CN108900464A - Electronic device, data processing method and computer storage medium based on block chain - Google Patents

Electronic device, data processing method and computer storage medium based on block chain Download PDF

Info

Publication number
CN108900464A
CN108900464A CN201810387989.4A CN201810387989A CN108900464A CN 108900464 A CN108900464 A CN 108900464A CN 201810387989 A CN201810387989 A CN 201810387989A CN 108900464 A CN108900464 A CN 108900464A
Authority
CN
China
Prior art keywords
data
key
user
authorized
written
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810387989.4A
Other languages
Chinese (zh)
Other versions
CN108900464B (en
Inventor
陈文博
刘�英
周鹏华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810387989.4A priority Critical patent/CN108900464B/en
Priority to PCT/CN2018/102130 priority patent/WO2019205380A1/en
Publication of CN108900464A publication Critical patent/CN108900464A/en
Application granted granted Critical
Publication of CN108900464B publication Critical patent/CN108900464B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a kind of electronic device, data processing method and computer storage medium based on block chain.The present invention is according to privacy attribute information, determine whether that data to be written are encrypted, when the data to be written are encrypted in determination, then according to the privacy attribute information, and the data to be written are encrypted based on predetermined encryption rule, and encrypted data to be written are stored to each node into block chain.Compared to the prior art, the present embodiment improves the safety of block chain data under the premise of not influencing block chain data sharing.

Description

Electronic device, data processing method and computer storage medium based on block chain
Technical field
The present invention relates to block chain technical field, in particular to a kind of electronic device, the data processing side based on block chain Method and computer storage medium.
Background technique
Block chain is substantially the distributed database based on intelligent contract, and the information above block chain will be by It is gone on P2P (Peer-to-peer, equity) network sharing to all nodes.Since block chain has anti-tamper, high transparency and goes The advantages such as centralization, are widely used in every field in recent years.
In general, block chain storing data by way of plaintext, i.e., the data of any node will be same in deposit block chain All nodes in block chain are walked, therefore, for there are the data of privacy requirements to be difficult to ensure the safety of its information.
Summary of the invention
The main object of the present invention is to provide a kind of electronic device, the data processing method based on block chain and computer and deposits Storage media, it is intended to solve the problems, such as that block chain is difficult to ensure its storing data safety.
To achieve the above object, the present invention provides a kind of electronic device, and the electronic device includes memory and processor, The data processor based on block chain that can be run on the processor is stored on the memory, it is described to be based on block The data processor of chain realizes following steps when being executed by the processor:
Receive the data write request for carrying privacy attribute information;
According to the privacy attribute information, it is determined whether data to be written corresponding to the data write request add Close processing;
When the data to be written are encrypted in determination, according to the privacy attribute information, and based on preparatory After the data to be written are encrypted in determining encryption rule, encrypted data to be written are stored to block chain In each node;
When determination is not encrypted the data to be written, directly the data to be written are stored to block Each node in chain.
Preferably, the predetermined encryption rule is:
According to the corresponding user identity information of the data write request and predetermined user identity information and classification Mapping relations between rule search the corresponding classifying rules of the user identity information;
According to the classifying rules that lookup obtains, the data category of data to be written is determined and saved;
It is identified according to the data category of the determining data to be written and predetermined data category and user key Mapping relations between information search the corresponding user key identification information of the data to be written;
The data to be written are encrypted using the corresponding user key of the user key identification information.
Preferably, the processor executes the data processor based on block chain, also realization following steps:
When receiving the authorization requests for carrying authorising conditional information, obtain close to the corresponding authorized party user of authorization data Key and authorized square public key;
Authorized party's user key is encrypted using authorized side's public key, the authorized side receives encryption After authorized party's user key, authorized party's user key of the encryption is decrypted using the private key for user of the authorized side Processing is to obtain authorized party's user key.
Preferably, the step of acquisition authorized party's user key corresponding to authorization data includes:
According to the user identity information and predetermined user identity information of authorized party in the authorising conditional information with Mapping relations between key set determine in memory space with the presence or absence of the corresponding key set of the authorized party;
When determining key set corresponding there are the authorized party, the corresponding key set of the authorized party is obtained, according to institute State believing in authorising conditional data to authorization data identification information and predetermined data identification information and user key mark Mapping relations between breath search the authorization to the corresponding encryption of authorization data in the corresponding key set of the authorized party Square user key is decrypted authorized party's user key of the encryption of lookup according to preset-key decryption rule, It is described to the corresponding authorized party's user key of authorization data to obtain;
When determining key set corresponding there is no the authorized party, according to the number to be authorized in the authorising conditional data According to the mapping relations between the predetermined data identification information of identification information and user key identification information, search described wait award Flexible strategy are according to corresponding user key identification information, the user key identification information of feedback search to authorized party, described in reception Authorized party's user key that authorized party provides according to the user key identification information.
Preferably, described the step of obtaining authorized square public key, includes:
According to the user identity information and predetermined user identity information for being authorized to side in the authorising conditional information Mapping relations between client public key search authorized side's public key, wherein all client public key are stored in advance Each node in the block chain.
In addition, to achieve the above object, the present invention also provides a kind of data processing method based on block chain, this method packets Include step:
Receive the data write request for carrying privacy attribute information;
According to the privacy attribute information, it is determined whether data to be written corresponding to the data write request add Close processing;
When the data to be written are encrypted in determination, according to the privacy attribute information, and based on preparatory After the data to be written are encrypted in determining encryption rule, encrypted data to be written are stored to block chain In each node;
When determination is not encrypted the data to be written, directly the data to be written are stored to block Each node in chain.
Preferably, the predetermined encryption rule is:
According to the corresponding user identity information of the data write request and predetermined user identity information and classification Mapping relations between rule search the corresponding classifying rules of the user identity information;
The classifying rules obtained according to lookup is determining and saves the data category of data to be written;
According to the data category of determining data to be written and predetermined data category and user key identification information Between mapping relations, search the corresponding user key identification information of the data to be written;
The data to be written are encrypted using the corresponding user key of the user key identification information.
Preferably, the data processing method based on block chain further includes:
When receiving the authorization requests for carrying authorising conditional information, obtain close to the corresponding authorized party user of authorization data Key and authorized square public key;
Authorized party's user key is encrypted using authorized side's public key, receives encryption for the authorized side Authorized party's user key after, authorized party's user key of the encryption is solved using the private key for user of the authorized side Close processing is to obtain authorized party's user key.
Preferably, the step of acquisition authorized party's user key corresponding to authorization data includes:
According to the user identity information and predetermined user identity information of authorized party in the authorising conditional information with Mapping relations between key set determine in memory space with the presence or absence of the corresponding key set of the authorized party;
When determining key set corresponding there are the authorized party, the corresponding key set of the authorized party is obtained, according to institute State believing in authorising conditional data to authorization data identification information and predetermined data identification information and user key mark Mapping relations between breath search the authorization to the corresponding encryption of authorization data in the corresponding key set of the authorized party Square user key is decrypted authorized party's user key of the encryption of lookup according to preset-key decryption rule, It is described to the corresponding authorized party's user key of authorization data to obtain;
When determining key set corresponding there is no the authorized party, according to the number to be authorized in the authorising conditional data According to the mapping relations between identification information and predetermined data identification information and user key identification information, search it is described to The corresponding user key identification information of authorization data;The user key identification information of feedback search receives institute to authorized party State authorized party's user key that authorized party provides according to the user key identification information;
It is described to obtain the step of being authorized to square public key and include:
According to the user identity information and predetermined user identity information for being authorized to side in the authorising conditional information Mapping relations between client public key search authorized side's public key, wherein all client public key are stored in advance Each node in the block chain.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium Storage medium is stored with the data processor based on block chain, and the data processor based on block chain can be by least one A processor executes, so that at least one described processor executes the data processing as described in any one of the above embodiments based on block chain Method.
The present invention is according to privacy attribute information, it is determined whether data to be written is encrypted, when determining to described Data to be written are encrypted, then according to the privacy attribute information, and based on predetermined encryption rule to described Data to be written are encrypted, and encrypted data to be written are stored to each node into block chain.Compared to The prior art, the present invention improve the safety of block chain data under the premise of not influencing block chain data sharing.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with The structure shown according to these attached drawings obtains other attached drawings.
Fig. 1 is that the present invention is based on the flow diagrams of the data processing method first embodiment of block chain;
Fig. 2 is that the present invention is based on the flow diagrams of the data processing method second embodiment of block chain;
Fig. 3 is that the present invention is based on the signals of the running environment of the first, second, third embodiment of data processor of block chain Figure;
Fig. 4 is that the present invention is based on the Program modual graphs of the data processor first embodiment of block chain;
Fig. 5 is that the present invention is based on the Program modual graphs of the data processor second embodiment of block chain.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
The principle and features of the present invention will be described below with reference to the accompanying drawings, and the given examples are served only to explain the present invention, and It is non-to be used to limit the scope of the invention.
In following embodiments the present invention is based on the data processing method of block chain, at the data based on block chain Reason method is suitable for the public good system based on block chain, which includes that several application ends and each application end are corresponding Node device, the node device are preferably the node device in alliance's chain, and the application end includes public good platform, public good object Platform, the node device include the corresponding public good platform nodes equipment of public good platform, the corresponding public good pair of public good subject table As platform nodes equipment.In some embodiments, being somebody's turn to do the public good system based on block chain further includes:Several public goods platform employee Management subsystem and the corresponding public good platform staff's benefits node device of each public good platform staff's benefits subsystem, several notarization Mechanism platform and the corresponding notary organization's node device of each notary organization's platform.
Below using encryption/decryption module as subject of implementation to the present invention is based on the specific realities of the data processing method of block chain The mode of applying is illustrated.The encryption/decryption module may be disposed in the server of application end, may also set up in node device (example Such as, if being set in node device, which can be the corresponding intelligent contract of the node device), in addition, should add Deciphering module can be also independently disposed in other any applicable electronic devices or equipment.It should be noted that the present invention is right The subject of implementation of the data processing method based on block chain is not construed as limiting.
As shown in FIG. 1, FIG. 1 is the present invention is based on the flow diagrams of the data processing method first embodiment of block chain.
In the present embodiment, this method includes:
Step S10 receives the data write request for carrying privacy attribute information.
If encryption/decryption module is set in application end server, directly received by application end using end subscriber transmission Data write request.
If encryption/decryption module is independently disposed in an electronic device, user's transmission data write request to application end, by Application end forwards the data write request to encryption/decryption module.
If encryption/decryption module is set in node device, user sends data write request to application end, by application end It is signed with application end private key to the data write request, and data write request to the node for sending filling signature is set It is standby, after node device receives the data write request of filling signature, sign test is carried out to data write request;If sign test at The data write request is then sent to encryption/decryption module by function;If sign test fails, the data write request is abandoned.
Wherein, above-mentioned privacy attribute information can by user setting, can also by encryption/decryption module according to preset rules (for example, The characteristic information data for extracting data to be written, being associated with based on predetermined characteristic information data and privacy attribute information System, determines the corresponding privacy attribute information of data to be written) determine that the corresponding data to be written of the data write request are corresponding Privacy attribute information.
Above-mentioned privacy attribute information includes:Secure identification information (for example, unclassified, secrecy) and/or authorization message (example Such as, it is authorized to square information, licensing term etc.).
Before executing step S10, this method further includes:
When user registers for the first time in application end, encryption/decryption module is that the user generates private key for user, client public key and use Family key.
It inquires whether the user needs to manage on behalf of another the private key for user and user key.
If so, sending the private key for user, client public key and the user key that generate to user.According to preset-key plus Close rule the private key for user and user key are encrypted (for example, using private key for user described in tissue key pair and User key is encrypted), and encrypted private key for user and user key are stored into key set corresponding to the user In, save the mapping relations between user identity information and the key set.And determine user identity information and client public key it Between mapping relations, the mapping relations between client public key, user identity information and client public key are stored into block chain respectively On a node.
Mapping relations between above-mentioned key set, user identity information and the key set can be stored in local storage space In (such as encryption/decryption module), also it can be stored in block chain on each node;Wherein, above-mentioned tissue key refers to the user of equipment Key, for example, the tissue key is the symmetric cryptographic key of application end if encryption/decryption module is set to application end server, If encryption/decryption module is set in node device, which is the symmetric cryptographic key of node device, if encryption and decryption mould Block is independently disposed in an electronic device, then the tissue key is the symmetric cryptographic key of the electronic device.
Above-mentioned private key for user is the asymmetric encryption private key of user, and client public key is the asymmetric encryption public key of user, is used Family key is the symmetric cryptographic key of user.
If it is not, then sending the private key for user, client public key and the user key of generation to user, and determine user identifier Mapping relations between information and client public key, and the mapping between client public key, user identity information and client public key is closed System stores into block chain on each node.
In the present embodiment, user key and private key for user can prevent other people from stealing by being stored again after encryption, Improve the safety of user key collection private key for user.
Step S20, according to the privacy attribute information, it is determined whether number to be written corresponding to the data write request According to being encrypted.
The step S20, specially:
Step S21 reads the secure identification information in the privacy attribute information, is determined according to the secure identification information Whether the data to be written are encrypted.For example, secure identification information is parsed to obtain parsing result, if Parsing result is " secrecy ", it is determined that the data to be written is encrypted, if parsing result is " disclosure ", it is determined that The data to be written are not encrypted.
Above-mentioned steps S21 can be replaced by following step S22:
Step S22 reads the authorization message in the privacy attribute information, is determined whether according to the authorization message to institute Data to be written are stated to be encrypted.For example, being parsed authorized side's information in the authorization message to be solved Analysis as a result, if parsing result be " without side is authorized to ", " be authorized to side be XX user " or " being authorized to side is XX application end use Family ", it is determined that the data to be written are encrypted, if parsing result is " being authorized to side is all users ", really It is fixed the data to be written not to be encrypted.
Step S30, when the data to be written are encrypted in determination, according to the privacy attribute information, and After the data to be written are encrypted based on predetermined encryption rule, encrypted data to be written are stored Each node into block chain.
Preferably, in the present embodiment, the predetermined encryption rule, specially:
According to the corresponding user identity information of the data write request and predetermined user identity information and classification Mapping relations between rule search the corresponding classifying rules of the user identity information;
According to the classifying rules that lookup obtains, the data category of data to be written is determined and saved;
According to the data category of determining data to be written and predetermined data category and user key identification information Between mapping relations, search the corresponding user key identification information of the data to be written;
The corresponding user key of the user key identification information is obtained, and using the user key obtained to described Data to be written are encrypted.
Above-mentioned classifying rules can be arranged according to demand by user, can also be arranged by encryption/decryption module, for example, extract it is described to The data characteristic information of data is written, based on the mapping relations between predetermined data characteristic information and data category, really The data category of the fixed data to be written.
In the present embodiment, above-mentioned encryption rule can be encrypted data according to data category, and user can be according to need The corresponding data grant of one or more kinds of data categories is checked to other people, improves the flexibility of data grant, and into One step improves the safety of data.
Preferably, the step of above-mentioned acquisition user key identification information corresponding user key is specially:
According to the corresponding user identity information of the data write request, and based on predetermined user identity information with Mapping relations between key set determine in memory space with the presence or absence of the corresponding key of the data write request initiator Whether collection, managed on behalf of another with the user key of the determination data write request initiator by encryption/decryption module.
It (indicates that the user key of data write request initiator is managed on behalf of another by encryption/decryption module) if it exists, then obtains institute State the corresponding key set of data write request initiator;Wherein, all user keys of the data write request initiator are equal According to being stored in after preset-key encryption rule (for example, being encrypted using tissue key pair user key) encryption In the corresponding key set of the data write request initiator;In the key set, according to the user key identification information Search the user key of corresponding encryption;Regular (for example, being decrypted using tissue key) is decrypted according to preset-key The user key of the encryption of lookup is decrypted, to obtain the user key.
If it does not exist (indicate that the user key of data write request initiator is not managed on behalf of another by encryption/decryption module, but By the data write request, initiator is voluntarily taken care of), then the user key identification information is fed back to the data write request Initiator provides corresponding user key according to the user key identification information for the data write request initiator;It connects Receive the user key that the data write request initiator provides.
It is above-mentioned that encrypted data to be written are stored into the step into block chain on each node, specially:
If encryption/decryption module is set in application end server, or is independently disposed in electronic device, then based on encryption The data to be written afterwards initiate a transaction request to a node, which is signed with tissue private key, the section Point carries out sign test with corresponding tissue public key, if sign test fails, does not execute the transaction request, if sign test success, executes The new block of generation to generate the corresponding new block of the transaction request, and is synchronized to block chain by the transaction request Other all nodes in.
If encryption/decryption module is set in node device, which is based on encrypted data to be written and generates newly Block, and the new block of generation is synchronized in other all nodes of block chain.
Step S40 directly deposits the data to be written when determination is not encrypted the data to be written Store up each node into block chain.
It is above-mentioned that the data to be written are directly stored into the step into block chain on each node, specially:
If encryption/decryption module is set in application end server, or is independently disposed in electronic device, then it is directly based upon The data to be written initiate a transaction request to a node, which is signed with tissue private key, and the node is used Corresponding tissue public key carries out sign test, if sign test fails, does not execute the transaction request, if sign test success, described in execution The new block of generation to generate the corresponding new block of the transaction request, and is synchronized to its of block chain by transaction request In his all nodes.
If encryption/decryption module is set in node device, which is directly based upon data to be written and generates new district Block, and the new block of generation is synchronized in other all nodes of block chain.
The present embodiment is according to privacy attribute information, it is determined whether data to be written is encrypted, when determining to institute It states data to be written to be encrypted, then according to the privacy attribute information, and based on predetermined encryption rule to institute It states data to be written to be encrypted, and encrypted data to be written is stored into block chain on each node.It compares In the prior art, the present embodiment improves the safety of block chain data under the premise of not influencing block chain data sharing.
As shown in Fig. 2, Fig. 2 is that the present invention is based on the flow diagrams of the data processing method second embodiment of block chain.
The present invention is based in the data processing method second embodiment of block chain, this implementation is on the basis of first embodiment On, the data processing method based on block chain further includes:
Step S50 is obtained when receiving the authorization requests for carrying authorising conditional information to the corresponding authorization of authorization data Square user key and authorized square public key.
Above-mentioned authorising conditional information includes to authorization data identification information, licensing term information, authorized party's information and being awarded Power side's information.
The step of acquisition authorized party's user key corresponding to authorization data includes:
Believe according to the user identity information of authorized party in the authorising conditional information, and based on predetermined user identifier Mapping relations between breath and key set determine in memory space with the presence or absence of the corresponding key set of the authorized party.
When determining key set corresponding there are the authorized party, the corresponding key set of the authorized party is obtained.Wherein, institute All user keys for stating authorized party are corresponding all in accordance with the authorized party is stored in after preset-key encryption rule encryption In key set.Then, according in the authorising conditional data to authorization data identification information and predetermined Data Identification Mapping relations between information and user key identification information are searched described wait authorize in the corresponding key set of the authorized party Authorized party's user key of the corresponding encryption of data.Then, awarding according to the preset-key regular encryption to lookup of decryption Power side's user key is decrypted, described to the corresponding authorized party's user key of authorization data to obtain.
When determining key set corresponding there is no the authorized party, according to the number to be authorized in the authorising conditional data According to identification information, and based on the mapping relations between predetermined data identification information and user key identification information, search It is described to the corresponding user key identification information of authorization data.Then, the user key identification information of feedback search is to awarding Quan Fang.Then, authorized party's user key that the authorized party provides according to the user key identification information is received.
It is described to obtain the step of being authorized to square public key and include:
According to the user identity information for being authorized to side in the authorising conditional information, and based on predetermined user identifier Mapping relations between information and client public key search authorized side's public key;Wherein, all client public key are preparatory It is stored on each node in the block chain.
Step S60 is encrypted authorized party's user key using authorized side's public key, and the authorized side receives To after authorized party's user key of encryption, using the private key for user of the authorized side to authorized party's user key of the encryption It is decrypted to obtain authorized party's user key.
In the present embodiment, authorized party's user key transmits again after passing through encryption, improves safety.
The present invention also provides the 3rd embodiment of the data processing method based on block chain, the 3rd embodiment is real second It is further comprising the steps of on the basis of applying example:
When to terminate an authorization, it is determined that the data category of authorization data to the end of.Wherein, terminate an authorization Trigger condition includes:Receive end authorization requests;Alternatively, detecting, there are the overdue grant items of licensing term.
When the corresponding data category of the authorization data to the end of is one, then according to the number of the authorization data to the end of According to classification, and based on the mapping relations between predetermined data category and user key identification information, determine described wait tie The corresponding user key identification information of the data category of beam authorization data.Then, it is corresponding to obtain the user key identification information User key, and the authorization data to the end of is decrypted using the user key of acquisition, to obtain State the corresponding clear data of the authorization data to the end of.Then, new user key is generated, using the new user key to obtaining The clear data obtained is encrypted, and to obtain new encryption data, and the new encryption data is stored to area In block chain on each node, so that each node generates new block based on the new encryption data, and the data directory is updated.Together When, the new user key of generation is fed back into the corresponding user of the new user key, and save the new use Mapping relations between family key ID information and data category, while saving the new user key identification information and user Mapping relations between identification information.
When the corresponding data category of the authorization data to the end of be it is multiple, then according to described, authorization data is corresponding to the end of Multiple data categories determine and based on the mapping relations between predetermined data category and user key identification information The corresponding user key identification information of each data category.Then, the corresponding use of each user key identification information is obtained Family key, and the corresponding authorization data to the end of is decrypted using each user key of acquisition, to obtain Obtain the corresponding clear data of authorization data to the end of.Then, raw for the corresponding each data category of the clear data The user key of Cheng Xin, using each new user key, to the number of the corresponding data category of each new user key According to being encrypted, to obtain new encryption data, and the new encryption data is stored into block chain each node On, so that each node generates new block based on the new encryption data, and update the data directory.Meanwhile by the institute of generation It states new user key and feeds back to the corresponding user of the new user key, and save the new user key identification information Mapping relations between data category, while saving between new the user key identification information and user identity information Mapping relations.
It is further comprising the steps of if user key is managed on behalf of another by encryption/decryption module in above-mentioned steps:
It is encrypted using user key new described in tissue key pair, and by the new user key of encryption It saves to key set.
Preferably, in the present embodiment, the data processing method based on block chain further includes:
When receiving data read request, judge whether the corresponding data to be read of the data read request are encryption Data;
If so, obtaining the corresponding user key of the data to be read;When getting, the data to be read are corresponding When user key, the data to be read are decrypted using the user key of acquisition described to be read to obtain The corresponding clear data of data, and the clear data is sent to the initiator of the data read request;When having not been obtained When the corresponding user key of the data to be read, then decryption failure news is fed back;
If it is not, then obtaining the corresponding data to be read of the data read request, and the data to be read are sent to The initiator of the data read request.
In addition, the present invention also proposes a kind of data processor based on block chain.
Referring to Fig. 3, being the fortune of 10 first, second, third embodiment of data processor the present invention is based on block chain Row environment schematic.
In the present embodiment, the data processor 10 based on block chain is installed and is run in electronic device 1.Electronics dress Setting 1 can be the calculating equipment such as desktop PC, notebook, palm PC and server.The electronic device 1 may include, but It is not limited only to, memory 11, processor 12 and display 13.Fig. 3 illustrates only the electronic device 1 with component 11-13, still It should be understood that, it is not required that implement all components shown, the implementation that can be substituted is more or less component.
Memory 11 can be the internal storage unit of electronic device 1 in some embodiments, such as the electronic device 1 Hard disk or memory.Memory 11 is also possible to the External memory equipment of electronic device 1, such as electronics dress in further embodiments Set the plug-in type hard disk being equipped on 1, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, memory 11 can also be both interior including electronic device 1 Portion's storage unit also includes External memory equipment.Memory 11 is for storing the application software for being installed on electronic device 1 and all kinds of Data, such as the program code etc. of the data processor 10 based on block chain.Memory 11 can be also used for temporarily storing The data that has exported or will export.
Processor 12 can be in some embodiments a central processing unit (Central Processing Unit, CPU), microprocessor or other data processing chips, program code or processing data for being stored in run memory 11, example Such as, in the present embodiment, processor 12 executes the data processor 10 based on block chain, to realize the above-mentioned number based on block chain According to processing method.
Display 13 can be in some embodiments light-emitting diode display, liquid crystal display, touch-control liquid crystal display and OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) touches device etc..Display 13 is for being shown in The information that is handled in electronic device 1 and for showing visual user interface.The component 11-13 of electronic device 1 passes through journey Sequence bus is in communication with each other.
Referring to Fig. 4, being the Program modual graph of 10 first embodiment of data processor the present invention is based on block chain.? In the present embodiment, the data processor 10 based on block chain can be divided into one or more modules, one or more Module is stored in memory 11, and performed by one or more processors (the present embodiment is processor 12), to complete The present invention.For example, in Fig. 4, it can be divided into receiving module 101 based on the data processor 10 of block chain, determine mould Block 102, the first writing module 103 and the second writing module 104.The so-called module of the present invention refers to complete specific function Series of computation machine program instruction section, than program more suitable for data processor 10 of the description based on block chain in electronic device Implementation procedure in 1, wherein:
Receiving module 101, for receiving the data write request for carrying privacy attribute information;
Determining module 102, for according to the privacy attribute information, it is determined whether corresponding to the data write request Data to be written are encrypted;
First writing module 103, for when determine the data to be written are encrypted when, according to the secrecy Attribute information, and after the data to be written being encrypted based on predetermined encryption rule, by it is encrypted to Write-in data store each node into block chain;
Second writing module 104, for when determine the data to be written are not encrypted when, directly will be described Data to be written store each node into block chain.
If electronic device 1 is that application end server or electronic device 1 are set in application end server, mould is received Block 101 directly receives the data write request sent using end subscriber by application end.
If electronic device 1 is not application end server or node device, also it is not provided with setting in application end server or node In standby, then user sends data write request to application end, forwards the data write request to receiving module 101 by application end.
If electronic device 1 is that node device or electronic device 1 are set in node device, user sends data and writes Enter request to sign to the data write request with application end private key by application end to application end, and sends filling signature Data write request to node device, node device receive the filling signature data write request after, to data be written Request carries out sign test;If sign test success, is sent to receiving module 101 for the data write request;If sign test fails, lose Abandon the data write request.
Wherein, above-mentioned privacy attribute information can be by user setting, can also be by data processor 10 based on block chain According to preset rules (for example, the characteristic information data of data to be written is extracted, based on predetermined characteristic information data and secrecy The incidence relation of attribute information determines the corresponding privacy attribute information of data to be written) determine that the data write request is corresponding The corresponding privacy attribute information of data to be written.
Above-mentioned privacy attribute information includes:Secure identification information (for example, unclassified, secrecy) and/or authorization message (example Such as, it is authorized to square information, licensing term etc.).
The data processor 10 based on block chain is also used to:
When user registers for the first time in application end, private key for user, client public key and user key are generated for the user;
It inquires whether the user needs to manage on behalf of another the private key for user and user key;
If so, sending the private key for user, client public key and the user key that generate to user;According to preset-key plus Close rule the private key for user and user key are encrypted (for example, using private key for user described in tissue key pair and User key is encrypted), and encrypted private key for user and user key are stored into key set corresponding to the user In, save the mapping relations between user identity information and the key set.And determine user identity information and client public key it Between mapping relations, the mapping relations between client public key, user identity information and client public key are stored into block chain respectively On a node.Mapping relations between above-mentioned key set, user identity information and the key set, which can be stored in, is locally stored sky Between in, also can be stored in block chain on each node.
Wherein, above-mentioned tissue key refers to the user key of equipment, for example, if electronic device 1 be application end server, or Person's electronic device 1 is set in application end server, then the tissue key is the symmetric cryptographic key of application end, if electronic device 1 is that node device or electronic device 1 are set in node device, then the tissue key is that the symmetric cryptography of node device is close Key is also not provided in application end server or node device if electronic device 1 is not application end server or node device, Then the tissue key is the symmetric cryptographic key of the electronic device 1.Above-mentioned private key for user is the asymmetric encryption private key of user, is used Family public key is the asymmetric encryption public key of user, and user key is the symmetric cryptographic key of user.
If it is not, then sending the private key for user, client public key and the user key of generation to user, and determine user identifier Mapping relations between information and client public key, and the mapping between client public key, user identity information and client public key is closed System stores into block chain on each node.
In the present embodiment, user key and private key for user can prevent other people from stealing by being stored again after encryption, Improve the safety of user key collection private key for user.
Determining module 102 is specifically used for, and the secure identification information in the privacy attribute information is read, according to the secrecy Identification information determines whether that the data to be written are encrypted.For example, being parsed secure identification information to obtain To parsing result, if parsing result is " secrecy ", it is determined that the data to be written are encrypted, if parsing result is " disclosure ", it is determined that the data to be written are not encrypted.
Alternatively, determining module 102 is also used to:
The authorization message in the privacy attribute information is read, is determined whether according to the authorization message to described to be written Data are encrypted.For example, authorized side's information in the authorization message is parsed to obtain parsing result, if Parsing result is " without side is authorized to ", " be authorized to side be XX user " or " being authorized to square is XX application end subscriber ", it is determined that The data to be written are encrypted, if parsing result is " being authorized to side is all users ", it is determined that not to described Data to be written are encrypted.
Preferably, in the present embodiment, the predetermined encryption rule, specially:
According to the corresponding user identity information of the data write request and predetermined user identity information and classification Mapping relations between rule search the corresponding classifying rules of the user identity information;
According to the classifying rules that lookup obtains, the data category of data to be written is determined and saved;
According to the data category of determining data to be written and predetermined data category and user key identification information Between mapping relations, search the corresponding user key identification information of the data to be written;
The corresponding user key of the user key identification information is obtained, and using the user key obtained to described Data to be written are encrypted.
Above-mentioned classifying rules can be arranged according to demand by user, can also be arranged by determining module 102, for example, described in extracting The data characteristic information of data to be written, based on the mapping relations between predetermined data characteristic information and data category, Determine the data category of the data to be written.
In the present embodiment, above-mentioned encryption rule can be encrypted data according to data category, and user can be according to need The corresponding data grant of one or more kinds of data categories is checked to other people, improves the flexibility of data grant, and into One step improves the safety of data.
Preferably, the step of above-mentioned acquisition user key identification information corresponding user key is specially:
According to the corresponding user identity information of the data write request, and based on predetermined user identity information with Mapping relations between key set determine in memory space with the presence or absence of the corresponding key of the data write request initiator Whether collection, managed on behalf of another with the user key of the determination data write request initiator by electronic device 1.
It (indicates that the user key of data write request initiator is managed on behalf of another by electronic device 1) if it exists, then obtains institute State the corresponding key set of data write request initiator;Wherein, all user keys of the data write request initiator are equal According to being stored in after preset-key encryption rule (for example, being encrypted using tissue key pair user key) encryption In the corresponding key set of the data write request initiator;In the key set, according to the user key identification information Search the user key of corresponding encryption;Regular (for example, being decrypted using tissue key) is decrypted according to preset-key The user key of the encryption of lookup is decrypted, to obtain the user key.
If it does not exist (indicate that the user key of data write request initiator is not managed on behalf of another by electronic device 1, but by Data write request initiator voluntarily takes care of), then it feeds back the user key identification information to the data write request and sends out Side is played, provides corresponding user key according to the user key identification information for the data write request initiator;It receives The user key that the data write request initiator provides.
It is above-mentioned that encrypted data to be written are stored into the step into block chain on each node, specially:
If electronic device 1 is not node device, also it is not provided in node device, then based on encrypted described to be written Data initiate a transaction request to a node, which is signed with tissue private key, the corresponding tissue of the node Public key carries out sign test, if sign test fails, does not execute the transaction request, if sign test success, executes the transaction request, with The corresponding new block of the transaction request is generated, and the new block of generation is synchronized to other all nodes of block chain In.
If electronic device 1 is that node device or electronic device 1 are set in node device, which is based on Encrypted data to be written generate new block, and the new block of generation is synchronized to other all nodes of block chain In.
The data to be written are directly stored the step into block chain on each node by above-mentioned second writing module 104 Suddenly, specially:
If electronic device 1 is not node device, also it is not provided in node device, is then directly based upon the data to be written A transaction request is initiated to a node, which is signed with tissue private key, the corresponding tissue public key of the node Sign test is carried out, if sign test fails, does not execute the transaction request, if sign test success, executes the transaction request, to generate The corresponding new block of the transaction request, and the new block of generation is synchronized in other all nodes of block chain.
If electronic device 1 is that node device or electronic device 1 are set in node device, the node device is direct New block is generated based on data to be written, and the new block of generation is synchronized in other all nodes of block chain.
The present embodiment is according to privacy attribute information, it is determined whether data to be written is encrypted, when determining to institute It states data to be written to be encrypted, then according to the privacy attribute information, and based on predetermined encryption rule to institute It states data to be written to be encrypted, and encrypted data to be written is stored into block chain on each node.It compares In the prior art, the present embodiment improves the safety of block chain data under the premise of not influencing block chain data sharing.
It is that the present invention is based on the Program modual graphs of 10 second embodiment of data processor of block chain referring to Fig. 4, Fig. 4.
The present invention is based in 10 second embodiment of data processor of block chain, this implementation is on the basis of first embodiment On, the data processor 10 based on block chain further includes:
Module 105 is obtained, for obtaining to authorization data pair when receiving the authorization requests for carrying authorising conditional information The authorized party's user key and authorized square public key answered.
Authorization module 106, for authorized party's user key to be encrypted using authorized square public key, for the quilt Authorization after authorized party receives authorized party's user key of encryption, using the private key for user of the authorized side to the encryption Square user key is decrypted to obtain authorized party's user key.
Above-mentioned authorising conditional information includes to authorization data identification information, licensing term information, authorized party's information and being awarded Power side's information.
The step of acquisition authorized party's user key corresponding to authorization data includes:
Believe according to the user identity information of authorized party in the authorising conditional information, and based on predetermined user identifier Mapping relations between breath and key set determine in memory space with the presence or absence of the corresponding key set of the authorized party.
When determining key set corresponding there are the authorized party, the corresponding key set of the authorized party is obtained.Wherein, institute All user keys for stating authorized party are corresponding all in accordance with the authorized party is stored in after preset-key encryption rule encryption In key set.Then, according in the authorising conditional data to authorization data identification information and predetermined Data Identification Mapping relations between information and user key identification information are searched described wait authorize in the corresponding key set of the authorized party Authorized party's user key of the corresponding encryption of data.Then, awarding according to the preset-key regular encryption to lookup of decryption Power side's user key is decrypted, described to the corresponding authorized party's user key of authorization data to obtain.
When determining key set corresponding there is no the authorized party, according to the number to be authorized in the authorising conditional data According to identification information, and based on the mapping relations between predetermined data identification information and user key identification information, search It is described to the corresponding user key identification information of authorization data.Then, the user key identification information of feedback search is to awarding Quan Fang.Then, authorized party's user key that the authorized party provides according to the user key identification information is received.
It is described to obtain the step of being authorized to square public key and include:
According to the user identity information for being authorized to side in the authorising conditional information, and based on predetermined user identifier Mapping relations between information and client public key search authorized side's public key.Wherein, all client public key are preparatory It is stored on each node in the block chain.
In the present embodiment, authorized party's user key transmits again after passing through encryption, improves safety.
The present invention is based in the data processor 3rd embodiment of block chain, this implementation is in first embodiment, the second reality On the basis of applying example, the data processor based on block chain is also used to:
When to terminate an authorization, it is determined that the data category of authorization data to the end of.
Wherein, terminating the trigger condition that one authorizes includes:Receive end authorization requests;It is awarded alternatively, detecting and existing Weigh time limit overdue grant item.
When the corresponding data category of the authorization data to the end of is one, then according to the number of the authorization data to the end of According to classification, and based on the mapping relations between predetermined data category and user key identification information, determine described wait tie The corresponding user key identification information of the data category of beam authorization data.Then, it is corresponding to obtain the user key identification information User key, and the authorization data to the end of is decrypted using the user key of acquisition, to obtain State the corresponding clear data of the authorization data to the end of.Then, new user key is generated, using the new user key to obtaining The clear data obtained is encrypted, and to obtain new encryption data, and the new encryption data is stored to area In block chain on each node, so that each node generates new block based on the new encryption data, and the data directory is updated.Together When, and the new user key of generation is fed back into the corresponding user of the new user key, and save described new Mapping relations between user key identification information and data category, while saving the new user key identification information and using Mapping relations between the identification information of family;
When the corresponding data category of the authorization data to the end of be it is multiple, then according to described, authorization data is corresponding to the end of Multiple data categories determine and based on the mapping relations between predetermined data category and user key identification information The corresponding user key identification information of each data category.Then, the corresponding use of each user key identification information is obtained Family key, and the corresponding authorization data to the end of is decrypted using each user key of acquisition, to obtain Obtain the corresponding clear data of authorization data to the end of.Then, raw for the corresponding each data category of the clear data The user key of Cheng Xin, using each new user key, to the number of the corresponding data category of each new user key According to being encrypted, to obtain new encryption data, and the new encryption data is stored into block chain each node On, so that each node generates new block based on the new encryption data, and update the data directory.Meanwhile and by generation The new user key feeds back to the corresponding user of the new user key, and saves the new user key mark letter Mapping relations between breath and data category, while saving between new the user key identification information and user identity information Mapping relations.
If user key is managed on behalf of another by electronic device 1, the data processor based on block chain is also used to:
It is encrypted using user key new described in tissue key pair, and by the new user key of encryption It saves to key set.
Preferably, in the present embodiment, the data processor based on block chain is also used to:
When receiving data read request, judge whether the corresponding data to be read of the data read request are encryption Data;
If so, obtaining the corresponding user key of the data to be read;When getting, the data to be read are corresponding When user key, the data to be read are decrypted using the user key of acquisition described to be read to obtain The corresponding clear data of data, and the clear data is sent to the initiator of the data read request;When having not been obtained When the corresponding user key of the data to be read, then decryption failure news is fed back;
If it is not, then obtaining the corresponding data to be read of the data read request, and the data to be read are sent to The initiator of the data read request.
Further, the present invention also proposes that a kind of computer readable storage medium, the computer readable storage medium are deposited The data processor based on block chain is contained, the data processor based on block chain can be held by least one processor Row, so that at least one described processor executes the data processing method based on block chain in any of the above-described embodiment.
The above description is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all at this Under the inventive concept of invention, using equivalent structure transformation made by description of the invention and accompanying drawing content, or directly/use indirectly It is included in other related technical areas in scope of patent protection of the invention.

Claims (10)

1. a kind of electronic device, which is characterized in that the electronic device includes memory and processor, and the memory is stored with Based on the data processor of block chain, realized such as when the data processor based on block chain is executed by the processor Lower step:
Receive the data write request for carrying privacy attribute information;
According to the privacy attribute information, it is determined whether data to be written corresponding to the data write request carry out at encryption Reason;
When the data to be written are encrypted in determination, according to the privacy attribute information, and based on predetermined Encryption rule the data to be written are encrypted after, encrypted data to be written are stored into block chain Each node;
When determination is not encrypted the data to be written, directly the data to be written are stored into block chain Each node.
2. electronic device as described in claim 1, which is characterized in that the predetermined encryption rule is:
According to the corresponding user identity information of the data write request and predetermined user identity information and classifying rules Between mapping relations, search the corresponding classifying rules of the user identity information;
The classifying rules obtained according to lookup is determining and saves the data category of data to be written;
According between the data category and predetermined data category and user key identification information of determining data to be written Mapping relations, search the corresponding user key identification information of the data to be written;
The data to be written are encrypted using the corresponding user key of the user key identification information.
3. electronic device as claimed in claim 1 or 2, which is characterized in that the processor executes described based on block chain Data processor, also realization following steps:
When receiving the authorization requests for carrying authorising conditional information, obtain to the corresponding authorized party's user key of authorization data and It is authorized to side's public key;
Authorized party's user key is encrypted using authorized side's public key, the authorized side receives the authorization of encryption After square user key, authorized party's user key of the encryption is decrypted using the private key for user of the authorized side To obtain authorized party's user key.
4. electronic device as described in claim 3, which is characterized in that described obtain is used to the corresponding authorized party of authorization data The step of family key includes:
According to the user identity information and predetermined user identity information and key of authorized party in the authorising conditional information Mapping relations between collection determine in memory space with the presence or absence of the corresponding key set of the authorized party;
When determining key set corresponding there are the authorized party, the corresponding key set of the authorized party is obtained, is awarded according to described Weigh in condition data to authorization data identification information and predetermined data identification information and user key identification information it Between mapping relations, the authorized party to the corresponding encryption of authorization data is searched in the corresponding key set of the authorized party and is used Family key is decrypted authorized party's user key of the encryption of lookup according to preset-key decryption rule, to obtain It obtains described to the corresponding authorized party's user key of authorization data;
When determining there is no when the corresponding key set of the authorized party, according in the authorising conditional data to authorization data mark Know the mapping relations between information and predetermined data identification information and user key identification information, searches described wait authorize The corresponding user key identification information of data, the user key identification information of feedback search to authorized party are awarded described in reception Authorized party's user key that power root is provided according to the user key identification information.
5. electronic device as claimed in claim 3, which is characterized in that described to obtain the step of being authorized to square public key and include:
According to the user identity information and predetermined user identity information that are authorized to side in the authorising conditional information and use Mapping relations between the public key of family search authorized side's public key, wherein all client public key are stored in advance in institute State each node in block chain.
6. a kind of data processing method based on block chain, which is characterized in that the method comprising the steps of:
Receive the data write request for carrying privacy attribute information;
According to the privacy attribute information, it is determined whether data to be written corresponding to the data write request carry out at encryption Reason;
When the data to be written are encrypted in determination, according to the privacy attribute information, and based on predetermined Encryption rule the data to be written are encrypted after, encrypted data to be written are stored into block chain Each node;
When determination is not encrypted the data to be written, directly the data to be written are stored into block chain Each node.
7. the data processing method as claimed in claim 6 based on block chain, which is characterized in that the predetermined encryption Rule is:
According to the corresponding user identity information of the data write request and predetermined user identity information and classifying rules Between mapping relations, search the corresponding classifying rules of the user identity information;
The classifying rules obtained according to lookup is determining and saves the data category of data to be written;
According between the data category and predetermined data category and user key identification information of determining data to be written Mapping relations, search the corresponding user key identification information of the data to be written;
The data to be written are encrypted using the corresponding user key of the user key identification information.
8. the data processing method based on block chain as claimed in claims 6 or 7, which is characterized in that described to be based on block chain Data processing method further include:
When receiving the authorization requests for carrying authorising conditional information, obtain to the corresponding authorized party's user key of authorization data and It is authorized to side's public key;
Authorized party's user key is encrypted using authorized side's public key, receives awarding for encryption for the authorized side After power side's user key, place is decrypted to authorized party's user key of the encryption using the private key for user of the authorized side Reason is to obtain authorized party's user key.
9. the data processing method as described in claim 8 based on block chain, which is characterized in that described to obtain number to be authorized Include according to the step of corresponding authorized party's user key:
According to the user identity information and predetermined user identity information and key of authorized party in the authorising conditional information Mapping relations between collection determine in memory space with the presence or absence of the corresponding key set of the authorized party;
When determining key set corresponding there are the authorized party, the corresponding key set of the authorized party is obtained, is awarded according to described Weigh in condition data to authorization data identification information and predetermined data identification information and user key identification information it Between mapping relations, the authorized party to the corresponding encryption of authorization data is searched in the corresponding key set of the authorized party and is used Family key is decrypted authorized party's user key of the encryption of lookup according to preset-key decryption rule, to obtain It obtains described to the corresponding authorized party's user key of authorization data;
When determining there is no when the corresponding key set of the authorized party, according in the authorising conditional data to authorization data mark Know the mapping relations between information and predetermined data identification information and user key identification information, searches described wait authorize The corresponding user key identification information of data;The user key identification information of feedback search is awarded described in reception to authorized party Authorized party's user key that power root is provided according to the user key identification information;
It is described to obtain the step of being authorized to square public key and include:
According to the user identity information and predetermined user identity information that are authorized to side in the authorising conditional information and use Mapping relations between the public key of family search authorized side's public key, wherein all client public key are stored in advance in institute State each node in block chain.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has based on block The data processor of chain, the data processor based on block chain can be executed by least one processor, so that described At least one processor executes the data processing method based on block chain as described in any one of claim 6-9.
CN201810387989.4A 2018-04-26 2018-04-26 Electronic device, block chain-based data processing method, and computer storage medium Active CN108900464B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810387989.4A CN108900464B (en) 2018-04-26 2018-04-26 Electronic device, block chain-based data processing method, and computer storage medium
PCT/CN2018/102130 WO2019205380A1 (en) 2018-04-26 2018-08-24 Electronic device, blockchain-based data processing method and program, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810387989.4A CN108900464B (en) 2018-04-26 2018-04-26 Electronic device, block chain-based data processing method, and computer storage medium

Publications (2)

Publication Number Publication Date
CN108900464A true CN108900464A (en) 2018-11-27
CN108900464B CN108900464B (en) 2021-07-23

Family

ID=64342370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810387989.4A Active CN108900464B (en) 2018-04-26 2018-04-26 Electronic device, block chain-based data processing method, and computer storage medium

Country Status (2)

Country Link
CN (1) CN108900464B (en)
WO (1) WO2019205380A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109977687A (en) * 2019-04-02 2019-07-05 深圳智乾区块链科技有限公司 Data sharing method, device, system and readable storage medium storing program for executing based on block chain
CN110264193A (en) * 2019-05-20 2019-09-20 阿里巴巴集团控股有限公司 In conjunction with the receipt storage method and node of user type and type of transaction
CN110380871A (en) * 2019-08-29 2019-10-25 北京艾摩瑞策科技有限公司 The allograph method and device thereof of the user blocks chain private key of search platform
CN110380870A (en) * 2019-08-29 2019-10-25 北京艾摩瑞策科技有限公司 The allograph method and device thereof of the block chain private key of electric business platform user
CN110401543A (en) * 2019-08-29 2019-11-01 北京艾摩瑞策科技有限公司 It is related to the allograph method and device thereof of the block chain private key of recruitment platform user
CN110401544A (en) * 2019-08-29 2019-11-01 北京艾摩瑞策科技有限公司 The allograph method and device thereof of the block chain private key of knowledge payment platform user
CN110545189A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Block chain private key signing method and device for community platform users
CN110545187A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 User block chain private key signing method and device relating to travel platform
CN110545178A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 block chain private key signing method and device for investigation platform user
CN110545186A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Block chain private key signing method and device for advertisement platform user
CN110545188A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 User block chain private key signing method and device related to self-media platform
CN110543773A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Method and device for signing private key of block chain of knowledge question and answer platform user
CN110545190A (en) * 2019-09-06 2019-12-06 腾讯科技(深圳)有限公司 signature processing method, related device and equipment
CN110543786A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 method and device for signing block chain private key of shared economic platform user
CN110544093A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 block chain private key signing method and device related to renting platform user
CN110545177A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Block chain private key signing method and device for life service platform user
CN110650191A (en) * 2019-09-20 2020-01-03 浪潮电子信息产业股份有限公司 Data read-write method of distributed storage system
CN111639363A (en) * 2020-05-24 2020-09-08 石高峰 Data analysis method based on block chain and edge computing server
CN112272086A (en) * 2020-10-23 2021-01-26 安徽中科美络信息技术有限公司 Data encryption transmission method and system and intelligent terminal

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113595A (en) * 2014-07-09 2014-10-22 武汉邮电科学研究院 Mixed cloud storage system and method based on safety grading
CN106506493A (en) * 2016-10-27 2017-03-15 摩登大道时尚电子商务有限公司 Data processing method based on block platform chain
CN107124271A (en) * 2017-04-28 2017-09-01 成都梆梆信息科技有限公司 A kind of data encryption, decryption method and equipment
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
CN107426170A (en) * 2017-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain
US20170353860A1 (en) * 2015-11-19 2017-12-07 Beijing Nanbao Technology Co. Ltd. Method and Apparatus of Triggering Applications In a Wireless Environment
CN107465656A (en) * 2017-06-14 2017-12-12 广州宏和网络科技有限公司 A kind of safety monitoring big data processing method and system based on cloud computing
CN107483446A (en) * 2017-08-23 2017-12-15 上海点融信息科技有限责任公司 Encryption method, equipment and system for block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107240001B (en) * 2017-06-06 2020-12-04 北京汇通金财信息科技有限公司 Transaction method and system for digital assets
CN107292181B (en) * 2017-06-20 2020-05-19 无锡井通网络科技有限公司 Database system based on block chain and using method using system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113595A (en) * 2014-07-09 2014-10-22 武汉邮电科学研究院 Mixed cloud storage system and method based on safety grading
US20170353860A1 (en) * 2015-11-19 2017-12-07 Beijing Nanbao Technology Co. Ltd. Method and Apparatus of Triggering Applications In a Wireless Environment
CN106506493A (en) * 2016-10-27 2017-03-15 摩登大道时尚电子商务有限公司 Data processing method based on block platform chain
CN107124271A (en) * 2017-04-28 2017-09-01 成都梆梆信息科技有限公司 A kind of data encryption, decryption method and equipment
CN107426170A (en) * 2017-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain
CN107465656A (en) * 2017-06-14 2017-12-12 广州宏和网络科技有限公司 A kind of safety monitoring big data processing method and system based on cloud computing
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
CN107483446A (en) * 2017-08-23 2017-12-15 上海点融信息科技有限责任公司 Encryption method, equipment and system for block chain

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109977687A (en) * 2019-04-02 2019-07-05 深圳智乾区块链科技有限公司 Data sharing method, device, system and readable storage medium storing program for executing based on block chain
CN110264193A (en) * 2019-05-20 2019-09-20 阿里巴巴集团控股有限公司 In conjunction with the receipt storage method and node of user type and type of transaction
CN110545188A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 User block chain private key signing method and device related to self-media platform
CN110543786A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 method and device for signing block chain private key of shared economic platform user
CN110401543A (en) * 2019-08-29 2019-11-01 北京艾摩瑞策科技有限公司 It is related to the allograph method and device thereof of the block chain private key of recruitment platform user
CN110401544A (en) * 2019-08-29 2019-11-01 北京艾摩瑞策科技有限公司 The allograph method and device thereof of the block chain private key of knowledge payment platform user
CN110545189A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Block chain private key signing method and device for community platform users
CN110545187A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 User block chain private key signing method and device relating to travel platform
CN110545178A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 block chain private key signing method and device for investigation platform user
CN110545186A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Block chain private key signing method and device for advertisement platform user
CN110380871A (en) * 2019-08-29 2019-10-25 北京艾摩瑞策科技有限公司 The allograph method and device thereof of the user blocks chain private key of search platform
CN110543773A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Method and device for signing private key of block chain of knowledge question and answer platform user
CN110380870B (en) * 2019-08-29 2020-12-22 北京瑞策科技有限公司 Block chain private key signing method and device for e-commerce platform user
CN110380870A (en) * 2019-08-29 2019-10-25 北京艾摩瑞策科技有限公司 The allograph method and device thereof of the block chain private key of electric business platform user
CN110544093A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 block chain private key signing method and device related to renting platform user
CN110545177A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Block chain private key signing method and device for life service platform user
CN110545190A (en) * 2019-09-06 2019-12-06 腾讯科技(深圳)有限公司 signature processing method, related device and equipment
CN110545190B (en) * 2019-09-06 2021-08-13 腾讯科技(深圳)有限公司 Signature processing method, related device and equipment
CN110650191A (en) * 2019-09-20 2020-01-03 浪潮电子信息产业股份有限公司 Data read-write method of distributed storage system
CN111639363A (en) * 2020-05-24 2020-09-08 石高峰 Data analysis method based on block chain and edge computing server
CN111639363B (en) * 2020-05-24 2020-12-25 深圳市诚意信科技有限公司 Data analysis method based on block chain and edge computing server
CN112272086A (en) * 2020-10-23 2021-01-26 安徽中科美络信息技术有限公司 Data encryption transmission method and system and intelligent terminal
CN112272086B (en) * 2020-10-23 2024-06-11 中科美络科技股份有限公司 Data encryption transmission method, system and intelligent terminal

Also Published As

Publication number Publication date
CN108900464B (en) 2021-07-23
WO2019205380A1 (en) 2019-10-31

Similar Documents

Publication Publication Date Title
CN108900464A (en) Electronic device, data processing method and computer storage medium based on block chain
US11973750B2 (en) Federated identity management with decentralized computing platforms
CN111046352B (en) Identity information security authorization system and method based on block chain
CN109643359B (en) Verification of control key-value store
CN102811239B (en) A kind of dummy machine system and its method of controlling security
CN110071940A (en) Software package encipher-decipher method, server, user equipment and storage medium
CN104506487B (en) The credible execution method of privacy policy under cloud environment
US20190141048A1 (en) Blockchain identification system
US8060464B2 (en) Data-centric distributed computing
CN102724044A (en) Electronic evidence verification and preservation method
CN116980230B (en) Information security protection method and device
WO2019205389A1 (en) Electronic device, authentication method based on block chain, and program and computer storage medium
US20180227288A1 (en) Password security
CN108768963A (en) The communication means and system of trusted application and safety element
US20240169092A1 (en) Data sharing method and electronic device
CN115270193B (en) Data file secure sharing method and device based on block chain and collaborative synchronization
CN103024035A (en) Safe and energy-saving encryption searching method based on mobile cloud platform
CN111934882B (en) Identity authentication method and device based on block chain, electronic equipment and storage medium
CN113239401A (en) Big data analysis system and method based on power Internet of things and computer storage medium
CN116432193A (en) Financial database data protection transformation method and financial data protection system thereof
CN113641976B (en) Method and device for remote service handling, electronic equipment and storage medium
CN115643090A (en) Longitudinal federal analysis method, device, equipment and medium based on privacy retrieval
CN112988888B (en) Key management method, device, electronic equipment and storage medium
Wang et al. A trust-based evaluation model for data privacy protection in cloud computing
CN107239682A (en) A kind of computer internet information safety control system based on cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant