CN108449336A - Data traceability based on block chain and strong encryption method, apparatus, medium and system - Google Patents

Data traceability based on block chain and strong encryption method, apparatus, medium and system Download PDF

Info

Publication number
CN108449336A
CN108449336A CN201810220660.9A CN201810220660A CN108449336A CN 108449336 A CN108449336 A CN 108449336A CN 201810220660 A CN201810220660 A CN 201810220660A CN 108449336 A CN108449336 A CN 108449336A
Authority
CN
China
Prior art keywords
data
block chain
user
traceability
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810220660.9A
Other languages
Chinese (zh)
Inventor
张晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Chuang Chuang Technology Co Ltd
Original Assignee
Zhejiang Chuang Chuang Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Chuang Chuang Technology Co Ltd filed Critical Zhejiang Chuang Chuang Technology Co Ltd
Priority to CN201810220660.9A priority Critical patent/CN108449336A/en
Publication of CN108449336A publication Critical patent/CN108449336A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The present invention relates to block chain technical applications, the data traceability based on block chain and strong encryption method, apparatus, medium and system;Its method includes obtaining the log-on message of user, generates user authorization code and query key according to log-on message, and be fed back to user;The data upload requests for receiving user, then receive the encrypted data I that the user being verified is uploaded again;Encrypted data I are implemented into data sharing, it records and encrypts all users and encrypted data II are formed to the operation information and attribute information that are encrypted data I, block is added in encrypted data II and block chain is written after being calculated using different common recognition algorithms according to application scenarios demand;User's inquiry request is received, authentication is carried out according to query key, the user to be verified provides block chain query and the permission of download realizes data traceability.The present invention allows user that can benefit from the addition value that shared data is brought, and enjoys complete data-privacy and data safety.

Description

Data traceability based on block chain and strong encryption method, apparatus, medium and system
Technical field
The present invention relates to block chain technical applications, be based especially on the data traceability of block chain and force decryption method, Device, medium and system.
Background technology
Block chain technology is a subversive technology, and either Floor layer Technology or upper layer application are all forefronts at present Direction of scientific rersearch.By taking finance data as an example, current pain spot is the data that many financing corporations have oneself, but everybody is not It is ready to share out, although owner both knows about and can obtain individual data isolated island based on a shared big data pond and can not produce Raw value.There are no a kind of method or systems, it is ensured that data trace and absolute data safety, with Data could be opened as the computer only authorized, even if hard disk is removed, data are opened in other any unauthorized environment It is also encrypted mess code, while a side of any shared data can only see and trace the data of oneself when and where by what People, which authorizes, to open, and cannot see that other people any shared data information, can only see a chain shared by all participants Item can not be distorted and can trace ensure to record.
Invention content
For the defects in the prior art, the present invention a kind of data traceability based on block chain is provided and force decryption method, Device, medium and system realize both shared datas, can benefit from the addition value that shared data is brought, and enjoy complete Data-privacy and data safety.
To achieve the goals above, in a first aspect, the data traceability provided by the invention based on block chain and strong encryption side Method includes the following steps:
The log-on message for obtaining user generates user authorization code and query key according to the log-on message, and by institute It states user authorization code and query key feeds back to user;
The data upload requests for receiving user carry out authentication according to the user authorization code and are connect if being verified Receive the encrypted data I that user uploads;
The encrypted data I are implemented into data sharing, the behaviour for recording and encrypting all users to the encrypted data I Make information and attribute information forms encrypted data II, and by the addition block of encrypted data II and according to application scenarios demand Block chain is written after being calculated using different common recognition algorithms;
User's inquiry request is received, carrying out authentication according to the query key carries if being verified for the user Data traceability is realized for the permission of block chain query and download.
As a kind of preferred embodiment of the application, the encrypted data I for receiving user's upload include:
Receive the encrypted data I that user uploads by that can encrypt client.
As a kind of preferred embodiment of the application, the encrypted data I for receiving user's upload include:
The data that user is uploaded by encrypted tunnel are received, and the data are formed into quilt by processing module strong encryption Encryption data I.
As a kind of preferred embodiment of the application, the operation information includes:Add operation information, modification operation letter Breath, delete operation information and/or access operation information.
As a kind of preferred embodiment of the application, the attribute information includes time, IP, user name and/or operation Type.
As a kind of preferred embodiment of the application, the data traceability based on block chain is also wrapped with decryption method is forced It includes:
The result of the algorithm iteration of shared information progress will be used to feed back to all users.
As a kind of preferred embodiment of the application, the calculation involved in the algorithm iteration carried out using shared information Method is determined according to upper layer application and shared purpose.
Second aspect, a kind of data traceability based on block chain provided by the invention and strong encryption device, it is described to be based on area The data traceability of block chain with strong encryption device includes memory, processor and is stored in the memory and can be at the place The program run on reason device, the memory and processor are electrically connected, wherein the memory is for storing computer program, institute It includes program instruction to state computer program, and the processor is configured for calling described program instruction, executes base as mentioned In the step of data traceability of block chain is with decryption method is forced.
The third aspect, a kind of computer readable storage medium provided by the invention, the computer readable storage medium are deposited Computer program is contained, the computer program includes program instruction, and described program instruction makes described when being executed by a processor The step of processor executes the data traceability as mentioned based on block chain and forces decryption method.
Fourth aspect, a kind of data traceability based on block chain provided by the invention and strong encryption system, it is described to be based on area The data traceability of block chain includes data traceability and strong encryption device and client based on block chain, the base with strong encryption system Connect with strong encryption device with client communication in the data traceability of block chain, the data traceability based on block chain with force The step of close device executes the data traceability as mentioned based on block chain and forces decryption method.
The beneficial effects of the invention are as follows:Data traceability provided by the invention based on block chain and strong encryption method, apparatus, Medium and system realize both shared datas, can benefit from the addition value that shared data is brought, and enjoy complete data Privacy and data safety, so that any other participates in shared third party can not all see data in the computer of unauthorized, Even data hard disc, which is directly taken away, can not also see ciphertext data.Even participating in shared user oneself has downloaded oneself Data after shared, can not also open, because of any calculating for participating in shared user all without can not also access system authorization Machine.The strong encryption for realizing the data to participating in shared all users, to ensure data-privacy and safety.
Description of the drawings
Fig. 1 is that the present invention is based on the data traceabilities of block chain and the flow chart for forcing decryption method first embodiment;
Fig. 2 is that the present invention is based on the data traceabilities of block chain and the flow chart for forcing decryption method second embodiment;
Fig. 3 is that the present invention is based on the block diagrams of the data traceability of block chain and strong encryption device first embodiment;
Fig. 4 is that the present invention is based on the block diagrams of the data traceability of block chain and strong encryption system first embodiment.
Specific implementation mode
Specific embodiments of the present invention are described more fully below, it should be noted that the embodiments described herein is served only for illustrating Illustrate, is not intended to restrict the invention.In the following description, in order to provide a thorough understanding of the present invention, a large amount of spies are elaborated Determine details.It will be apparent, however, to one skilled in the art that:This hair need not be carried out using these specific details It is bright.In other instances, in order to avoid obscuring the present invention, well known circuit, software or method are not specifically described.
Throughout the specification, meaning is referred to " one embodiment ", " embodiment ", " example " or " example " It:A particular feature, structure, or characteristic described in conjunction with this embodiment or example is comprised at least one embodiment of the present invention. Therefore, the phrase " in one embodiment ", " in embodiment ", " example " occurred in each place of the whole instruction Or " example " is not necessarily all referring to the same embodiment or example.Furthermore, it is possible to it is any it is appropriate combination and or sub-portfolio will be specific Feature, structure or characteristic combine in one or more embodiments or example.In addition, those of ordinary skill in the art should manage Solution, diagram is provided to the purpose of explanation provided herein, and diagram is not necessarily drawn to scale.
Data traceability based on block chain and the first embodiment for forcing decryption method:
As shown in Figure 1, the data traceability based on block chain and forcing decryption method, include the following steps:
S101 obtains the log-on message of user, user authorization code and query key is generated according to the log-on message, by institute It states user and authorizes and feed back to user with query key.
S102 receives the data upload requests of user, and authentication is carried out according to the user authorization code, if verification is logical It crosses, thens follow the steps S103;If authentication failed, repeatedly step S102.
S103 receives the encrypted data I that user uploads.
The encrypted data I are implemented data sharing, record and encrypt all users to the encrypted data by S104 I operation information and attribute information forms encrypted data II, and by the addition block of encrypted data II and according to applied field Block chain is written after being calculated using different common recognition algorithms in scape demand.
S105 receives user's inquiry request, and carry out authentication according to the query key executes if being verified Step S106;If authentication failed, repeatedly step S105.
S106, the permission that block chain query and download are provided for the user realize data traceability.
Specifically, the present invention can benefit from the addition value that shared data brings, but enjoy complete data-privacy and Data safety, so that any other participates in shared third party can not all see data in the computer of unauthorized, even Data hard disc, which is directly taken away, can not also see ciphertext data.Even participate in shared user oneself downloaded oneself it is shared after Data, can not also open, because of any computer for participating in shared user all without can not also access system authorization.It realizes Strong encryption to the data for participating in shared all users, to ensure data-privacy and safety.
Data traceability based on block chain and the second embodiment for forcing decryption method:
As shown in Fig. 2, the data traceability based on block chain and forcing decryption method, include the following steps:
S201 obtains the log-on message of user, user authorization code and query key is generated according to the log-on message, by institute It states user and authorizes and feed back to user with query key.
Specifically, the log-on message of user can include but is not limited to the name and address information of user, described address letter Breath may include:Mail address, or with the unique corresponding number of mail address, can also be mobile communication terminal number, only It can all should be within protection scope of the present invention with the address information of messaging if having corresponded to.
S202 receives the data upload requests of user, and authentication is carried out according to the user authorization code, if verification is logical It crosses, thens follow the steps S203;If authentication failed, repeatedly step S202.
Specifically, the data upload requests of user can be received in the present invention by front-end A PI, and utilize the authorization code Its identity is verified, the safety coefficient for uploading data is improved, can realize the purpose of limitation client uploads malicious data.
S203 receives the encrypted data I that user uploads.
Specifically, the encrypted data I for receiving user's upload include following two modes:
1, the encrypted data I that user uploads by that can encrypt client are received;The client of encrypting refers to specific Safety coefficient higher encrypt client so that user has been complete encryption number by the data that the client uploads According to that is, encrypted data I can comprehensively ensure data-privacy and safety in this way.
2, the data that user is uploaded by encrypted tunnel are received, and the data are formed by processing module strong encryption It is encrypted data I;User can realize that data upload by common client, and data are transmitted by encrypted tunnel to rear The processing module of platform, the processing module can be selected according to actual conditions the data that different Encryption Algorithm uploads user into Row encryption, and then form ciphertext.
The encrypted data I are implemented data sharing, record and encrypt all users to the encrypted data by S204 I operation information and attribute information forms encrypted data II, and by the addition block of encrypted data II and according to applied field Block chain is written after being calculated using different common recognition algorithms in scape demand.
Specifically, realizing data sharing by the way that encrypted data I are put into shared data pond, records and encrypt from the background All users form encrypted data II to the operation information and attribute information of encryption data I;The operation information includes but not It is limited to add operation information, modification operation information, delete operation information and access operation information;The attribute information includes but not It is limited to time, IP, user name and action type.Block is added with payload in the encryption data II again, and according to applied field Scape demand is calculated using a kind of algorithm of including but not limited to POW, POS, DPOS, dBFT, PBFT, Paxos and Raft, extensively Broadcast write-in block chain after reaching common understanding.It needs to illustrate, the COMPREHENSIVE CALCULATING result on backstage is purely to be based on encryption data Interface will not expose any private data or initial data.
S205 will use the result of the algorithm iteration of shared information progress to feed back to all users
Specifically, the specific algorithm of the algorithm iteration carried out using shared information is according to upper layer application and shared mesh Depending on.For example, can calculate the quantity adduction of shared information, one kind average, that linear transformation etc. is carried out to shared information or It is a variety of.
S206 receives user's inquiry request, and carry out authentication according to the query key executes if being verified Step S207;If authentication failed, repeatedly step S206.
Specifically, when the former owner of data carries out wanting to inquire, feedback can be utilized to obtain Query key carries out identity information verification, ensure that data-privacy and data safety.
S207, the permission that block chain query and download are provided for the user realize data traceability.
Specifically, user obtains the permission of block chain query and download after being verified, user can pass through web Administration interface checks block chain, checks and trace operation information and the behaviour of the data that remaining all user has shared oneself The encryption version of oneself shared data is inquired and downloaded to the attribute information of work.It needs to illustrate, the encryption number of download Even possessing according to original data can not also open, because any user for participating in sharing does not possess authorized computer.
The first embodiment of data traceability and strong encryption device based on block chain:
As shown in figure 3, the data traceability based on block chain includes with strong encryption device:Processor 40, memory 41, Bus 42, communication interface 43 and it is stored in the program that can be run in the memory and on the processor 40.
Specifically, memory 41 may include high-speed random access memory (RAM:Random Access Memory), May also further include non-labile memory (non-volatile memory), for example, at least a magnetic disk storage.Pass through At least one communication interface 43 (can be wired or wireless) is realized between the system network element and at least one other network element Communication connection can use internet, wide area network, local network, Metropolitan Area Network (MAN) etc..
Bus 42 can be isa bus, pci bus or eisa bus etc..The bus can be divided into address bus, data Bus, controlling bus etc..Only indicated with a four-headed arrow for ease of indicating, in Fig. 3, it is not intended that an only bus or A type of bus.
Specifically, memory 41 is for storing program 401, the processor 40 executes institute after receiving and executing instruction Program 401 is stated, the method performed by device that the stream process that aforementioned any embodiment of the embodiment of the present invention discloses defines can answer It is realized in processor 40, or by processor 40.
Processor 40 may be a kind of IC chip, the processing capacity with signal.During realization, above-mentioned side Each step of method can be completed by the integrated logic circuit of the hardware in processor 40 or the instruction of software form.Above-mentioned Processor 40 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network Processor (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (DSP), application-specific integrated circuit (ASIC), ready-made programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor can also be any conventional processor etc..In conjunction with institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at Memory 41, processor 40 read the information in memory 41, in conjunction with data traceability of its hardware completion based on block chain and by force The step of encryption method.
In the present embodiment, the data traceability based on block chain and to force decryption method when executed include following step Suddenly:
S301 obtains the log-on message of user, user authorization code and query key is generated according to the log-on message, by institute It states user and authorizes and feed back to user with query key.
Specifically, the log-on message of user can include but is not limited to the name and address information of user, described address letter Breath may include:Mail address, or with the unique corresponding number of mail address, can also be mobile communication terminal number, only It can all should be within protection scope of the present invention with the address information of messaging if having corresponded to.
S302 receives the data upload requests of user, and authentication is carried out according to the user authorization code, if verification is logical It crosses, thens follow the steps S303;If authentication failed, repeatedly step S302.
Specifically, the data upload requests of user can be received in the present invention by front-end A PI, and utilize the authorization code Its identity is verified, the safety coefficient for uploading data is improved, can realize the purpose of limitation client uploads malicious data.
S303 receives the encrypted data I that user uploads.
Specifically, the encrypted data I for receiving user's upload include following two modes:
1, the encrypted data I that user uploads by that can encrypt client are received;The client of encrypting refers to specific Safety coefficient higher encrypt client so that user has been complete encryption number by the data that the client uploads According to that is, encrypted data I can comprehensively ensure data-privacy and safety in this way.
2, the data that user is uploaded by encrypted tunnel are received, and the data are formed by processing module strong encryption It is encrypted data I;User can realize that data upload by common client, and data are transmitted by encrypted tunnel to rear The processing module of platform, the processing module can be selected according to actual conditions the data that different Encryption Algorithm uploads user into Row encryption, and then form ciphertext.
The encrypted data I are implemented data sharing, record and encrypt all users to the encrypted data by S304 I operation information and attribute information forms encrypted data II, and by the addition block of encrypted data II and according to applied field Block chain is written after being calculated using different common recognition algorithms in scape demand.
Specifically, realizing data sharing by the way that encrypted data I are put into shared data pond, records and encrypt from the background All users form encrypted data II to the operation information and attribute information of encryption data I;The operation information includes but not It is limited to add operation information, modification operation information, delete operation information and access operation information;The attribute information includes but not It is limited to time, IP, user name and action type.Block is added with payload in the encryption data II again, and according to applied field Scape demand is calculated using a kind of algorithm of including but not limited to POW, POS, DPOS, dBFT, PBFT, Paxos and Raft, extensively Broadcast write-in block chain after reaching common understanding.It needs to illustrate, the COMPREHENSIVE CALCULATING result on backstage is purely to be based on encryption data Interface will not expose any private data or initial data.
S305 will use the result of the algorithm iteration of shared information progress to feed back to all users
Specifically, the specific algorithm of the algorithm iteration carried out using shared information is according to upper layer application and shared mesh Depending on.For example, can calculate the quantity adduction of shared information, one kind average, that linear transformation etc. is carried out to shared information or It is a variety of.
S306 receives user's inquiry request, and carry out authentication according to the query key executes if being verified Step S307;If authentication failed, repeatedly step S306.
Specifically, when the former owner of data carries out wanting to inquire, feedback can be utilized to obtain Query key carries out identity information verification, ensure that data-privacy and data safety.
S307, the permission that block chain query and download are provided for the user realize data traceability.
Specifically, user obtains the permission of block chain query and download after being verified, user can pass through web Administration interface checks block chain, checks and trace operation information and the behaviour of the data that remaining all user has shared oneself The encryption version of oneself shared data is inquired and downloaded to the attribute information of work.It needs to illustrate, the encryption number of download Even possessing according to original data can not also open, because any user for participating in sharing does not possess authorized computer.
The first embodiment of computer readable storage medium:
It includes program instruction that the computer-readable recording medium storage, which has computer program, the computer program, institute Stating program instruction when being executed by a processor makes data traceability of the processor execution as mentioned based on block chain and forces The step of decryption method.
Specifically, the computer readable storage medium may include caching (Cache), high-speed random access memory (RAM), such as common double data rate Synchronous Dynamic Random Access Memory (DDR SDRAM), and may also include non-volatile Property memory (NVRAM), such as one or more read-only memory (ROM), disk storage equipment, flash memory (Flash) memory Equipment or other non-volatile solid state memory equipment such as CDs (CD-ROM, DVD-ROM), floppy disk or data tape etc..
In the present embodiment, described program instruction makes the processor execute as based on block chain when being executed by a processor Data traceability is specifically included with the step of forcing decryption method:
S401 obtains the log-on message of user, user authorization code and query key is generated according to the log-on message, by institute It states user and authorizes and feed back to user with query key.
Specifically, the log-on message of user can include but is not limited to the name and address information of user, described address letter Breath may include:Mail address, or with the unique corresponding number of mail address, can also be mobile communication terminal number, only It can all should be within protection scope of the present invention with the address information of messaging if having corresponded to.
S402 receives the data upload requests of user, and authentication is carried out according to the user authorization code, if verification is logical It crosses, thens follow the steps S403;If authentication failed, repeatedly step S402.
Specifically, the data upload requests of user can be received in the present invention by front-end A PI, and utilize the authorization code Its identity is verified, the safety coefficient for uploading data is improved, can realize the purpose of limitation client uploads malicious data.
S403 receives the encrypted data I that user uploads.
Specifically, the encrypted data I for receiving user's upload include following two modes:
1, the encrypted data I that user uploads by that can encrypt client are received;The client of encrypting refers to specific Safety coefficient higher encrypt client so that user has been complete encryption number by the data that the client uploads According to that is, encrypted data I can comprehensively ensure data-privacy and safety in this way.
2, the data that user is uploaded by encrypted tunnel are received, and the data are formed by processing module strong encryption It is encrypted data I;User can realize that data upload by common client, and data are transmitted by encrypted tunnel to rear The processing module of platform, the processing module can be selected according to actual conditions the data that different Encryption Algorithm uploads user into Row encryption, and then form ciphertext.
The encrypted data I are implemented data sharing, record and encrypt all users to the encrypted data by S404 I operation information and attribute information forms encrypted data II, and by the addition block of encrypted data II and according to applied field Block chain is written after being calculated using different common recognition algorithms in scape demand.
Specifically, realizing data sharing by the way that encrypted data I are put into shared data pond, records and encrypt from the background All users form encrypted data II to the operation information and attribute information of encryption data I;The operation information includes but not It is limited to add operation information, modification operation information, delete operation information and access operation information;The attribute information includes but not It is limited to time, IP, user name and action type.Block is added with payload in the encryption data II again, and according to applied field Scape demand is calculated using a kind of algorithm of including but not limited to POW, POS, DPOS, dBFT, PBFT, Paxos and Raft, extensively Broadcast write-in block chain after reaching common understanding.It needs to illustrate, the COMPREHENSIVE CALCULATING result on backstage is purely to be based on encryption data Interface will not expose any private data or initial data.
S405 will use the result of the algorithm iteration of shared information progress to feed back to all users
Specifically, the specific algorithm of the algorithm iteration carried out using shared information is according to upper layer application and shared mesh Depending on.For example, can calculate the quantity adduction of shared information, one kind average, that linear transformation etc. is carried out to shared information or It is a variety of.
S406 receives user's inquiry request, and carry out authentication according to the query key executes if being verified Step S407;If authentication failed, repeatedly step S406.
Specifically, when the former owner of data carries out wanting to inquire, feedback can be utilized to obtain Query key carries out identity information verification, ensure that data-privacy and data safety.
S407, the permission that block chain query and download are provided for the user realize data traceability.
Specifically, user obtains the permission of block chain query and download after being verified, user can pass through web Administration interface checks block chain, checks and trace operation information and the behaviour of the data that remaining all user has shared oneself The encryption version of oneself shared data is inquired and downloaded to the attribute information of work.It needs to illustrate, the encryption number of download Even possessing according to original data can not also open, because any user for participating in sharing does not possess authorized computer.
The first embodiment of data traceability and strong encryption system based on block chain:
As shown in figure 4, the data traceability based on block chain includes that the data based on block chain chase after with strong encryption system It traces back and strong encryption device and multiple client, the data traceability based on block chain connects with strong encryption device and client communication It connects, the data traceability based on block chain and strong encryption device execute data traceability as mentioned based on block chain and force The step of decryption method.
In the present embodiment, the data traceability based on block chain and to force decryption method when executed include following step Suddenly:
S501 obtains the log-on message of user, user authorization code and query key is generated according to the log-on message, by institute It states user and authorizes and feed back to user with query key.
Specifically, the log-on message of user can include but is not limited to the name and address information of user, described address letter Breath may include:Mail address, or with the unique corresponding number of mail address, can also be mobile communication terminal number, only It can all should be within protection scope of the present invention with the address information of messaging if having corresponded to.
S502 receives the data upload requests of user, and authentication is carried out according to the user authorization code, if verification is logical It crosses, thens follow the steps S503;If authentication failed, repeatedly step S502.
Specifically, the data upload requests of user can be received in the present invention by front-end A PI, and utilize the authorization code Its identity is verified, the safety coefficient for uploading data is improved, can realize the purpose of limitation client uploads malicious data.
S503 receives the encrypted data I that user uploads.
Specifically, the encrypted data I for receiving user's upload include following two modes:
1, the encrypted data I that user uploads by that can encrypt client are received;The client of encrypting refers to specific Safety coefficient higher encrypt client so that user has been complete encryption number by the data that the client uploads According to that is, encrypted data I can comprehensively ensure data-privacy and safety in this way.
2, the data that user is uploaded by encrypted tunnel are received, and the data are formed by processing module strong encryption It is encrypted data I;User can realize that data upload by common client, and data are transmitted by encrypted tunnel to rear The processing module of platform, the processing module can be selected according to actual conditions the data that different Encryption Algorithm uploads user into Row encryption, and then form ciphertext.
The encrypted data I are implemented data sharing, record and encrypt all users to the encrypted data by S504 I operation information and attribute information forms encrypted data II, and by the addition block of encrypted data II and according to applied field Block chain is written after being calculated using different common recognition algorithms in scape demand.
Specifically, realizing data sharing by the way that encrypted data I are put into shared data pond, records and encrypt from the background All users form encrypted data II to the operation information and attribute information of encryption data I;The operation information includes but not It is limited to add operation information, modification operation information, delete operation information and access operation information;The attribute information includes but not It is limited to time, IP, user name and action type.Block is added with payload in the encryption data II again, and according to applied field Scape demand is calculated using a kind of algorithm of including but not limited to POW, POS, DPOS, dBFT, PBFT, Paxos and Raft, extensively Broadcast write-in block chain after reaching common understanding.It needs to illustrate, the COMPREHENSIVE CALCULATING result on backstage is purely to be based on encryption data Interface will not expose any private data or initial data.
S505 will use the result of the algorithm iteration of shared information progress to feed back to all users
Specifically, the specific algorithm of the algorithm iteration carried out using shared information is according to upper layer application and shared mesh Depending on.For example, can calculate the quantity adduction of shared information, one kind average, that linear transformation etc. is carried out to shared information or It is a variety of.
S506 receives user's inquiry request, and carry out authentication according to the query key executes if being verified Step S507;If authentication failed, repeatedly step S506.
Specifically, when the former owner of data carries out wanting to inquire, feedback can be utilized to obtain Query key carries out identity information verification, ensure that data-privacy and data safety.
S507, the permission that block chain query and download are provided for the user realize data traceability.
Specifically, user obtains the permission of block chain query and download after being verified, user can pass through web Administration interface checks block chain, checks and trace operation information and the behaviour of the data that remaining all user has shared oneself The encryption version of oneself shared data is inquired and downloaded to the attribute information of work.It needs to illustrate, the encryption number of download Even possessing according to original data can not also open, because any user for participating in sharing does not possess authorized computer.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme should all cover in the claim of the present invention and the range of specification.

Claims (10)

1. data traceability based on block chain and forcing decryption method, which is characterized in that include the following steps:
The log-on message for obtaining user generates user authorization code and query key according to the log-on message, and by the use Family authorization code and query key feed back to user;
The data upload requests for receiving user carry out authentication according to the user authorization code and receive use if being verified The encrypted data I that family uploads;
The encrypted data I are implemented into data sharing, records and encrypts all users and the operation of the encrypted data I is believed Breath and attribute information form encrypted data II, and block is added in encrypted data II and is used according to application scenarios demand Block chain is written after calculating in different common recognition algorithms;
User's inquiry request is received, carry out authentication according to the query key provides area if being verified for the user The permission of block chain query and download realizes data traceability.
2. the data traceability according to claim 1 based on block chain and forcing decryption method, which is characterized in that the reception User upload encrypted data I include:
Receive the encrypted data I that user uploads by that can encrypt client.
3. data traceability based on block chain according to claims 1 or 2 any one and forcing decryption method, feature exists In the encrypted data I for receiving user's upload include:
The data that user is uploaded by encrypted tunnel are received, and the data are formed and are encrypted by processing module strong encryption Data I.
4. the data traceability according to claim 1 based on block chain and forcing decryption method, it is characterised in that:
The operation information includes:Add operation information, modification operation information, delete operation information and/or access operation information.
5. the data traceability according to claim 4 based on block chain and forcing decryption method, it is characterised in that:
The attribute information includes time, IP, user name and/or action type.
6. the data traceability according to claim 1 based on block chain and forcing decryption method, which is characterized in that described to be based on The data traceability of block chain further includes with decryption method is forced:
The result of the algorithm iteration of shared information progress will be used to feed back to all users.
7. the data traceability according to claim 6 based on block chain and forcing decryption method, it is characterised in that:
Algorithm involved in the algorithm iteration carried out using shared information is determined according to upper layer application and shared purpose.
8. a kind of data traceability based on block chain and strong encryption device, it is characterised in that:The data based on block chain chase after It traces back with strong encryption device and includes memory, processor and be stored in the memory and can run on the processor Program, the memory and processor are electrically connected, wherein the memory is for storing computer program, the computer program Including program instruction, the processor is configured for calling described program instruction, executes such as claim 1-7 any one institute The data traceability based on block chain stated and the step of force decryption method.
9. a kind of computer readable storage medium, it is characterised in that:The computer-readable recording medium storage has computer journey Sequence, the computer program include program instruction, and described program instruction makes the processor execute such as when being executed by a processor Data traceability based on block chain described in claim 1-7 any one and the step of force decryption method.
10. a kind of data traceability based on block chain and strong encryption system, it is characterised in that:The data based on block chain chase after It includes data traceability and strong encryption device and client based on block chain, the number based on block chain to trace back with strong encryption system It is connect with strong encryption device with client communication according to retrospect, the data traceability based on block chain executes such as with strong encryption device Data traceability based on block chain described in claim 1-7 any one and the step of force decryption method.
CN201810220660.9A 2018-03-16 2018-03-16 Data traceability based on block chain and strong encryption method, apparatus, medium and system Pending CN108449336A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810220660.9A CN108449336A (en) 2018-03-16 2018-03-16 Data traceability based on block chain and strong encryption method, apparatus, medium and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810220660.9A CN108449336A (en) 2018-03-16 2018-03-16 Data traceability based on block chain and strong encryption method, apparatus, medium and system

Publications (1)

Publication Number Publication Date
CN108449336A true CN108449336A (en) 2018-08-24

Family

ID=63195660

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810220660.9A Pending CN108449336A (en) 2018-03-16 2018-03-16 Data traceability based on block chain and strong encryption method, apparatus, medium and system

Country Status (1)

Country Link
CN (1) CN108449336A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189857A (en) * 2018-09-17 2019-01-11 北京京东尚科信息技术有限公司 Data-sharing systems, method and apparatus based on block chain
CN109255007A (en) * 2018-09-28 2019-01-22 中链科技有限公司 Geographical space basic data sharing method and device based on block chain
CN109272152A (en) * 2018-09-07 2019-01-25 篱笆墙网络科技有限公司 Storage method, device, equipment and the storage medium of resume
CN109859042A (en) * 2019-01-09 2019-06-07 广州闪链区块链科技有限公司 A kind of gold assets redemption method, apparatus and storage medium based on block chain
CN110263015A (en) * 2019-05-07 2019-09-20 深圳壹账通智能科技有限公司 Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain
CN111680105A (en) * 2020-06-15 2020-09-18 浙江创邻科技有限公司 Block chain-based distributed relational database management method and system
CN111711619A (en) * 2020-06-04 2020-09-25 江苏荣泽信息科技股份有限公司 Block chain-based network security connection system
CN111784337A (en) * 2019-04-04 2020-10-16 华控清交信息科技(北京)有限公司 Authority verification method and system
CN112184426A (en) * 2020-10-12 2021-01-05 深圳壹账通智能科技有限公司 Data sharing method, system, server and computer readable storage medium
CN112418874A (en) * 2020-06-10 2021-02-26 上海哔哩哔哩科技有限公司 Data tracing method and device and computer equipment
CN113194069A (en) * 2021-03-30 2021-07-30 深圳博瑞天下科技有限公司 Communication tracing method, communication tracing device and medium based on block chain

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136777A (en) * 2007-10-18 2008-03-05 网经科技(苏州)有限公司 Security management method of dual-encryption channel cooperation in network management system
CN102271330A (en) * 2010-06-04 2011-12-07 希姆通信息技术(上海)有限公司 Terminal, network server and method for communication between terminal and network server
CN105681279A (en) * 2015-12-28 2016-06-15 上海瀚银信息技术有限公司 Application data transmission method and mobile terminal
US20170046526A1 (en) * 2015-08-13 2017-02-16 TD Bank Group System and Method for Implementing Hybrid Public-Private Block-Chain Ledgers
CN106960166A (en) * 2017-03-14 2017-07-18 清华大学 A kind of smart jack management system and its method based on distributed general ledger technology
CN107103252A (en) * 2017-04-27 2017-08-29 电子科技大学 Data access control method based on block chain
CN107196934A (en) * 2017-05-18 2017-09-22 电子科技大学 A kind of cloud data managing method based on block chain
CN107231351A (en) * 2017-05-25 2017-10-03 远光软件股份有限公司 The management method and relevant device of electronic certificate

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136777A (en) * 2007-10-18 2008-03-05 网经科技(苏州)有限公司 Security management method of dual-encryption channel cooperation in network management system
CN102271330A (en) * 2010-06-04 2011-12-07 希姆通信息技术(上海)有限公司 Terminal, network server and method for communication between terminal and network server
US20170046526A1 (en) * 2015-08-13 2017-02-16 TD Bank Group System and Method for Implementing Hybrid Public-Private Block-Chain Ledgers
CN105681279A (en) * 2015-12-28 2016-06-15 上海瀚银信息技术有限公司 Application data transmission method and mobile terminal
CN106960166A (en) * 2017-03-14 2017-07-18 清华大学 A kind of smart jack management system and its method based on distributed general ledger technology
CN107103252A (en) * 2017-04-27 2017-08-29 电子科技大学 Data access control method based on block chain
CN107196934A (en) * 2017-05-18 2017-09-22 电子科技大学 A kind of cloud data managing method based on block chain
CN107231351A (en) * 2017-05-25 2017-10-03 远光软件股份有限公司 The management method and relevant device of electronic certificate

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109272152A (en) * 2018-09-07 2019-01-25 篱笆墙网络科技有限公司 Storage method, device, equipment and the storage medium of resume
CN109189857B (en) * 2018-09-17 2021-03-30 北京京东尚科信息技术有限公司 Data sharing system, method and device based on block chain
CN109189857A (en) * 2018-09-17 2019-01-11 北京京东尚科信息技术有限公司 Data-sharing systems, method and apparatus based on block chain
CN109255007A (en) * 2018-09-28 2019-01-22 中链科技有限公司 Geographical space basic data sharing method and device based on block chain
CN109859042A (en) * 2019-01-09 2019-06-07 广州闪链区块链科技有限公司 A kind of gold assets redemption method, apparatus and storage medium based on block chain
CN111784337B (en) * 2019-04-04 2023-08-22 华控清交信息科技(北京)有限公司 Authority verification method and system
CN111784337A (en) * 2019-04-04 2020-10-16 华控清交信息科技(北京)有限公司 Authority verification method and system
CN110263015A (en) * 2019-05-07 2019-09-20 深圳壹账通智能科技有限公司 Data source tracing method, device, equipment and readable storage medium storing program for executing based on block chain
CN111711619A (en) * 2020-06-04 2020-09-25 江苏荣泽信息科技股份有限公司 Block chain-based network security connection system
CN112418874A (en) * 2020-06-10 2021-02-26 上海哔哩哔哩科技有限公司 Data tracing method and device and computer equipment
CN111680105A (en) * 2020-06-15 2020-09-18 浙江创邻科技有限公司 Block chain-based distributed relational database management method and system
CN111680105B (en) * 2020-06-15 2023-09-22 浙江创邻科技有限公司 Management method and system of distributed relational database based on block chain
CN112184426A (en) * 2020-10-12 2021-01-05 深圳壹账通智能科技有限公司 Data sharing method, system, server and computer readable storage medium
CN113194069A (en) * 2021-03-30 2021-07-30 深圳博瑞天下科技有限公司 Communication tracing method, communication tracing device and medium based on block chain
CN113194069B (en) * 2021-03-30 2022-08-26 深圳博瑞天下科技有限公司 Communication tracing method, communication tracing device and medium based on block chain

Similar Documents

Publication Publication Date Title
CN108449336A (en) Data traceability based on block chain and strong encryption method, apparatus, medium and system
US10567168B2 (en) Blockchain transaction privacy enhancement through broadcast encryption
Florian et al. Erasing data from blockchain nodes
CN110290094A (en) A kind of control method and device of data access authority
WO2018203186A1 (en) Secure dynamic threshold signature scheme employing trusted hardware
CN110300973A (en) The foundation of alliance's block chain network
CN105408913A (en) Processing data privately in the cloud
JP6532601B2 (en) System and method for secure digital sharing based on exchange between systems of two layer dual encryption digital information key
US20140362992A1 (en) Systems and Methods for Conducting Secure Wired and Wireless Networked Telephony
US10609010B2 (en) System, methods and software application for sending secured messages on decentralized networks
EP2103032B1 (en) Privacy enhanced comparison of data sets
CN110599163B (en) Transaction record outsourcing method facing block chain transaction supervision
CN108234443A (en) Contracting method, system and computer readable storage medium
US20200410136A1 (en) Stacked Encryption
CN109299619B (en) Data query method, computing device and system
CN110417547B (en) Secret key updating method and system for secret communication based on certificateless cryptography
CN108259171A (en) The guard method of Shader files and device
US11784819B2 (en) Dynamic segmentation of network traffic by use of pre-shared keys
CN109040134A (en) A kind of design method and relevant apparatus of information encryption
US11095620B1 (en) Secure method, system, and computer program product for exchange of data
CN114553593A (en) Multi-party secure computation privacy intersection method, device, equipment and storage medium
CN114297304A (en) Product information block chain transaction storage method, server and readable medium
JP2019154055A5 (en)
CN114844621A (en) Multi-user privacy protection machine learning method and device based on multi-key fully homomorphic encryption
Uthayashangar et al. Decentralized blockchain based system for secure data storage in cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180824

RJ01 Rejection of invention patent application after publication