Summary of the invention
In order to overcome above-mentioned deficiency in the prior art, the application's is designed to provide a kind of address book backup method,
Applied to address book backup system, the address book backup system includes being made of user node and multiple contracts operation node
Block chain network, the contract operation node are previously stored with the identity of user and the corresponding relationship of public key;The method
Include:
The user node modifies request and includes to block chain network publication address list modification request, the address list
The address list modification item of the identity of user and the public key encryption by the user;
At least one contract operation node in the block chain network passes through preconfigured block chain intelligence contract, root
According to the identity in address list modification request search corresponding public key to the address list modification item of encryption into
Row decryption verification;
At least one contract operation node is modified after being verified according to the identity and the address list
Item corresponding relationship generates address list modification record, and the address list modification record is synchronized to other in the block chain network
Contract runs node.
Optionally, the method also includes:
The user node issues address list acquisition request to the block chain network, wraps in the address list acquisition request
It includes the identity of the user and signing messages is generated by the private key of the user;
At least one contract operation node in the block chain network is by the block chain intelligence contract, to described logical
News record acquisition request is verified, and searches corresponding address list modification record life according to the identity after being verified
The user node is sent at backup address list.
Optionally, the contract operation node generates the step of backup address list is sent to the user node, comprising:
The contract operation node is sent out after carrying out asymmetric encryption to the backup address list by the public key of the user
Give the user node;
The method also includes:
The user node is decrypted the backup address list for receiving encryption by the private key of user, after decryption
Backup address list update the address list of user node local.
Optionally, the method also includes:
The user node issues address list request to create to the block chain network, and the address list request to create includes
The address list to be backed up of the identity of user and the public key encryption by the user;
At least one contract operation node in the block chain network verifies the address list by the intelligent contract
Request to create;
Described at least one contract operation node distribute memory space after verification passes through, for the user with record it is described to
Backup address list, and the address list synchronization to be backed up is run into node to other contracts in the block chain network.
Optionally, the block chain network further includes contract check-node;The method also includes:
A contract in the multiple contract operation node runs node and sends contract posting request to block chain network,
It include block chain intelligence contract to be released in the contract posting request;
Contract check-node described at least one of described block chain network intelligently closes the block chain to be released
It is about verified, and runs node for the contract in the block chain network is synchronized to by the block chain intelligence contract verified;
The contract operation node receives and runs the block chain intelligence contract by verification.
The another object of the application is to provide a kind of address book backup system, the address book backup system include by with
The block chain network of family node and multiple contracts operation node composition, the contract operation node are previously stored with the identity of user
The corresponding relationship of mark and public key;
The user node is used for block chain network publication address list modification request, the address list modification request
The address list modification item of identity including user and the public key encryption by the user;
At least one contract operation node in the block chain network is used to intelligently close by preconfigured block chain
About, corresponding public key is searched according to the identity in address list modification request to modify the address list of encryption
Verifying is decrypted in item;And after being verified, generated according to the identity and the address list modification item corresponding relationship
Address list modification record, and the address list modification record is synchronized to the operation node of other contracts in the block chain network.
Optionally, the user node is also used to issue address list acquisition request, the communication to the block chain network
It records and in acquisition request includes the identity of the user and signing messages is generated by the private key of the user;
At least one contract operation node in the block chain network is also used to through the block chain intelligence contract, right
The address list acquisition request is verified, and is searched corresponding address list according to the identity after being verified and modified
Record generates backup address list and is sent to the user node.
Optionally, the contract operation node is when generation backup address list is sent to the user node, by described
The public key of user is sent to the user node after carrying out asymmetric encryption to the backup address list;
The user node is decrypted the backup address list for receiving encryption by the private key of user, after decryption
Backup address list update the address list of user node local.
Optionally, the user node is also used to issue address list request to create, the communication to the block chain network
Recording request to create includes the identity of user and the address list to be backed up of the public key encryption by the user;
At least one contract operation node in the block chain network is also used to by described in the intelligent contract verification
Address list request to create;And after verification passes through, memory space is distributed for the user to record the address list to be backed up, and will
The address list synchronization to be backed up runs node to other contracts in the block chain network.
Optionally, the address book backup system further includes contract check-node;
Contract operation node in the multiple contract operation node is also used to send contract hair to block chain network
Cloth is requested, and includes block chain intelligence contract to be released in the contract posting request;
Contract check-node described at least one of described block chain network is used for the block chain intelligence to be released
Energy contract is verified, and the operation section of the contract in the block chain network will be synchronized to by the block chain intelligence contract verified
Point;
The contract operation node is also used to receive and run the block chain intelligence contract by verification.
In terms of existing technologies, the application has the advantages that
Address book backup method and system provided by the embodiments of the present application, by using intelligent contract in block chain network
Mode carry out the backup of address list, the risk of loss of data can be reduced by distributed backup mode, and pass through
The mode that intelligent contract carries out encryption and decryption verifying can reduce personal data leakage or by the risk of falsification.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is implemented
The component of example can be arranged and be designed with a variety of different configurations.
Therefore, the detailed description of the embodiments herein provided in the accompanying drawings is not intended to limit below claimed
Scope of the present application, but be merely representative of the selected embodiment of the application.Based on the embodiment in the application, this field is common
Technical staff's every other embodiment obtained without creative efforts belongs to the model of the application protection
It encloses.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.
In the description of the present application, it is also necessary to which explanation is unless specifically defined or limited otherwise, term " setting ",
" installation ", " connected ", " connection " shall be understood in a broad sense, for example, it may be fixedly connected, may be a detachable connection or one
Connect to body;It can be mechanical connection, be also possible to be electrically connected;It can be directly connected, it can also be indirect by intermediary
It is connected, can be the connection inside two elements.For the ordinary skill in the art, on being understood with concrete condition
State the concrete meaning of term in this application.
Fig. 1 is please referred to, Fig. 1 is the schematic diagram of address book backup system 10 provided in this embodiment, in the present embodiment, institute
Address book backup system 10 is stated to establish in the block chain network being made of user node 100 and multiple contracts operation node 200.
Wherein, the contract operation node 200 may include, but be not limited only to, the node of communication operator offer, movement
The node of node, the node that mobile application service supplier provides or the offer of regulator part that terminal manufacturer provides.This
A little contract operation nodes 200 can provide address book backup by the intelligent contract disposed in advance for user or restore to service.
The user node 100 may include, but be not limited only to, and need to carry out using backup communication or restore the shifting of service
The equipment such as dynamic terminal, plate telegram or PC.
Referring to figure 2., Fig. 2 is the process of the address book backup method applied to address book backup system 10 shown in FIG. 1
Figure, below will be to the method includes each steps to be described in detail.
In the present embodiment, user can register it in the address book backup system 10 by the modes such as registered in advance
The corresponding relationship of identity 300 and public key, wherein the public key can be by the private key of user cipher device for example, by public key encryption
Preset algorithm generates in standard (Public Key Cryptography Standards, abbreviation PKCS), the identity
300 can be to pass through multiple Hash operation generation address by described.
In the present embodiment, the private key is only stored by individual subscriber, is unique identities of the user in block chain network
Voucher, the identity 300 are used for the data that identity user backs up in the block chain network, appointing in addition to user
Who can not access its corresponding storing data.With the data of the public key encryption, can only be decrypted with corresponding private key.
Firstly, in the present embodiment, it referring to figure 2., can be by step S110 to step S130 in the block link network
The backup of address list is carried out in network.Step S110 is described in detail to step S130 below.
Step S110, the user node 100 issue address list request to create, the address list to the block chain network
Request to create includes the identity 300 of user and the address list to be backed up of the public key encryption by the user.
It in the present embodiment, can be on the user node 100 when user is when needing to carry out for the first time address book backup
Address list to be backed up is encrypted by the public key of the user, then according to encrypted address list to be backed up and the user
Identity 300 generate the address list request to create, and the address list request to create is issued in the block chain network
On, with the operation code of the newly-built address list in block chain intelligence contract described in request call.
Step S120, at least one contract operation node 200 in the block chain network pass through the intelligent contract school
Test the address list request to create.
In the present embodiment, communication of at least one contract operation node 200 to receiving in the block chain network
Record request to create is verified, and searches the corresponding public key of identity 300 in the address list request to create, and with finding
Public key to it is described it is encrypted it is to be backed up communication verifying is decrypted.
Step S130, at least one contract operation node 200 distribute memory space after verification passes through for the user
To record the address list to be backed up, and the address list synchronization to be backed up is transported to other contracts in the block chain network
Row node 200.
In the present embodiment, at least one contract operation node 200 triggers the block chain intelligence after verification passes through
Energy contract creates an individual memory space for the user, and the address list to be backed up is stored in the memory space.Meanwhile
The contract runs node 200 and the address list synchronization to be backed up is also run node to other contracts in the block chain network
200, so that other contract operation nodes 200 is also stored the address list to be backed up.
After backing up to address list, user can may also need to carry out the address list of backup because of a variety of causes new
Increase, modify or deletes.Therefore in the present embodiment, referring to figure 3., backup communication can be carried out to step S230 by step S210
The modification of record operates.
Step S210, the user node 100 are requested to block chain network publication address list modification, the address list
Modification request includes the identity 300 of user and the address list modification item of the public key encryption by the user.
In the present embodiment, the user node 100 only will can have the part of modification to repair as address list in address list
Change item, then the address list modification item encrypted using the public key of user, and by encrypted address list modification item with
The identity information of the user is published in the block chain network together as address list modification request.
Step S220, at least one contract operation node 200 in the block chain network pass through preconfigured block
Chain intelligence contract searches corresponding public key to the institute of encryption according to the identity 300 in address list modification request
It states address list modification item and verifying is decrypted.
In the present embodiment, the contract operation node 200 in the block chain network can be modified the address list is extracted
Then the identity 300 in request searches corresponding public key according to the identity 300, then with the public affairs found
Verifying is decrypted to the address list modification item of encryption in key.
Step S230, at least one contract operation node 200 is after being verified, according to the identity 300
Address list modification record is generated with the address list modification item corresponding relationship, and the address list modification record is synchronized to the area
Other contracts in block chain network run node 200.
If the contract operation node 200 verified is verified encrypted address list modification item, then it represents that corresponding
Address list modification request be to be sent by true user, then contract operation node 200 generates corresponding address list modification
It records and is synchronized to other contracts operation node 200.
Optionally, in the present embodiment, all contract operation nodes 200 address list can be modified request into
Row verifying, and have the contract for being initially completed verifying operation node 200 that the address list modification record generated after verifying is synchronized to it
He runs node 200 by contract.
Referring to figure 4., the address list of backup can also be obtained by step S310 and step S320 in the present embodiment, under
It is described in detail in face of step S310 and step S320.
Step S310, the user node 100 issue address list acquisition request, the address list to the block chain network
Identity 300 in acquisition request including the user and the private key generation signing messages by the user.
In the present embodiment, it when the damage of the address list of user local or user replace mobile terminal, needs from described logical
Address list before news record standby system 10 obtains.At this point it is possible to by being stepped on the user node 100 for needing the address list for obtaining backup
Enter the block chain network, generates the address list acquisition request including User Identity 300, and using the private key pair of user
The address list acquisition request is signed.
Step S320, at least one contract operation node 200 in the block chain network pass through the block chain intelligence
Contract verifies the address list acquisition request, and is searched accordingly after being verified according to the identity 300
Address list modification record generates backup address list and is sent to the user node 100.
Contract node in the block chain network is after receiving the address list acquisition request, according to what is wherein carried
Identity 300 is searched corresponding public key and is verified to signature.If being verified, identify true when the address list acquisition request
What real user sent, then contract operation node 200 generates backup communication according to the address list modification record of the user before
It records and is sent to the user node 100.
It optionally, is the leakage of data in mode transmission process, in the present embodiment, the contract operation node 200 is logical
It crosses after the public key of the user carries out asymmetric encryption to the backup address list and is sent to the user node 100.
Then, the user node 100 is decrypted the backup address list for receiving encryption by the private key of user, root
The local address list of the user node 100 is updated according to the backup address list after decryption.
In order to guarantee the safety of the block chain intelligence contract deployment, the leaky intelligent contract of mode is disposed,
In the present embodiment, the block chain network can also include contract check-node 400.Referring to figure 5., the block chain intelligence is disposed
The process of energy contract can pass through step S410, step S420 and step S430.
Step S410, the multiple contract run a contract in node 200 and run node 200 to block chain network hair
Contract posting request is sent, includes block chain intelligence contract to be released in the contract posting request.
Step S420, to described to be released in contract check-node 400 described at least one of described block chain network
Block chain intelligence contract verified, and will by verify block chain intelligence contract be synchronized in the block chain network
Contract runs node 200.
Step S430, the contract operation node 200 receive and run the block chain intelligence contract by verification.
In this way, the block chain intelligence contract issued by 400 Duis of the contract check-node verifies, leakage can have been filtered
The contract in hole improves the safety of data in block chain network.
In conclusion the application carries out the backup of address list by way of using intelligent contract in block chain network,
The risk of loss of data can be reduced by distributed backup mode, and encryption and decryption verifying is carried out by intelligent contract
Mode can reduce personal data leakage or by the risk of falsification.
In embodiment provided herein, it should be understood that disclosed device and method, it can also be by other
Mode realize.The apparatus embodiments described above are merely exemplary, for example, the flow chart and block diagram in attached drawing are shown
According to device, the architectural framework in the cards of method and computer program product, function of multiple embodiments of the application
And operation.In this regard, each box in flowchart or block diagram can represent one of a module, section or code
Point, a part of the module, section or code includes one or more for implementing the specified logical function executable
Instruction.It should also be noted that function marked in the box can also be attached to be different from some implementations as replacement
The sequence marked in figure occurs.For example, two continuous boxes can actually be basically executed in parallel, they sometimes may be used
To execute in the opposite order, this depends on the function involved.It is also noted that each of block diagram and or flow chart
The combination of box in box and block diagram and or flow chart can be based on the defined function of execution or the dedicated of movement
The system of hardware is realized, or can be realized using a combination of dedicated hardware and computer instructions.
In addition, each functional module in each embodiment of the application can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-OnlyMemory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any
Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain
Lid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.