CN109194633B - Address book backup method and system - Google Patents

Address book backup method and system Download PDF

Info

Publication number
CN109194633B
CN109194633B CN201810951324.1A CN201810951324A CN109194633B CN 109194633 B CN109194633 B CN 109194633B CN 201810951324 A CN201810951324 A CN 201810951324A CN 109194633 B CN109194633 B CN 109194633B
Authority
CN
China
Prior art keywords
address book
contract
block chain
user
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810951324.1A
Other languages
Chinese (zh)
Other versions
CN109194633A (en
Inventor
张�林
刘昭
姜新秀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Smart Cloud Chain Network Technology Co ltd
Original Assignee
Shandong Smart Cloud Chain Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Smart Cloud Chain Network Technology Co ltd filed Critical Shandong Smart Cloud Chain Network Technology Co ltd
Priority to CN201810951324.1A priority Critical patent/CN109194633B/en
Publication of CN109194633A publication Critical patent/CN109194633A/en
Application granted granted Critical
Publication of CN109194633B publication Critical patent/CN109194633B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a method and a system for backup of an address book, wherein the address book backup system comprises a block chain network consisting of a user node and a plurality of contract running nodes, and the user node issues an address book modification request to the block chain network; at least one contract operation node in the block chain network searches a corresponding public key to decrypt and verify the encrypted address book modification item through a pre-configured block chain intelligent contract; after the at least one contract running node passes the verification, generating an address book modification record according to the corresponding relation between the identity and the address book modification item, and synchronizing the address book modification record to other contract running nodes in the block chain network. The address book is backed up in a block chain network in an intelligent contract mode, the risk of data loss can be reduced in a distributed backup mode, and the risk of personal data leakage or falsification can be reduced in an encryption and decryption verification mode through an intelligent contract.

Description

Address book backup method and system
Technical Field
The application relates to the technical field of block chains, in particular to an address book backup method and system.
Background
With the development of information technology, people's communication methods are more biased towards telephone communication or on-line communication, and the address book is more and more important as an important part for recording the contact methods between people. In order to prevent the address book from being lost due to various accidents, the address book needs to be backed up.
In the address book backup technology in the prior art, backup is performed in local storage of a user terminal, or backup is performed in cloud storage space of other service providers. However, the local storage space is adopted for backup, so that the backup address book cannot be restored easily due to the damage of the user terminal; and the mode of cloud backup is adopted, and personal information is easy to leak due to insufficient confidentiality.
Disclosure of Invention
In order to overcome the above disadvantages in the prior art, an object of the present application is to provide an address book backup method applied to an address book backup system, where the address book backup system includes a blockchain network composed of a user node and a plurality of contract running nodes, and the contract running nodes pre-store a correspondence between an identity of a user and a public key; the method comprises the following steps:
the user node issues an address book modification request to the block chain network, wherein the address book modification request comprises an identity of a user and an address book modification item encrypted by a public key of the user;
at least one contract running node in the block chain network searches a corresponding public key according to the identity in the address book modification request through a pre-configured block chain intelligent contract to decrypt and verify the encrypted address book modification item;
and after the at least one contract running node passes the verification, generating an address book modification record according to the corresponding relation between the identity and the address book modification item, and synchronizing the address book modification record to other contract running nodes in the block chain network.
Optionally, the method further comprises:
the user node issues an address book acquisition request to the block chain network, wherein the address book acquisition request comprises the identity of the user and signature information generated by a private key of the user;
and at least one contract operation node in the block chain network verifies the address book acquisition request through the intelligent contract of the block chain, searches a corresponding address book modification record according to the identity after the address book acquisition request passes the verification, generates a backup address book and sends the backup address book to the user node.
Optionally, the step of generating, by the contract running node, a backup address book and sending the backup address book to the user node includes:
the contract running node asymmetrically encrypts the backup address book through the public key of the user and then sends the backup address book to the user node;
the method further comprises the following steps:
and the user node decrypts the received encrypted backup address book through a private key of the user, and updates the local address book of the user node according to the decrypted backup address book.
Optionally, the method further comprises:
the user node issues an address book creating request to the block chain network, wherein the address book creating request comprises an identity of a user and an address book to be backed up encrypted by a public key of the user;
at least one contract running node in the block chain network verifies the address book creation request through the intelligent contract;
and after the at least one contract running node passes the verification, allocating a storage space for the user to record the address book to be backed up, and synchronizing the address book to be backed up to other contract running nodes in the block chain network.
Optionally, the blockchain network further comprises a contract check node; the method further comprises the following steps:
one contract running node in the plurality of contract running nodes sends a contract issuing request to a block chain network, wherein the contract issuing request comprises a block chain intelligent contract to be issued;
at least one contract check node in the block chain network checks the block chain intelligent contract to be issued, and the checked block chain intelligent contract is synchronously sent to a contract running node in the block chain network;
and the contract running node receives and runs the verified block chain intelligent contract.
Another objective of the present application is to provide an address book backup system, which includes a block chain network composed of a user node and a plurality of contract running nodes, where the contract running nodes pre-store a correspondence between an identity of a user and a public key;
the user node is used for issuing an address book modification request to the block chain network, wherein the address book modification request comprises an identity of a user and an address book modification item encrypted by a public key of the user;
at least one contract running node in the block chain network is used for searching a corresponding public key according to the identity in the address book modification request through a pre-configured block chain intelligent contract to decrypt and verify the encrypted address book modification item; and after the verification is passed, generating an address book modification record according to the corresponding relation between the identity identification and the address book modification item, and synchronizing the address book modification record to other contract operation nodes in the block chain network.
Optionally, the user node is further configured to issue an address book acquisition request to the block chain network, where the address book acquisition request includes an identity of the user and signature information generated by a private key of the user;
and at least one contract operation node in the block chain network is also used for verifying the address book acquisition request through the intelligent contract of the block chain, searching a corresponding address book modification record according to the identity after the address book acquisition request passes the verification, generating a backup address book and sending the backup address book to the user node.
Optionally, when the contract running node generates a backup address book and sends the backup address book to the user node, the contract running node asymmetrically encrypts the backup address book through the public key of the user and sends the backup address book to the user node;
and the user node decrypts the received encrypted backup address book through a private key of the user, and updates the local address book of the user node according to the decrypted backup address book.
Optionally, the user node is further configured to issue an address book creation request to the blockchain network, where the address book creation request includes an identity of a user and an address book to be backed up encrypted by a public key of the user;
at least one contract running node in the block chain network is further used for verifying the address book creation request through the intelligent contract; and after the verification is passed, allocating a storage space for the user to record the address book to be backed up, and synchronizing the address book to be backed up to other contract operation nodes in the block chain network.
Optionally, the address book backup system further includes a contract check node;
one contract running node in the plurality of contract running nodes is further used for sending a contract issuing request to the blockchain network, wherein the contract issuing request comprises a blockchain intelligent contract to be issued;
at least one contract checking node in the block chain network is used for checking the block chain intelligent contract to be issued and synchronizing the checked block chain intelligent contract to a contract running node in the block chain network;
the contract running node is further used for receiving and running the verified block chain intelligent contract.
Compared with the prior art, the method has the following beneficial effects:
according to the address book backup method and system provided by the embodiment of the application, the address book is backed up in a block chain network in an intelligent contract mode, the risk of data loss can be reduced in a distributed backup mode, and the risk of personal data leakage or falsification can be reduced in an encryption and decryption verification mode through an intelligent contract.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic diagram of an address book backup system according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of an address book backup method according to an embodiment of the present disclosure;
fig. 3 is a second schematic flowchart of an address book backup method according to an embodiment of the present application;
fig. 4 is a third schematic flowchart of an address book backup method according to an embodiment of the present application;
fig. 5 is a fourth flowchart illustrating an address book backup method according to an embodiment of the present application.
Icon: 10-address list backup system; 100-a user node; 200-contract run node; 300-identity identification; 400-contract check node.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present application, it is further noted that, unless expressly stated or limited otherwise, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
Referring to fig. 1, fig. 1 is a schematic diagram of an address book backup system 10 provided in this embodiment, the address book backup system 10 is established on a block chain network composed of a user node 100 and a plurality of contract running nodes 200.
The contract running node 200 may include, but is not limited to, a node provided by a communication operator, a node provided by a manufacturer of a mobile terminal, a node provided by a mobile application service provider, or a node provided by a relevant monitoring part. These contract running nodes 200 may provide directory backup or restore services to users through pre-deployed intelligent contracts.
The user node 100 may include, but is not limited to, a mobile terminal, a tablet, or a personal computer, which needs to perform a backup or recovery service using communication.
Referring to fig. 2, fig. 2 is a flowchart illustrating a method for backup of an address book applied to the address book backup system 10 shown in fig. 1, and the method including various steps will be described in detail below.
In this embodiment, a user may register a corresponding relationship between the identifier 300 and a Public Key in the address book backup system 10 by means of pre-registration, and the like, where the Public Key may be generated by a private Key kept secret by the user through a preset algorithm in, for example, Public Key Cryptography Standards (PKCS), and the identifier 300 may be an address generated by multiple hash operations.
In this embodiment, the private key is stored only by a user, and is a unique identity credential of the user on the blockchain network, and the identity 300 is used to identify data backed up by the user in the blockchain network, and anyone other than the user himself cannot access the corresponding stored data. The data encrypted by the public key can only be decrypted by the corresponding private key.
First, in the present embodiment, referring to fig. 2, the backup of the address book in the blockchain network may be performed through steps S110 to S130. Step S110 to step S130 are explained in detail below.
Step S110, the user node 100 issues an address book creation request to the blockchain network, where the address book creation request includes the identity 300 of the user and the address book to be backed up encrypted by the public key of the user.
In this embodiment, when a user needs to perform address book backup for the first time, the address book to be backed up may be encrypted on the user node 100 by using the public key of the user, and then the address book creation request is generated according to the encrypted address book to be backed up and the identity 300 of the user, and is issued on the blockchain network to request to call an operation code of a newly-created address book in the blockchain intelligent contract.
Step S120, at least one contract running node 200 in the block chain network verifies the address book creation request through the intelligent contract.
In this embodiment, at least one contract running node 200 in the blockchain network verifies the received address book creation request, searches for a public key corresponding to the identity identifier 300 in the address book creation request, and decrypts and verifies the encrypted communication to be backed up by using the searched public key.
Step S130, after the at least one contract running node 200 passes the verification, allocating a storage space for the user to record the address book to be backed up, and synchronizing the address book to be backed up to other contract running nodes 200 in the block chain network.
In this embodiment, after the check is passed, the at least one contract running node 200 triggers the intelligent block chain contract, creates a separate storage space for the user, and stores the address book to be backed up in the storage space. Meanwhile, the contract running node 200 synchronizes the address book to be backed up to other contract running nodes 200 in the block chain network, so that the other contract running nodes 200 also store the address book to be backed up.
After the address book is backed up, the user may need to add, modify or delete the backed up address book for various reasons. Therefore, in the present embodiment, referring to fig. 3, the backup address book can be modified through steps S210 to S230.
Step S210, the user node 100 issues an address book modification request to the blockchain network, where the address book modification request includes the identity 300 of the user and an address book modification item encrypted by the public key of the user.
In this embodiment, the user node 100 may only use a modified part in the address book as an address book modification item, then encrypt the address book modification item by using a public key of the user, and issue the encrypted address book modification item and the identity information of the user together as an address book modification request to the blockchain network.
Step S220, at least one contract running node 200 in the blockchain network searches for a corresponding public key according to the identity 300 in the address book modification request through a pre-configured blockchain intelligent contract to decrypt and verify the encrypted address book modification item.
In this embodiment, the contract running node 200 in the blockchain network extracts the identifier 300 in the address book modification request, searches for a corresponding public key according to the identifier 300, and then decrypts and verifies the encrypted address book modification item by using the searched public key.
Step S230, after the at least one contract running node 200 passes the verification, generating an address book modification record according to the correspondence between the identity identifier 300 and the address book modification item, and synchronizing the address book modification record to other contract running nodes 200 in the block chain network.
If the encrypted address book modification item is verified to be passed by the verified contract running node 200, it indicates that the corresponding address book modification request is sent by a real user, and the contract running node 200 generates a corresponding address book modification record and synchronizes to other contract running nodes 200.
Optionally, in this embodiment, all the contract running nodes 200 may verify the address book modification request, and a contract running node 200 that completes verification first synchronizes the address book modification record generated after verification to other contract running nodes 200.
Referring to fig. 4, in the present embodiment, a backup address book may also be obtained through step S310 and step S320, and step S310 and step S320 are described in detail below.
Step S310, the user node 100 issues an address book acquisition request to the blockchain network, where the address book acquisition request includes the identity 300 of the user and signature information generated by the private key of the user.
In this embodiment, when the local address book of the user is damaged or the user replaces the mobile terminal, the previous address book needs to be acquired from the address book backup system 10. At this time, the user node 100 that needs to obtain the backup address book may log in the blockchain network, generate an address book obtaining request including the user id 300, and sign the address book obtaining request with the private key of the user.
In step S320, at least one contract running node 200 in the blockchain network verifies the address book acquisition request through the blockchain intelligent contract, searches for a corresponding address book modification record according to the identity 300 after the address book acquisition request passes the verification, generates a backup address book, and sends the backup address book to the user node 100.
After receiving the address book acquisition request, a contract node in the block chain network searches for a corresponding public key according to the identity 300 carried in the address book acquisition request to verify the signature. If the verification is passed, the contract running node 200 identifies that the address book acquisition request is sent by a real user, generates a backup address book according to the address book modification record of the user before, and sends the backup address book to the user node 100.
Optionally, in order to reveal data in the transmission process, in this embodiment, the contract running node 200 performs asymmetric encryption on the backup address book by using the public key of the user, and then sends the encrypted backup address book to the user node 100.
Then, the user node 100 decrypts the received encrypted backup address book by the private key of the user, and updates the local address book of the user node 100 according to the decrypted backup address book.
In order to ensure the security of the blockchain intelligent contract deployment, intelligent contracts with a leakage are deployed, in this embodiment, the blockchain network may further include a contract check node 400. Referring to fig. 5, the process of deploying the blockchain intelligent contract may pass through step S410, step S420 and step S430.
In step S410, one contract running node 200 of the plurality of contract running nodes 200 sends a contract issuing request to the blockchain network, where the contract issuing request includes a blockchain intelligent contract to be issued.
Step S420, at least one contract check node 400 in the blockchain network checks the to-be-issued blockchain intelligent contract, and synchronizes the checked blockchain intelligent contract to the contract running node 200 in the blockchain network.
In step S430, the contract running node 200 receives and runs the verified intelligent contract of the blockchain.
In this way, the contract check node 400 checks the issued intelligent contract of the blockchain, so that the leaked contracts can be filtered, and the security of data in the blockchain network is improved.
In summary, the address book is backed up in a manner of adopting an intelligent contract in the block chain network, the risk of data loss can be reduced in a distributed backup manner, and the risk of personal data leakage or falsification can be reduced in a manner of carrying out encryption and decryption verification through the intelligent contract.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

1. The address book backup method is characterized by being applied to an address book backup system, wherein the address book backup system comprises a block chain network consisting of a user node and a plurality of contract operation nodes, and the contract operation nodes pre-store the corresponding relation between the identity of a user and a public key; the method comprises the following steps:
the user node issues an address book modification request to the block chain network, wherein the address book modification request comprises an identity of a user and an address book modification item encrypted by a public key of the user;
at least one contract running node in the block chain network searches a corresponding public key according to the identity in the address book modification request through a pre-configured block chain intelligent contract to decrypt and verify the encrypted address book modification item;
after the at least one contract running node passes the verification, generating an address book modification record according to the corresponding relation between the identity and the address book modification item, and synchronizing the address book modification record to other contract running nodes in the block chain network;
wherein the method further comprises:
the user node issues an address book acquisition request to the block chain network, wherein the address book acquisition request comprises the identity of the user and signature information generated by a private key of the user;
and at least one contract operation node in the block chain network verifies the address book acquisition request through the intelligent contract of the block chain, searches a corresponding address book modification record according to the identity after the address book acquisition request passes the verification, generates a backup address book and sends the backup address book to the user node.
2. The method of claim 1,
the step of the contract running node generating a backup address book and sending the backup address book to the user node comprises the following steps:
the contract running node asymmetrically encrypts the backup address book through the public key of the user and then sends the backup address book to the user node;
the method further comprises the following steps:
and the user node decrypts the received encrypted backup address book through a private key of the user, and updates the local address book of the user node according to the decrypted backup address book.
3. The method of claim 1, further comprising:
the user node issues an address book creating request to the block chain network, wherein the address book creating request comprises an identity of a user and an address book to be backed up encrypted by a public key of the user;
at least one contract running node in the block chain network verifies the address book creation request through the intelligent contract;
and after the at least one contract running node passes the verification, allocating a storage space for the user to record the address book to be backed up, and synchronizing the address book to be backed up to other contract running nodes in the block chain network.
4. The method of claim 1, wherein the blockchain network further comprises a contract check node; the method further comprises the following steps:
one contract running node in the plurality of contract running nodes sends a contract issuing request to a block chain network, wherein the contract issuing request comprises a block chain intelligent contract to be issued;
at least one contract check node in the block chain network checks the block chain intelligent contract to be issued, and the checked block chain intelligent contract is synchronously sent to a contract running node in the block chain network;
and the contract running node receives and runs the verified block chain intelligent contract.
5. The address book backup system is characterized by comprising a block chain network consisting of a user node and a plurality of contract operation nodes, wherein the contract operation nodes pre-store the corresponding relation between the identity of a user and a public key;
the user node is used for issuing an address book modification request to the block chain network, wherein the address book modification request comprises an identity of a user and an address book modification item encrypted by a public key of the user;
at least one contract running node in the block chain network is used for searching a corresponding public key according to the identity in the address book modification request through a pre-configured block chain intelligent contract to decrypt and verify the encrypted address book modification item; after the verification is passed, generating an address book modification record according to the corresponding relation between the identity identification and the address book modification item, and synchronizing the address book modification record to other contract operation nodes in the block chain network;
the user node is further used for issuing an address book acquisition request to the block chain network, wherein the address book acquisition request comprises the identity of the user and signature information generated by a private key of the user;
and at least one contract operation node in the block chain network is also used for verifying the address book acquisition request through the intelligent contract of the block chain, searching a corresponding address book modification record according to the identity after the address book acquisition request passes the verification, generating a backup address book and sending the backup address book to the user node.
6. The system of claim 5,
when the contract running node generates a backup address book and sends the backup address book to the user node, the backup address book is asymmetrically encrypted through the public key of the user and then sent to the user node;
and the user node decrypts the received encrypted backup address book through a private key of the user, and updates the local address book of the user node according to the decrypted backup address book.
7. The system of claim 5,
the user node is also used for issuing an address book creating request to the block chain network, wherein the address book creating request comprises an identity of a user and an address book to be backed up encrypted by a public key of the user;
at least one contract running node in the block chain network is further used for verifying the address book creation request through the intelligent contract; and after the verification is passed, allocating a storage space for the user to record the address book to be backed up, and synchronizing the address book to be backed up to other contract operation nodes in the block chain network.
8. The system of claim 5, wherein the contact book backup system further comprises a contract check node;
one contract running node in the plurality of contract running nodes is further used for sending a contract issuing request to the blockchain network, wherein the contract issuing request comprises a blockchain intelligent contract to be issued;
at least one contract checking node in the block chain network is used for checking the block chain intelligent contract to be issued and synchronizing the checked block chain intelligent contract to a contract running node in the block chain network;
the contract running node is further used for receiving and running the verified block chain intelligent contract.
CN201810951324.1A 2018-08-21 2018-08-21 Address book backup method and system Active CN109194633B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810951324.1A CN109194633B (en) 2018-08-21 2018-08-21 Address book backup method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810951324.1A CN109194633B (en) 2018-08-21 2018-08-21 Address book backup method and system

Publications (2)

Publication Number Publication Date
CN109194633A CN109194633A (en) 2019-01-11
CN109194633B true CN109194633B (en) 2021-08-10

Family

ID=64918627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810951324.1A Active CN109194633B (en) 2018-08-21 2018-08-21 Address book backup method and system

Country Status (1)

Country Link
CN (1) CN109194633B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756579B (en) * 2019-03-05 2021-04-30 深圳众享互联科技有限公司 Block chain-based Internet of things information secure transmission system and transmission method
CN109933629B (en) 2019-03-15 2021-07-30 腾讯科技(深圳)有限公司 Data synchronization method and device, computer equipment and readable storage medium
CN110266872B (en) * 2019-05-30 2021-05-11 世纪龙信息网络有限责任公司 Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium
CN111127021B (en) * 2019-12-31 2020-10-30 蚂蚁区块链科技(上海)有限公司 Service request method and device based on block chain
CN111241557B (en) * 2019-12-31 2023-04-07 蚂蚁区块链科技(上海)有限公司 Service request method and device based on block chain
CN114979378B (en) * 2022-05-07 2023-11-10 中移互联网有限公司 Incoming call processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106919419A (en) * 2017-02-03 2017-07-04 中钞信用卡产业发展有限公司北京智能卡技术研究院 The update method and device of the intelligent contract program on block chain
CN107122673A (en) * 2017-03-09 2017-09-01 深圳市金立通信设备有限公司 A kind of information ciphering method and terminal
CN107171794A (en) * 2017-06-27 2017-09-15 葛峰 A kind of electronic document based on block chain and intelligent contract signs method
CN107911819A (en) * 2017-11-30 2018-04-13 江苏通付盾科技有限公司 The method and system of packing node are chosen based on phone number

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150379510A1 (en) * 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.
CN107240010B (en) * 2016-03-25 2022-01-28 中国人民银行数字货币研究所 Method and system for transferring digital currency to digital currency chip card

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106919419A (en) * 2017-02-03 2017-07-04 中钞信用卡产业发展有限公司北京智能卡技术研究院 The update method and device of the intelligent contract program on block chain
CN107122673A (en) * 2017-03-09 2017-09-01 深圳市金立通信设备有限公司 A kind of information ciphering method and terminal
CN107171794A (en) * 2017-06-27 2017-09-15 葛峰 A kind of electronic document based on block chain and intelligent contract signs method
CN107911819A (en) * 2017-11-30 2018-04-13 江苏通付盾科技有限公司 The method and system of packing node are chosen based on phone number

Also Published As

Publication number Publication date
CN109194633A (en) 2019-01-11

Similar Documents

Publication Publication Date Title
CN109194633B (en) Address book backup method and system
CN108646983B (en) Processing method and device for storing service data on block chain
US10979231B2 (en) Cross-chain authentication method, system, server, and computer-readable storage medium
CN107171794B (en) A kind of electronic document signature method based on block chain and intelligent contract
CN110798315B (en) Data processing method and device based on block chain and terminal
CN109194466A (en) A kind of cloud data integrity detection method and system based on block chain
US8285985B2 (en) Systems and methods for detecting exposure of private keys
CN106790156B (en) Intelligent device binding method and device
CN108734018B (en) Authentication method, device, system and computer readable storage medium
US11394543B2 (en) System and method for secure sensitive data storage and recovery
US11831753B2 (en) Secure distributed key management system
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN101588377A (en) Obtaining method, system and device of session key
CN110544090A (en) Digital currency hard wallet application implementation method, SIM card and system
CN108418679B (en) Method and device for processing secret key under multiple data centers and electronic equipment
CN115225409A (en) Cloud data safety deduplication method based on multi-backup joint verification
CN115348107A (en) Internet of things equipment secure login method and device, computer equipment and storage medium
CN105224262A (en) Data processing method
CN110188545B (en) Data encryption method and device based on chained database
CN105183402A (en) Data storage method
CN109409112A (en) A kind of disk binding method and device
CN114745115A (en) Information transmission method and device, computer equipment and storage medium
CN112865981A (en) Token obtaining and verifying method and device
CN105426783A (en) Multi-backup data storage method
CN105407091A (en) Data processing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Address book backup method and system

Effective date of registration: 20211207

Granted publication date: 20210810

Pledgee: Yantai financing guarantee Group Co.,Ltd.

Pledgor: SHANDONG SMART CLOUD CHAIN NETWORK TECHNOLOGY Co.,Ltd.

Registration number: Y2021980014189

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Granted publication date: 20210810

Pledgee: Yantai financing guarantee Group Co.,Ltd.

Pledgor: SHANDONG SMART CLOUD CHAIN NETWORK TECHNOLOGY Co.,Ltd.

Registration number: Y2021980014189

PC01 Cancellation of the registration of the contract for pledge of patent right