CN109194633A - Address book backup method and system - Google Patents

Address book backup method and system Download PDF

Info

Publication number
CN109194633A
CN109194633A CN201810951324.1A CN201810951324A CN109194633A CN 109194633 A CN109194633 A CN 109194633A CN 201810951324 A CN201810951324 A CN 201810951324A CN 109194633 A CN109194633 A CN 109194633A
Authority
CN
China
Prior art keywords
address list
block chain
contract
node
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810951324.1A
Other languages
Chinese (zh)
Other versions
CN109194633B (en
Inventor
张�林
刘昭
姜新秀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Smart Cloud Chain Network Technology Co Ltd
Original Assignee
Shandong Smart Cloud Chain Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Smart Cloud Chain Network Technology Co Ltd filed Critical Shandong Smart Cloud Chain Network Technology Co Ltd
Priority to CN201810951324.1A priority Critical patent/CN109194633B/en
Publication of CN109194633A publication Critical patent/CN109194633A/en
Application granted granted Critical
Publication of CN109194633B publication Critical patent/CN109194633B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The application provides a kind of address book backup method and system, and address book backup system includes the block chain network being made of user node and multiple contracts operation node, and user node is requested to the publication address list modification of block chain network;At least one contract operation node in block chain network searches corresponding public key and verifying is decrypted to the address list modification item of encryption by preconfigured block chain intelligence contract;At least one contract runs node after being verified, and generates address list modification record according to identity and address list modification item corresponding relationship, and the address list modification record is synchronized to the operation node of other contracts in block chain network.The backup of address list is carried out by way of using intelligent contract in block chain network, the risk of loss of data can be reduced by distributed backup mode, and personal data can be reduced in such a way that intelligent contract carries out encryption and decryption verifying and revealed or by the risk of falsification.

Description

Address book backup method and system
Technical field
This application involves block chain technical fields, in particular to a kind of address book backup method and system.
Background technique
With the development of information technology, the communication way of people is more partial to link up on telephonic communication or line, communication Record becomes more and more important as the pith for recording interpersonal contact method.Various fortuitous events cause in order to prevent Address list lose, need to back up address list.
It in the address book backup technology of the prior art, or is backed up in user terminal is locally stored, or in other clothes The cloud storage space of business provider is backed up.But backed up using local storage space, it is easy because of user terminal The damage of itself causes backup address list that can not restore;And by the way of the backup of cloud, and be easy because secrecy dynamics is inadequate Lead to leakage of personal information.
Summary of the invention
In order to overcome above-mentioned deficiency in the prior art, the application's is designed to provide a kind of address book backup method, Applied to address book backup system, the address book backup system includes being made of user node and multiple contracts operation node Block chain network, the contract operation node are previously stored with the identity of user and the corresponding relationship of public key;The method Include:
The user node modifies request and includes to block chain network publication address list modification request, the address list The address list modification item of the identity of user and the public key encryption by the user;
At least one contract operation node in the block chain network passes through preconfigured block chain intelligence contract, root According to the identity in address list modification request search corresponding public key to the address list modification item of encryption into Row decryption verification;
At least one contract operation node is modified after being verified according to the identity and the address list Item corresponding relationship generates address list modification record, and the address list modification record is synchronized to other in the block chain network Contract runs node.
Optionally, the method also includes:
The user node issues address list acquisition request to the block chain network, wraps in the address list acquisition request It includes the identity of the user and signing messages is generated by the private key of the user;
At least one contract operation node in the block chain network is by the block chain intelligence contract, to described logical News record acquisition request is verified, and searches corresponding address list modification record life according to the identity after being verified The user node is sent at backup address list.
Optionally, the contract operation node generates the step of backup address list is sent to the user node, comprising:
The contract operation node is sent out after carrying out asymmetric encryption to the backup address list by the public key of the user Give the user node;
The method also includes:
The user node is decrypted the backup address list for receiving encryption by the private key of user, after decryption Backup address list update the address list of user node local.
Optionally, the method also includes:
The user node issues address list request to create to the block chain network, and the address list request to create includes The address list to be backed up of the identity of user and the public key encryption by the user;
At least one contract operation node in the block chain network verifies the address list by the intelligent contract Request to create;
Described at least one contract operation node distribute memory space after verification passes through, for the user with record it is described to Backup address list, and the address list synchronization to be backed up is run into node to other contracts in the block chain network.
Optionally, the block chain network further includes contract check-node;The method also includes:
A contract in the multiple contract operation node runs node and sends contract posting request to block chain network, It include block chain intelligence contract to be released in the contract posting request;
Contract check-node described at least one of described block chain network intelligently closes the block chain to be released It is about verified, and runs node for the contract in the block chain network is synchronized to by the block chain intelligence contract verified;
The contract operation node receives and runs the block chain intelligence contract by verification.
The another object of the application is to provide a kind of address book backup system, the address book backup system include by with The block chain network of family node and multiple contracts operation node composition, the contract operation node are previously stored with the identity of user The corresponding relationship of mark and public key;
The user node is used for block chain network publication address list modification request, the address list modification request The address list modification item of identity including user and the public key encryption by the user;
At least one contract operation node in the block chain network is used to intelligently close by preconfigured block chain About, corresponding public key is searched according to the identity in address list modification request to modify the address list of encryption Verifying is decrypted in item;And after being verified, generated according to the identity and the address list modification item corresponding relationship Address list modification record, and the address list modification record is synchronized to the operation node of other contracts in the block chain network.
Optionally, the user node is also used to issue address list acquisition request, the communication to the block chain network It records and in acquisition request includes the identity of the user and signing messages is generated by the private key of the user;
At least one contract operation node in the block chain network is also used to through the block chain intelligence contract, right The address list acquisition request is verified, and is searched corresponding address list according to the identity after being verified and modified Record generates backup address list and is sent to the user node.
Optionally, the contract operation node is when generation backup address list is sent to the user node, by described The public key of user is sent to the user node after carrying out asymmetric encryption to the backup address list;
The user node is decrypted the backup address list for receiving encryption by the private key of user, after decryption Backup address list update the address list of user node local.
Optionally, the user node is also used to issue address list request to create, the communication to the block chain network Recording request to create includes the identity of user and the address list to be backed up of the public key encryption by the user;
At least one contract operation node in the block chain network is also used to by described in the intelligent contract verification Address list request to create;And after verification passes through, memory space is distributed for the user to record the address list to be backed up, and will The address list synchronization to be backed up runs node to other contracts in the block chain network.
Optionally, the address book backup system further includes contract check-node;
Contract operation node in the multiple contract operation node is also used to send contract hair to block chain network Cloth is requested, and includes block chain intelligence contract to be released in the contract posting request;
Contract check-node described at least one of described block chain network is used for the block chain intelligence to be released Energy contract is verified, and the operation section of the contract in the block chain network will be synchronized to by the block chain intelligence contract verified Point;
The contract operation node is also used to receive and run the block chain intelligence contract by verification.
In terms of existing technologies, the application has the advantages that
Address book backup method and system provided by the embodiments of the present application, by using intelligent contract in block chain network Mode carry out the backup of address list, the risk of loss of data can be reduced by distributed backup mode, and pass through The mode that intelligent contract carries out encryption and decryption verifying can reduce personal data leakage or by the risk of falsification.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the schematic diagram of address book backup system provided by the embodiments of the present application;
Fig. 2 is one of the flow diagram of address book backup method provided by the embodiments of the present application;
Fig. 3 is the two of the flow diagram of address book backup method provided by the embodiments of the present application;
Fig. 4 is the three of the flow diagram of address book backup method provided by the embodiments of the present application;
Fig. 5 is the four of the flow diagram of address book backup method provided by the embodiments of the present application.
Icon: 10- address book backup system;100- user node;200- contract runs node;300- identity; 400- contract check-node.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is implemented The component of example can be arranged and be designed with a variety of different configurations.
Therefore, the detailed description of the embodiments herein provided in the accompanying drawings is not intended to limit below claimed Scope of the present application, but be merely representative of the selected embodiment of the application.Based on the embodiment in the application, this field is common Technical staff's every other embodiment obtained without creative efforts belongs to the model of the application protection It encloses.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.
In the description of the present application, it is also necessary to which explanation is unless specifically defined or limited otherwise, term " setting ", " installation ", " connected ", " connection " shall be understood in a broad sense, for example, it may be fixedly connected, may be a detachable connection or one Connect to body;It can be mechanical connection, be also possible to be electrically connected;It can be directly connected, it can also be indirect by intermediary It is connected, can be the connection inside two elements.For the ordinary skill in the art, on being understood with concrete condition State the concrete meaning of term in this application.
Fig. 1 is please referred to, Fig. 1 is the schematic diagram of address book backup system 10 provided in this embodiment, in the present embodiment, institute Address book backup system 10 is stated to establish in the block chain network being made of user node 100 and multiple contracts operation node 200.
Wherein, the contract operation node 200 may include, but be not limited only to, the node of communication operator offer, movement The node of node, the node that mobile application service supplier provides or the offer of regulator part that terminal manufacturer provides.This A little contract operation nodes 200 can provide address book backup by the intelligent contract disposed in advance for user or restore to service.
The user node 100 may include, but be not limited only to, and need to carry out using backup communication or restore the shifting of service The equipment such as dynamic terminal, plate telegram or PC.
Referring to figure 2., Fig. 2 is the process of the address book backup method applied to address book backup system 10 shown in FIG. 1 Figure, below will be to the method includes each steps to be described in detail.
In the present embodiment, user can register it in the address book backup system 10 by the modes such as registered in advance The corresponding relationship of identity 300 and public key, wherein the public key can be by the private key of user cipher device for example, by public key encryption Preset algorithm generates in standard (Public Key Cryptography Standards, abbreviation PKCS), the identity 300 can be to pass through multiple Hash operation generation address by described.
In the present embodiment, the private key is only stored by individual subscriber, is unique identities of the user in block chain network Voucher, the identity 300 are used for the data that identity user backs up in the block chain network, appointing in addition to user Who can not access its corresponding storing data.With the data of the public key encryption, can only be decrypted with corresponding private key.
Firstly, in the present embodiment, it referring to figure 2., can be by step S110 to step S130 in the block link network The backup of address list is carried out in network.Step S110 is described in detail to step S130 below.
Step S110, the user node 100 issue address list request to create, the address list to the block chain network Request to create includes the identity 300 of user and the address list to be backed up of the public key encryption by the user.
It in the present embodiment, can be on the user node 100 when user is when needing to carry out for the first time address book backup Address list to be backed up is encrypted by the public key of the user, then according to encrypted address list to be backed up and the user Identity 300 generate the address list request to create, and the address list request to create is issued in the block chain network On, with the operation code of the newly-built address list in block chain intelligence contract described in request call.
Step S120, at least one contract operation node 200 in the block chain network pass through the intelligent contract school Test the address list request to create.
In the present embodiment, communication of at least one contract operation node 200 to receiving in the block chain network Record request to create is verified, and searches the corresponding public key of identity 300 in the address list request to create, and with finding Public key to it is described it is encrypted it is to be backed up communication verifying is decrypted.
Step S130, at least one contract operation node 200 distribute memory space after verification passes through for the user To record the address list to be backed up, and the address list synchronization to be backed up is transported to other contracts in the block chain network Row node 200.
In the present embodiment, at least one contract operation node 200 triggers the block chain intelligence after verification passes through Energy contract creates an individual memory space for the user, and the address list to be backed up is stored in the memory space.Meanwhile The contract runs node 200 and the address list synchronization to be backed up is also run node to other contracts in the block chain network 200, so that other contract operation nodes 200 is also stored the address list to be backed up.
After backing up to address list, user can may also need to carry out the address list of backup because of a variety of causes new Increase, modify or deletes.Therefore in the present embodiment, referring to figure 3., backup communication can be carried out to step S230 by step S210 The modification of record operates.
Step S210, the user node 100 are requested to block chain network publication address list modification, the address list Modification request includes the identity 300 of user and the address list modification item of the public key encryption by the user.
In the present embodiment, the user node 100 only will can have the part of modification to repair as address list in address list Change item, then the address list modification item encrypted using the public key of user, and by encrypted address list modification item with The identity information of the user is published in the block chain network together as address list modification request.
Step S220, at least one contract operation node 200 in the block chain network pass through preconfigured block Chain intelligence contract searches corresponding public key to the institute of encryption according to the identity 300 in address list modification request It states address list modification item and verifying is decrypted.
In the present embodiment, the contract operation node 200 in the block chain network can be modified the address list is extracted Then the identity 300 in request searches corresponding public key according to the identity 300, then with the public affairs found Verifying is decrypted to the address list modification item of encryption in key.
Step S230, at least one contract operation node 200 is after being verified, according to the identity 300 Address list modification record is generated with the address list modification item corresponding relationship, and the address list modification record is synchronized to the area Other contracts in block chain network run node 200.
If the contract operation node 200 verified is verified encrypted address list modification item, then it represents that corresponding Address list modification request be to be sent by true user, then contract operation node 200 generates corresponding address list modification It records and is synchronized to other contracts operation node 200.
Optionally, in the present embodiment, all contract operation nodes 200 address list can be modified request into Row verifying, and have the contract for being initially completed verifying operation node 200 that the address list modification record generated after verifying is synchronized to it He runs node 200 by contract.
Referring to figure 4., the address list of backup can also be obtained by step S310 and step S320 in the present embodiment, under It is described in detail in face of step S310 and step S320.
Step S310, the user node 100 issue address list acquisition request, the address list to the block chain network Identity 300 in acquisition request including the user and the private key generation signing messages by the user.
In the present embodiment, it when the damage of the address list of user local or user replace mobile terminal, needs from described logical Address list before news record standby system 10 obtains.At this point it is possible to by being stepped on the user node 100 for needing the address list for obtaining backup Enter the block chain network, generates the address list acquisition request including User Identity 300, and using the private key pair of user The address list acquisition request is signed.
Step S320, at least one contract operation node 200 in the block chain network pass through the block chain intelligence Contract verifies the address list acquisition request, and is searched accordingly after being verified according to the identity 300 Address list modification record generates backup address list and is sent to the user node 100.
Contract node in the block chain network is after receiving the address list acquisition request, according to what is wherein carried Identity 300 is searched corresponding public key and is verified to signature.If being verified, identify true when the address list acquisition request What real user sent, then contract operation node 200 generates backup communication according to the address list modification record of the user before It records and is sent to the user node 100.
It optionally, is the leakage of data in mode transmission process, in the present embodiment, the contract operation node 200 is logical It crosses after the public key of the user carries out asymmetric encryption to the backup address list and is sent to the user node 100.
Then, the user node 100 is decrypted the backup address list for receiving encryption by the private key of user, root The local address list of the user node 100 is updated according to the backup address list after decryption.
In order to guarantee the safety of the block chain intelligence contract deployment, the leaky intelligent contract of mode is disposed, In the present embodiment, the block chain network can also include contract check-node 400.Referring to figure 5., the block chain intelligence is disposed The process of energy contract can pass through step S410, step S420 and step S430.
Step S410, the multiple contract run a contract in node 200 and run node 200 to block chain network hair Contract posting request is sent, includes block chain intelligence contract to be released in the contract posting request.
Step S420, to described to be released in contract check-node 400 described at least one of described block chain network Block chain intelligence contract verified, and will by verify block chain intelligence contract be synchronized in the block chain network Contract runs node 200.
Step S430, the contract operation node 200 receive and run the block chain intelligence contract by verification.
In this way, the block chain intelligence contract issued by 400 Duis of the contract check-node verifies, leakage can have been filtered The contract in hole improves the safety of data in block chain network.
In conclusion the application carries out the backup of address list by way of using intelligent contract in block chain network, The risk of loss of data can be reduced by distributed backup mode, and encryption and decryption verifying is carried out by intelligent contract Mode can reduce personal data leakage or by the risk of falsification.
In embodiment provided herein, it should be understood that disclosed device and method, it can also be by other Mode realize.The apparatus embodiments described above are merely exemplary, for example, the flow chart and block diagram in attached drawing are shown According to device, the architectural framework in the cards of method and computer program product, function of multiple embodiments of the application And operation.In this regard, each box in flowchart or block diagram can represent one of a module, section or code Point, a part of the module, section or code includes one or more for implementing the specified logical function executable Instruction.It should also be noted that function marked in the box can also be attached to be different from some implementations as replacement The sequence marked in figure occurs.For example, two continuous boxes can actually be basically executed in parallel, they sometimes may be used To execute in the opposite order, this depends on the function involved.It is also noted that each of block diagram and or flow chart The combination of box in box and block diagram and or flow chart can be based on the defined function of execution or the dedicated of movement The system of hardware is realized, or can be realized using a combination of dedicated hardware and computer instructions.
In addition, each functional module in each embodiment of the application can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-OnlyMemory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain Lid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.

Claims (10)

1. a kind of address book backup method, which is characterized in that be applied to address book backup system, the address book backup system packet The block chain network being made of user node and multiple contracts operation node is included, the contract operation node is previously stored with user Identity and public key corresponding relationship;The described method includes:
For the user node to block chain network publication address list modification request, the address list modification request includes user Identity and the public key encryption by the user address list modification item;
At least one contract operation node in the block chain network is by preconfigured block chain intelligence contract, according to institute The identity stated in address list modification request is searched corresponding public key and is solved to the address list modification item of encryption Close verifying;
At least one contract operation node is after being verified, according to the identity and the address list modification item pair It should be related to and generate address list modification record, and the address list modification record is synchronized to other contracts in the block chain network Run node.
2. the method according to claim 1, wherein the method also includes:
The user node issues address list acquisition request to the block chain network, and including in the address list acquisition request should The identity of user and by the user private key generate signing messages;
At least one contract operation node in the block chain network is by the block chain intelligence contract, to the address list Acquisition request is verified, and standby according to the corresponding address list modification record generation of identity lookup after being verified Part address list is sent to the user node.
3. according to the method described in claim 2, it is characterized in that,
The contract operation node generates the step of backup address list is sent to the user node, comprising:
The contract operation node is sent to after carrying out asymmetric encryption to the backup address list by the public key of the user The user node;
The method also includes:
The user node is decrypted the backup address list for receiving encryption by the private key of user, according to standby after decryption Part address list updates the address list of user node local.
4. the method according to claim 1, wherein the method also includes:
The user node issues address list request to create to the block chain network, and the address list request to create includes user Identity and the public key encryption by the user address list to be backed up;
At least one contract operation node in the block chain network verifies the address list creation by the intelligent contract Request;
It is described to be backed up to record that at least one contract operation node distributes memory space after verification passes through, for the user Address list, and the address list synchronization to be backed up is run into node to other contracts in the block chain network.
5. the method according to claim 1, wherein the block chain network further includes contract check-node;Institute State method further include:
A contract in the multiple contract operation node runs node and sends contract posting request to block chain network, described It include block chain intelligence contract to be released in contract posting request;
Contract check-node described at least one of described block chain network to the block chain intelligence contract to be released into Row verification, and node is run by the contract in the block chain network is synchronized to by the block chain intelligence contract verified;
The contract operation node receives and runs the block chain intelligence contract by verification.
6. a kind of address book backup system, which is characterized in that the address book backup system includes by user node and multiple conjunctions The about block chain network of operation node composition, the contract operation node are previously stored with the identity of user and pair of public key It should be related to;
The user node is used for block chain network publication address list modification request, and the address list modification request includes The address list modification item of the identity of user and the public key encryption by the user;
At least one contract operation node in the block chain network is for passing through preconfigured block chain intelligence contract, root According to the identity in address list modification request search corresponding public key to the address list modification item of encryption into Row decryption verification;And after being verified, is generated and communicated according to the identity and the address list modification item corresponding relationship Modification record is recorded, and the address list modification record is synchronized to the operation node of other contracts in the block chain network.
7. system according to claim 6, which is characterized in that
The user node is also used to issue address list acquisition request to the block chain network, in the address list acquisition request Identity including the user and the private key generation signing messages by the user;
At least one contract operation node in the block chain network is also used to by the block chain intelligence contract, to described Address list acquisition request is verified, and searches corresponding address list modification record according to the identity after being verified It generates backup address list and is sent to the user node.
8. system according to claim 7, which is characterized in that
The contract operation node passes through the public key pair of the user when generation backup address list is sent to the user node The backup address list is sent to the user node after carrying out asymmetric encryption;
The user node is decrypted the backup address list for receiving encryption by the private key of user, according to standby after decryption Part address list updates the address list of user node local.
9. system according to claim 6, which is characterized in that
The user node is also used to issue address list request to create, the address list request to create packet to the block chain network Include the identity of user and the address list to be backed up of the public key encryption by the user;
At least one contract operation node in the block chain network is also used to verify the communication by the intelligent contract Record request to create;And after verification passes through, memory space is distributed for the user to record the address list to be backed up, and will be described Address list synchronization to be backed up runs node to other contracts in the block chain network.
10. system according to claim 6, which is characterized in that the address book backup system further includes contract verification section Point;
Contract operation node in the multiple contract operation node is also used to send contract publication to block chain network and ask It asks, includes block chain intelligence contract to be released in the contract posting request;
Contract check-node described at least one of described block chain network is used to intelligently close the block chain to be released It is about verified, and runs node for the contract in the block chain network is synchronized to by the block chain intelligence contract verified;
The contract operation node is also used to receive and run the block chain intelligence contract by verification.
CN201810951324.1A 2018-08-21 2018-08-21 Address book backup method and system Active CN109194633B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810951324.1A CN109194633B (en) 2018-08-21 2018-08-21 Address book backup method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810951324.1A CN109194633B (en) 2018-08-21 2018-08-21 Address book backup method and system

Publications (2)

Publication Number Publication Date
CN109194633A true CN109194633A (en) 2019-01-11
CN109194633B CN109194633B (en) 2021-08-10

Family

ID=64918627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810951324.1A Active CN109194633B (en) 2018-08-21 2018-08-21 Address book backup method and system

Country Status (1)

Country Link
CN (1) CN109194633B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756579A (en) * 2019-03-05 2019-05-14 深圳众享互联科技有限公司 A kind of Internet of Things Information Secure Transmission System and transmission method based on block chain
CN109933629A (en) * 2019-03-15 2019-06-25 腾讯科技(深圳)有限公司 Method of data synchronization, device, computer equipment and readable storage medium storing program for executing
CN110266872A (en) * 2019-05-30 2019-09-20 世纪龙信息网络有限责任公司 Management-control method, device and the cloud address book system of address book data
CN111127021A (en) * 2019-12-31 2020-05-08 支付宝(杭州)信息技术有限公司 Service request method and device based on block chain
CN111241557A (en) * 2019-12-31 2020-06-05 支付宝(杭州)信息技术有限公司 Service request method and device based on block chain
CN114979378A (en) * 2022-05-07 2022-08-30 中移互联网有限公司 Incoming call processing method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150379510A1 (en) * 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.
CN106919419A (en) * 2017-02-03 2017-07-04 中钞信用卡产业发展有限公司北京智能卡技术研究院 The update method and device of the intelligent contract program on block chain
CN107122673A (en) * 2017-03-09 2017-09-01 深圳市金立通信设备有限公司 A kind of information ciphering method and terminal
CN107171794A (en) * 2017-06-27 2017-09-15 葛峰 A kind of electronic document based on block chain and intelligent contract signs method
CN107240010A (en) * 2016-03-25 2017-10-10 中国人民银行印制科学技术研究所 The method and system of digital cash is transferred to digital cash chip card
CN107911819A (en) * 2017-11-30 2018-04-13 江苏通付盾科技有限公司 The method and system of packing node are chosen based on phone number

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150379510A1 (en) * 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.
CN107240010A (en) * 2016-03-25 2017-10-10 中国人民银行印制科学技术研究所 The method and system of digital cash is transferred to digital cash chip card
CN106919419A (en) * 2017-02-03 2017-07-04 中钞信用卡产业发展有限公司北京智能卡技术研究院 The update method and device of the intelligent contract program on block chain
CN107122673A (en) * 2017-03-09 2017-09-01 深圳市金立通信设备有限公司 A kind of information ciphering method and terminal
CN107171794A (en) * 2017-06-27 2017-09-15 葛峰 A kind of electronic document based on block chain and intelligent contract signs method
CN107911819A (en) * 2017-11-30 2018-04-13 江苏通付盾科技有限公司 The method and system of packing node are chosen based on phone number

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756579A (en) * 2019-03-05 2019-05-14 深圳众享互联科技有限公司 A kind of Internet of Things Information Secure Transmission System and transmission method based on block chain
CN109756579B (en) * 2019-03-05 2021-04-30 深圳众享互联科技有限公司 Block chain-based Internet of things information secure transmission system and transmission method
CN109933629A (en) * 2019-03-15 2019-06-25 腾讯科技(深圳)有限公司 Method of data synchronization, device, computer equipment and readable storage medium storing program for executing
CN109933629B (en) * 2019-03-15 2021-07-30 腾讯科技(深圳)有限公司 Data synchronization method and device, computer equipment and readable storage medium
CN110266872A (en) * 2019-05-30 2019-09-20 世纪龙信息网络有限责任公司 Management-control method, device and the cloud address book system of address book data
CN112669147A (en) * 2019-12-31 2021-04-16 蚂蚁区块链科技(上海)有限公司 Service request method and device based on block chain
CN111127021B (en) * 2019-12-31 2020-10-30 蚂蚁区块链科技(上海)有限公司 Service request method and device based on block chain
CN111241557A (en) * 2019-12-31 2020-06-05 支付宝(杭州)信息技术有限公司 Service request method and device based on block chain
CN111127021A (en) * 2019-12-31 2020-05-08 支付宝(杭州)信息技术有限公司 Service request method and device based on block chain
CN111241557B (en) * 2019-12-31 2023-04-07 蚂蚁区块链科技(上海)有限公司 Service request method and device based on block chain
CN112669147B (en) * 2019-12-31 2023-09-26 蚂蚁区块链科技(上海)有限公司 Service request method and device based on block chain
CN114979378A (en) * 2022-05-07 2022-08-30 中移互联网有限公司 Incoming call processing method and device
CN114979378B (en) * 2022-05-07 2023-11-10 中移互联网有限公司 Incoming call processing method and device

Also Published As

Publication number Publication date
CN109194633B (en) 2021-08-10

Similar Documents

Publication Publication Date Title
CN109194633A (en) Address book backup method and system
CN107403303B (en) Signing method of electronic contract system based on block chain deposit certificate
CN106991334B (en) Data access method, system and device
CN107171794B (en) A kind of electronic document signature method based on block chain and intelligent contract
CN110855791B (en) Block link point deployment method and related equipment
CN111262872B (en) Enterprise block chain service platform
EP3813292A1 (en) Blockchain-based service data encryption method and apparatus
US20180218174A1 (en) Apparatus and method for data matching and anonymization
CN109902086A (en) A kind of index creation method, device and equipment
US8948397B2 (en) Major management apparatus, authorized management apparatus, electronic apparatus for delegated key management, and key management methods thereof
CN109951290A (en) A kind of time service authentication method, device and the equipment of chain type account book
CN114465817B (en) Digital certificate system and method based on TEE predictor clusters and blockchain
CN110019278A (en) A kind of data verification method, device and equipment
CN109447809A (en) A kind of video active identification method of combination block chain
CN114528601B (en) Access method and device based on block chain data, processor and electronic equipment
CN107066346A (en) A kind of data back up method, data reconstruction method and device
CN111669434A (en) Method, system, device and equipment for establishing communication group
CN111682937B (en) Method and device for applying and distributing key of enhanced CPK
CN111194033B (en) In-vehicle secure communication method, system and computer storage medium
CN117009988A (en) Encryption data storage and query method based on blockchain
KR20160040399A (en) Personal Information Management System and Personal Information Management Method
CN110011807A (en) A kind of key message maintaining method and system
CN110083786A (en) A kind of link verification method and device
CN102333070A (en) Method and device for obtaining information
CN115860741A (en) Block chain data encryption verification method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Address book backup method and system

Effective date of registration: 20211207

Granted publication date: 20210810

Pledgee: Yantai financing guarantee Group Co.,Ltd.

Pledgor: SHANDONG SMART CLOUD CHAIN NETWORK TECHNOLOGY Co.,Ltd.

Registration number: Y2021980014189

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Granted publication date: 20210810

Pledgee: Yantai financing guarantee Group Co.,Ltd.

Pledgor: SHANDONG SMART CLOUD CHAIN NETWORK TECHNOLOGY Co.,Ltd.

Registration number: Y2021980014189