaching common understanding.It needs to illustrate, the COMPREHENSIVE CALCULATING result on backstage is purely to be based on encryption data
Interface will not expose any private data or initial data.
S405 will use the result of the algorithm iteration of shared information progress to feed back to all users
Specifically, the specific algorithm of the algorithm iteration carried out using shared information is according to upper layer application and shared mesh
Depending on.For example, can calculate the quantity adduction of shared information, one kind average, that linear transformation etc. is carried out to shared information or
It is a variety of.
S406 receives user's inquiry request, and carry out authentication according to the query key executes if being verified
Step S407;If authentication failed, repeatedly step S406.
Specifically, when the former owner of data carries out wanting to inquire, feedback can be utilized to obtain
Query key carries out identity information verification, ensure that data-privacy and data safety.
S407, the permission that block chain query and download are provided for the user realize data traceability.
Specifically, user obtains the permission of block chain query and download after being verified, user can pass through web
Administration interface checks block chain, checks and trace operation information and the behaviour of the data that remaining all user has shared oneself
The encryption version of oneself shared data is inquired and downloaded to the attribute information of work.It needs to illustrate, the encryption number of download
Even possessing according to original data can not also open, because any user for participating in sharing does not possess authorized computer.
The first embodiment of data traceability and strong encryption system based on block chain:
As shown in figure 4, the data traceability based on block chain includes that the data based on block chain chase after with strong encryption system
It traces back and strong encryption device and multiple client, the data traceability based on block chain connects with strong encryption device and client communication
It connects, the data traceability based on block chain and strong encryption device execute data traceability as mentioned based on block chain and force
The step of decryption method.
In the present embodiment, the data traceability based on block chain and to force decryption method when executed include following step
Suddenly:
S501 obtains the log-on message of user, user authorization code and query key is generated according to the log-on message, by institute
It states user and authorizes and feed back to user with query key.
Specifically, the log-on message of user can include but is not limited to the name and address information of user, described address letter
Breath may include:Mail address, or with the unique corresponding number of mail address, can also be mobile communication terminal number, only
It can all should be within protection scope of the present invention with the address information of messaging if having corresponded to.
S502 receives the data upload requests of user, and authentication is carried out according to the user authorization code, if verification is logical
It crosses, thens follow the steps S503;If authentication failed, repeatedly step S502.
Specifically, the data upload requests of user can be received in the present invention by front-end A PI, and utilize the authorization code
Its identity is verified, the safety coefficient for uploading data is improved, can realize the purpose of limitation client uploads malicious data.
S503 receives the encrypted data I that user uploads.
Specifically, the encrypted data I for receiving user's upload include following two modes:
1, the encrypted data I that user uploads by that can encrypt client are received;The client of encrypting refers to specific
Safety coefficient higher encrypt client so that user has been complete encryption number by the data that the client uploads
According to that is, encrypted data I can comprehensively ensure data-privacy and safety in this way.
2, the data that user is uploaded by encrypted tunnel are received, and the data are formed by processing module strong encryption
It is encrypted data I;User can realize that data upload by common client, and data are transmitted by encrypted tunnel to rear
The processing module of platform, the processing module can be selected according to actual conditions the data that different Encryption Algorithm uploads user into
Row encryption, and then form ciphertext.
The encrypted data I are implemented data sharing, record and encrypt all users to the encrypted data by S504
I operation information and attribute information forms encrypted data II, and by the addition block of encrypted data II and according to applied field
Block chain is written after being calculated using different common recognition algorithms in scape demand.
Specifically, realizing data sharing by the way that encrypted data I are put into shared data pond, records and encrypt from the background
All users form encrypted data II to the operation information and attribute information of encryption data I;The operation information includes but not
It is limited to add operation information, modification operation information, delete operation information and access operation information;The attribute information includes but not
It is limited to time, IP, user name and action type.Block is added with payload in the encryption data II again, and according to applied field
Scape demand is calculated using a kind of algorithm of including but not limited to POW, POS, DPOS, dBFT, PBFT, Paxos and Raft, extensively
Broadcast write-in block chain after reaching common understanding.It needs to illustrate, the COMPREHENSIVE CALCULATING result on backstage is purely to be based on encryption data
Interface will not expose any private data or initial data.
S505 will use the result of the algorithm iteration of shared information progress to feed back to all users
Specifically, the specific algorithm of the algorithm iteration carried out using shared information is according to upper layer application and shared mesh
Depending on.For example, can calculate the quantity adduction of shared information, one kind average, that linear transformation etc. is carried out to shared information or
It is a variety of.
S506 receives user's inquiry request, and carry out authentication according to the query key executes if being verified
Step S507;If authentication failed, repeatedly step S506.
Specifically, when the former owner of data carries out wanting to inquire, feedback can be utilized to obtain
Query key carries out identity information verification, ensure that data-privacy and data safety.
S507, the permission that block chain query and download are provided for the user realize data traceability.
Specifically, user obtains the permission of block chain query and download after being verified, user can pass through web
Administration interface checks block chain, checks and trace operation information and the behaviour of the data that remaining all user has shared oneself
The encryption version of oneself shared data is inquired and downloaded to the attribute information of work.It needs to illustrate, the encryption number of download
Even possessing according to original data can not also open, because any user for participating in sharing does not possess authorized computer.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to
So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into
Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme should all cover in the claim of the present invention and the range of specification.
Claims (10)
1. data traceability based on block chain and forcing decryption method, which is characterized in that include the following steps:
The log-on message for obtaining user generates user authorization code and query key according to the log-on message, and by the use
Family authorization code and query key feed back to user;
The data upload requests for receiving user carry out authentication according to the user authorization code and receive use if being verified
The encrypted data I that family uploads;
The encrypted data I are implemented into data sharing, records and encrypts all users and the operation of the encrypted data I is believed
Breath and attribute information form encrypted data II, and block is added in encrypted data II and is used according to application scenarios demand
Block chain is written after calculating in different common recognition algorithms;
User's inquiry request is received, carry out authentication according to the query key provides area if being verified for the user
The permission of block chain query and download realizes data traceability.
2. the data traceability according to claim 1 based on block chain and forcing decryption method, which is characterized in that the reception
User upload encrypted data I include:
Receive the encrypted data I that user uploads by that can encrypt client.
3. data traceability based on block chain according to claims 1 or 2 any one and forcing decryption method, feature exists
In the encrypted data I for receiving user's upload include:
The data that user is uploaded by encrypted tunnel are received, and the data are formed and are encrypted by processing module strong encryption
Data I.
4. the data traceability according to claim 1 based on block chain and forcing decryption method, it is characterised in that:
The operation information includes:Add operation information, modification operation information, delete operation information and/or access operation information.
5. the data traceability according to claim 4 based on block chain and forcing decryption method, it is characterised in that:
The attribute information includes time, IP, user name and/or action type.
6. the data traceability according to claim 1 based on block chain and forcing decryption method, which is characterized in that described to be based on
The data traceability of block chain further includes with decryption method is forced:
The result of the algorithm iteration of shared information progress will be used to feed back to all users.
7. the data traceability according to claim 6 based on block chain and forcing decryption method, it is characterised in that:
Algorithm involved in the algorithm iteration carried out using shared information is determined according to upper layer application and shared purpose.
8. a kind of data traceability based on block chain and strong encryption device, it is characterised in that:The data based on block chain chase after
It traces back with strong encryption device and includes memory, processor and be stored in the memory and can run on the processor
Program, the memory and processor are electrically connected, wherein the memory is for storing computer program, the computer program
Including program instruction, the processor is configured for calling described program instruction, executes such as claim 1-7 any one institute
The data traceability based on block chain stated and the step of force decryption method.
9. a kind of computer readable storage medium, it is characterised in that:The computer-readable recording medium storage has computer journey
Sequence, the computer program include program instruction, and described program instruction makes the processor execute such as when being executed by a processor
Data traceability based on block chain described in claim 1-7 any one and the step of force decryption method.
10. a kind of data traceability based on block chain and strong encryption system, it is characterised in that:The data based on block chain chase after
It includes data traceability and strong encryption device and client based on block chain, the number based on block chain to trace back with strong encryption system
It is connect with strong encryption device with client communication according to retrospect, the data traceability based on block chain executes such as with strong encryption device
Data traceability based on block chain described in claim 1-7 any one and the step of force decryption method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810220660.9A CN108449336A (en) | 2018-03-16 | 2018-03-16 | Data traceability based on block chain and strong encryption method, apparatus, medium and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810220660.9A CN108449336A (en) | 2018-03-16 | 2018-03-16 | Data traceability based on block chain and strong encryption method, apparatus, medium and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108449336A true CN108449336A (en) | 2018-08-24 |
Family
ID=63195660
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810220660.9A Pending CN108449336A (en) | 2018-03-16 | 2018-03-16 | Data traceability based on block chain and strong encryption method, apparatus, medium and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108449336A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109189857A (en) * | 2018-09-17 | 2019-01-11 | 北京京东尚科信息技术有限公司 | Data-sharing systems, method and apparatus based on block chain |
CN109255007A (en) * | 2018-09-28 | 2019-01-22 | 中链科技有限公司 | Geographical space basic data sharing method and device based on block chain |
CN109272152A (en) * | 2018-09-07 | 2019-01-25 | 篱笆墙网络科技有限公司 | Storage method, device, equipment and the storage medium of resume |
CN109859042A (en) * | 2019-01-09 | 2019-06-07 | 广州闪链区块链科技有限公司 | A kind of gold assets redemption method, apparatus and storage medium based on block chain |
CN110263015A (en) * | 2019-05-07 | 2019-09-20 | 深圳壹账通智能科技有限公司 | Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain |
CN111680105A (en) * | 2020-06-15 | 2020-09-18 | 浙江创邻科技有限公司 | Block chain-based distributed relational database management method and system |
CN111711619A (en) * | 2020-06-04 | 2020-09-25 | 江苏荣泽信息科技股份有限公司 | Block chain-based network security connection system |
CN111784337A (en) * | 2019-04-04 | 2020-10-16 | 华控清交信息科技(北京)有限公司 | Authority verification method and system |
CN112184426A (en) * | 2020-10-12 | 2021-01-05 | 深圳壹账通智能科技有限公司 | Data sharing method, system, server and computer readable storage medium |
CN112418874A (en) * | 2020-06-10 | 2021-02-26 | 上海哔哩哔哩科技有限公司 | Data tracing method and device and computer equipment |
CN113194069A (en) * | 2021-03-30 | 2021-07-30 | 深圳博瑞天下科技有限公司 | Communication tracing method, communication tracing device and medium based on block chain |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101136777A (en) * | 2007-10-18 | 2008-03-05 | 网经科技(苏州)有限公司 | Security management method of dual-encryption channel cooperation in network management system |
CN102271330A (en) * | 2010-06-04 | 2011-12-07 | 希姆通信息技术(上海)有限公司 | Terminal, network server and method for communication between terminal and network server |
CN105681279A (en) * | 2015-12-28 | 2016-06-15 | 上海瀚银信息技术有限公司 | Application data transmission method and mobile terminal |
US20170046526A1 (en) * | 2015-08-13 | 2017-02-16 | TD Bank Group | System and Method for Implementing Hybrid Public-Private Block-Chain Ledgers |
CN106960166A (en) * | 2017-03-14 | 2017-07-18 | 清华大学 | A kind of smart jack management system and its method based on distributed general ledger technology |
CN107103252A (en) * | 2017-04-27 | 2017-08-29 | 电子科技大学 | Data access control method based on block chain |
CN107196934A (en) * | 2017-05-18 | 2017-09-22 | 电子科技大学 | A kind of cloud data managing method based on block chain |
CN107231351A (en) * | 2017-05-25 | 2017-10-03 | 远光软件股份有限公司 | The management method and relevant device of electronic certificate |
-
2018
- 2018-03-16 CN CN201810220660.9A patent/CN108449336A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101136777A (en) * | 2007-10-18 | 2008-03-05 | 网经科技(苏州)有限公司 | Security management method of dual-encryption channel cooperation in network management system |
CN102271330A (en) * | 2010-06-04 | 2011-12-07 | 希姆通信息技术(上海)有限公司 | Terminal, network server and method for communication between terminal and network server |
US20170046526A1 (en) * | 2015-08-13 | 2017-02-16 | TD Bank Group | System and Method for Implementing Hybrid Public-Private Block-Chain Ledgers |
CN105681279A (en) * | 2015-12-28 | 2016-06-15 | 上海瀚银信息技术有限公司 | Application data transmission method and mobile terminal |
CN106960166A (en) * | 2017-03-14 | 2017-07-18 | 清华大学 | A kind of smart jack management system and its method based on distributed general ledger technology |
CN107103252A (en) * | 2017-04-27 | 2017-08-29 | 电子科技大学 | Data access control method based on block chain |
CN107196934A (en) * | 2017-05-18 | 2017-09-22 | 电子科技大学 | A kind of cloud data managing method based on block chain |
CN107231351A (en) * | 2017-05-25 | 2017-10-03 | 远光软件股份有限公司 | The management method and relevant device of electronic certificate |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109272152A (en) * | 2018-09-07 | 2019-01-25 | 篱笆墙网络科技有限公司 | Storage method, device, equipment and the storage medium of resume |
CN109189857B (en) * | 2018-09-17 | 2021-03-30 | 北京京东尚科信息技术有限公司 | Data sharing system, method and device based on block chain |
CN109189857A (en) * | 2018-09-17 | 2019-01-11 | 北京京东尚科信息技术有限公司 | Data-sharing systems, method and apparatus based on block chain |
CN109255007A (en) * | 2018-09-28 | 2019-01-22 | 中链科技有限公司 | Geographical space basic data sharing method and device based on block chain |
CN109859042A (en) * | 2019-01-09 | 2019-06-07 | 广州闪链区块链科技有限公司 | A kind of gold assets redemption method, apparatus and storage medium based on block chain |
CN111784337B (en) * | 2019-04-04 | 2023-08-22 | 华控清交信息科技(北京)有限公司 | Authority verification method and system |
CN111784337A (en) * | 2019-04-04 | 2020-10-16 | 华控清交信息科技(北京)有限公司 | Authority verification method and system |
CN110263015A (en) * | 2019-05-07 | 2019-09-20 | 深圳壹账通智能科技有限公司 | Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain |
CN111711619A (en) * | 2020-06-04 | 2020-09-25 | 江苏荣泽信息科技股份有限公司 | Block chain-based network security connection system |
CN112418874A (en) * | 2020-06-10 | 2021-02-26 | 上海哔哩哔哩科技有限公司 | Data tracing method and device and computer equipment |
CN111680105A (en) * | 2020-06-15 | 2020-09-18 | 浙江创邻科技有限公司 | Block chain-based distributed relational database management method and system |
CN111680105B (en) * | 2020-06-15 | 2023-09-22 | 浙江创邻科技有限公司 | Management method and system of distributed relational database based on block chain |
CN112184426A (en) * | 2020-10-12 | 2021-01-05 | 深圳壹账通智能科技有限公司 | Data sharing method, system, server and computer readable storage medium |
CN113194069A (en) * | 2021-03-30 | 2021-07-30 | 深圳博瑞天下科技有限公司 | Communication tracing method, communication tracing device and medium based on block chain |
CN113194069B (en) * | 2021-03-30 | 2022-08-26 | 深圳博瑞天下科技有限公司 | Communication tracing method, communication tracing device and medium based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108449336A (en) | Data traceability based on block chain and strong encryption method, apparatus, medium and system | |
US10567168B2 (en) | Blockchain transaction privacy enhancement through broadcast encryption | |
Florian et al. | Erasing data from blockchain nodes | |
CN110290094A (en) | A kind of control method and device of data access authority | |
WO2018203186A1 (en) | Secure dynamic threshold signature scheme employing trusted hardware | |
CN110300973A (en) | The foundation of alliance's block chain network | |
CN105408913A (en) | Processing data privately in the cloud | |
JP6532601B2 (en) | System and method for secure digital sharing based on exchange between systems of two layer dual encryption digital information key | |
US20140362992A1 (en) | Systems and Methods for Conducting Secure Wired and Wireless Networked Telephony | |
US10609010B2 (en) | System, methods and software application for sending secured messages on decentralized networks | |
EP2103032B1 (en) | Privacy enhanced comparison of data sets | |
CN110599163B (en) | Transaction record outsourcing method facing block chain transaction supervision | |
CN108234443A (en) | Contracting method, system and computer readable storage medium | |
US20200410136A1 (en) | Stacked Encryption | |
CN109299619B (en) | Data query method, computing device and system | |
CN110417547B (en) | Secret key updating method and system for secret communication based on certificateless cryptography | |
CN108259171A (en) | The guard method of Shader files and device | |
US11784819B2 (en) | Dynamic segmentation of network traffic by use of pre-shared keys | |
CN109040134A (en) | A kind of design method and relevant apparatus of information encryption | |
US11095620B1 (en) | Secure method, system, and computer program product for exchange of data | |
CN114553593A (en) | Multi-party secure computation privacy intersection method, device, equipment and storage medium | |
CN114297304A (en) | Product information block chain transaction storage method, server and readable medium | |
JP2019154055A5 (en) | ||
CN114844621A (en) | Multi-user privacy protection machine learning method and device based on multi-key fully homomorphic encryption | |
Uthayashangar et al. | Decentralized blockchain based system for secure data storage in cloud |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180824 |
|
RJ01 | Rejection of invention patent application after publication |