CN109886040A - Data processing method, device, storage medium and processor - Google Patents
Data processing method, device, storage medium and processor Download PDFInfo
- Publication number
- CN109886040A CN109886040A CN201910068760.9A CN201910068760A CN109886040A CN 109886040 A CN109886040 A CN 109886040A CN 201910068760 A CN201910068760 A CN 201910068760A CN 109886040 A CN109886040 A CN 109886040A
- Authority
- CN
- China
- Prior art keywords
- file destination
- file
- authorized
- authorization
- slicing files
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
Abstract
This application discloses a kind of data processing method, device, storage medium and processors.This method comprises: the storage information of file destination is combined with authorization message, and the information after combination is encrypted using the first public key for being authorized to object, obtains target packet;In the case where authorized object requests access target file, target packet is decrypted using the corresponding private key of the first public key of authorized object, and obtain file destination from block catenary system based on the data after decryption.By the application, solve in the related technology in storage file on central server and when authorizing to the access of file, central server is easy to lead to the problem of accessing file with being difficult to safety and precise by attack.
Description
Technical field
This application involves technical field of data processing, are situated between in particular to a kind of data processing method, device, storage
Matter and processor.
Background technique
Traditional document storage mode is all made of centralization storage mode, and specifically, upper transmitting file N is deposited after user A login
On centre server, centralized server S storage file N, user A authorized user B access file N, centralization service
Device S verifies the authorization of user A, authorizes successfully, and user B logs on to centralized server S, the file N that access user A is uploaded,
In, the authorization of file N and access are to complete on centralized server S, but centralization storage mode is there are certain defect,
Specifically, it since centralized server node is single, is easy to be attacked, once there is illegal user to invade centralized server, just
The All Files of user's upload can be accessed, and then lead to the leakage of file, be tampered and the generation of false authorization, and
Whether the user A of upper transmitting file and the user B for being authorized to the file file that is uncertain about are leaked or are tampered, file
The safety of N is unable to get guarantee.
For in storage file on central server and when authorizing to the access of file, central server holds in the related technology
The problem of accessing file with being difficult to safety and precise, is easily led to by attack, currently no effective solution has been proposed.
Summary of the invention
The application provides a kind of data processing method, device, storage medium and processor, to solve in the related technology in
Storage file and when authorizing to the access of file on central server, central server is easy to be caused with being difficult to safety and precise by attack
The problem of accessing file.
According to the one aspect of the application, a kind of data processing method is provided.This method comprises: depositing file destination
Storage information is combined with authorization message, and is encrypted using the first public key for being authorized to object to the information after combination, is obtained
To target packet, wherein file destination is the file for each node that authorization object fragment is stored in block catenary system, storage
Information includes at least the node location that each part slicing files of file destination store, and authorization message is authorized to for authorization object authorization
The information of object accesses file destination;In the case where authorized object requests access target file, using authorized object
The corresponding private key of first public key decrypts target packet, and obtains target text from block catenary system based on the data after decryption
Part.
Further, before being combined the storage information of file destination and authorization message, this method comprises: passing through
Symmetric key encrypts the clear text file to be stored of authorization object, obtains file destination;File destination is split,
Obtain more parts of slicing files;More parts of slicing files are uploaded to respectively on the different nodes of block catenary system.
Further, after on the different nodes that more parts of slicing files are uploaded to block catenary system respectively, the party
Method further include: the node location for storing each part slicing files of the mark of each part slicing files of file destination, file destination
And symmetric key is combined, and obtains the first data acquisition system;Using authorization object the second public key to the first data acquisition system into
Row encryption, obtains the storage information of file destination;In block catenary system in the case where being verified of information of storage, will store
Information is written in the block of block catenary system, and by storage information storage into each node of block catenary system.
Further, the storage information of file destination is combined with authorization message, and using being authorized to the of object
One public key encrypts the information after combination, and obtaining target packet includes: the second public key using authorization object to target
The storage information of file is decrypted, and obtains the mark of each part slicing files of file destination, each part fragment text of file destination
The node location and symmetric key of part storage;By each part of the mark of each part slicing files of file destination, file destination point
The number that node location, symmetric key and the authorization of piece file storage are authorized to object accesses file destination is combined, and is obtained
To the second data set;The second data set is encrypted using the first public key of authorized object, obtains target packet;
In the case where being verified, target packet is written the block of block catenary system to target packet in block catenary system
In, and by target packet storage into each node of block catenary system.
Further, public using the first of authorized object in the case where authorized object requests access target file
The corresponding private key of key decrypts target packet, and obtains file destination from block catenary system based on the data after decryption and include:
In the case where authorized object requests access target file, the access request for being authorized to object is verified;At authorized pair of verifying
In the case that the access request of elephant passes through, target packet is obtained, and using the corresponding private key of the first public key for being authorized to object
Target packet is decrypted, what each part slicing files of the mark, file destination that obtain each part slicing files of file destination stored
Node location, symmetric key and the number for authorizing authorized object accesses file destination;Each part fragment based on file destination
On each node of the node location request block catenary system of each part slicing files storage of the mark and file destination of file
File destination each part slicing files;Each node verification of block catenary system is requested, and in the case where being verified, is returned
Each part slicing files of file destination.
Further, each node verification request of block catenary system returns to file destination in the case where being verified
Each part slicing files include: judge authorize be authorized to object accesses file destination number whether be greater than target access number,
Wherein, target access number is the history number for being authorized to object accesses file destination;It is authorized to object accesses target authorizing
In the case that the number of file is greater than target access number, each node of block catenary system returns to each part fragment of file destination
File.
Further, in the case where being verified, after each part slicing files for returning to file destination, this method is also
Include: to be combined each part slicing files of file destination, obtains file destination;File destination is carried out using symmetric key
Decryption, obtains clear text file.
According to the another aspect of the application, a kind of data processing equipment is provided.The device includes: authorization unit, is used for
The storage information of file destination is combined with authorization message, and using the first public key of authorized object to the letter after combination
Breath is encrypted, and target packet is obtained, wherein file destination is each section that authorization object fragment is stored in block catenary system
The file of point, storage information include at least the node location that each part slicing files of file destination store, and authorization message is authorization
Object Authorization is authorized to the information of object accesses file destination;Acquiring unit, in authorized object requests access target text
In the case where part, target packet is decrypted using the corresponding private key of the first public key of authorized object, and based on the number after decryption
File destination is obtained according to from block catenary system.
To achieve the goals above, according to the another aspect of the application, a kind of storage medium is provided, storage medium includes
The program of storage, wherein program executes any one of the above data processing method.
To achieve the goals above, according to the another aspect of the application, a kind of processor is provided, processor is for running
Program, wherein program executes any one of the above data processing method when running.
By the application, using following steps: storage information and the authorization message of file destination being combined, and used
The first public key for being authorized to object encrypts the information after combination, obtains target packet, wherein file destination is authorization
Object fragment is stored in the file of each node of block catenary system, and storage information includes at least each part fragment text of file destination
The node location of part storage, authorization message are the information that authorization object authorization is authorized to object accesses file destination;It is being authorized to
In the case where object requests access target file, target data is decrypted using the corresponding private key of the first public key of authorized object
Packet, and file destination is obtained from block catenary system based on the data after decryption, it solves in the related technology in central server
Upper storage file and when authorizing to the access of file, central server is easy to be caused to access file with being difficult to safety and precise by attack
The problem of.By using the first public key encryption after combining the storage information of file destination with authorization message, used in access
The corresponding private key decryption target packet of first public key obtains file destination, and then has reached storage file and authorized to file
When access, the effect of file can be accessed to safety and precise.
Detailed description of the invention
The attached drawing constituted part of this application is used to provide further understanding of the present application, the schematic reality of the application
Example and its explanation are applied for explaining the application, is not constituted an undue limitation on the present application.In the accompanying drawings:
Fig. 1 is the flow chart according to data processing method provided by the embodiments of the present application;And
Fig. 2 is the schematic diagram according to data processing equipment provided by the embodiments of the present application.
Specific embodiment
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection
It encloses.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, "
Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way
Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein.In addition, term " includes " and " tool
Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or units
Process, method, system, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include without clear
Other step or units listing to Chu or intrinsic for these process, methods, product or equipment.
For ease of description, below to the invention relates to part noun or term be illustrated:
Public key and private key: public key is the key pair obtained by a kind of algorithm with private key, and public key is cipher key pair public affairs
The part opened, private key are then private parts.Public key is commonly used in encrypted session key, verifying digital signature, or encryption can
With the data decrypted with corresponding private key.
According to an embodiment of the present application, a kind of data processing method is provided.
Fig. 1 is the flow chart according to the data processing method of the embodiment of the present application.As shown in Figure 1, this method includes following
Step:
Storage information and the authorization message of file destination are combined by step S101, and using being authorized to the of object
One public key encrypts the information after combination, obtains target packet, wherein file destination is that authorization object fragment is stored in
The file of each node of block catenary system, storage information include at least the node position that each part slicing files of file destination store
It sets, authorization message is the information that authorization object authorization is authorized to object accesses file destination.
It should be noted that by the combined information of the storage information of asymmetric key pair file destination and authorization message into
Row encrypts, and trades at authorization, is only authorized to the private key ability decryption and authorization transaction file that object has unsymmetrical key, significantly
Improve the safety for obtaining file destination.
Step S102, it is public using the first of authorized object in the case where authorized object requests access target file
The corresponding private key of key decrypts target packet, and obtains file destination from block catenary system based on the data after decryption.
Specifically, it is authorized to object and target packet is decrypted using the corresponding private key of the first public key, obtains file destination
Information and authorization message are stored, and then in the case where authorization message is proved to be successful, the storage acquisition of information based on file destination
File destination specifically gets each part of file destination by the node location that each part slicing files of file destination store
Slicing files.
Data processing method provided by the embodiments of the present application, by carrying out the storage information of file destination and authorization message
Combination, and the information after combination is encrypted using the first public key for being authorized to object, obtain target packet, wherein mesh
Mark file is the file for each node that authorization object fragment is stored in block catenary system, and storage information includes at least file destination
Each part slicing files storage node location, authorization message be authorization object authorization be authorized to object accesses file destination letter
Breath;In the case where authorized object requests access target file, using the corresponding private key solution of the first public key of authorized object
Close target packet, and file destination is obtained from block catenary system based on the data after decryption, it solves and exists in the related technology
Storage file and when authorizing to the access of file on central server, central server is easy to be caused to be difficult to safety and precise by attack
Ground accesses the problem of file.By using the first public key encryption after combining the storage information of file destination with authorization message,
File destination is obtained using the corresponding private key decryption target packet of the first public key when access, and then has reached storage file and has awarded
When weighing the access to file, the effect of file can be accessed to safety and precise.
In order to further enhance the safety for the file being stored on block chain, optionally, provided in the embodiment of the present application
Data processing method in, before being combined the storage information of file destination and authorization message, this method comprises: passing through
Symmetric key encrypts the clear text file to be stored of authorization object, obtains file destination;File destination is split,
Obtain more parts of slicing files;More parts of slicing files are uploaded to respectively on the different nodes of block catenary system.
For example, authorization object is user A, being authorized to object is user B, and user A generates symmetric key K0, uses symmetric key
K0 encrypting plaintext file F obtains cryptograph files EF namely file destination, and it is N parts that user A, which divides cryptograph files EF, obtains file
Fragment SEF0, SEF1, SEF2, SEF3 ... SEFN, user A randomly choose N*M block chain node P00, P01, P02 ... PNM, will
P0M storage that SEF0 uploads to P00, P01, P02 ..., SEF1 being uploaded to P10, P11, P12 ..., P1M storage ... uploads to SEFN
PN0, PN1, PN2 ... PNM storage.
Through this embodiment, by the way of decentralization multinode storage file, it is divided into multi-disc to deposit file destination
Storage is in multiple blocks, the disadvantage for avoiding centralized server node single and vulnerable, while by each of file destination
Slicing files store multiple copies in multiple block chain nodes, ensure that the safety of slicing files, prevent in some node
When failure, slicing files is caused to be lost, entire file destination can not be decrypted.
Optionally, it in data processing method provided by the embodiments of the present application, is uploaded to respectively by more parts of slicing files
After on the different nodes of block catenary system, this method further include: by mark, the target of each part slicing files of file destination
The node location and symmetric key of each part slicing files storage of file are combined, and obtain the first data acquisition system;Using awarding
Second public key of power object encrypts the first data acquisition system, obtains the storage information of file destination;In block catenary system pair
In the case where storage being verified of information, by the block for storing information write-in block catenary system, and will storage information storage
Into each node of block catenary system.
Specifically, file encryption key K0, file fragmentation information and corresponding nodal information are combined into the first number by user A
According to set, it is denoted as file storage information I, user A oneself block chain public key PBK0 encrypts file and stores information I, generates encryption
File stores information SI, and the file of encryption storage information SI is packaged into transaction T0 and is sent on block chain, the verifying of block chain
Trade T0, writes transaction in block after, and synchronizes block to all nodes.
It should be noted that due to the corresponding cryptographic Hash of each block in block chain, and each block be
It is formed on the basis of the cryptographic Hash of previous block, New Transaction block and random number, therefore once has modified one of area
Data in block will change current block and the corresponding cryptographic Hash of back block, it is necessary to recalculate cryptographic Hash and form area
Block could form block chain, and the workload for calculating cryptographic Hash is very big, it is difficult to complete, it is ensured that block file will not be usurped
Change.
Optionally, in data processing method provided by the embodiments of the present application, by the storage information of file destination and authorization
Information is combined, and is encrypted using the first public key for being authorized to object to the information after combination, and target packet is obtained
Include: that the storage information of file destination is decrypted using the second public key of authorization object, obtains each part point of file destination
The node location and symmetric key that the mark of piece file, each part slicing files of file destination store;By each of file destination
The mark of part slicing files, node location, symmetric key and the authorization of each part slicing files storage of file destination are authorized to
The number of object accesses file destination is combined, and obtains the second data set;Using the first public key of authorized object to
Two data acquisition systems are encrypted, and target packet is obtained;In block catenary system to target packet in the case where being verified,
Target packet is written in the block of block catenary system, and target packet is stored into each node to block catenary system
In.
Specifically, user A obtains transaction T0 from block chain, stores information SI by the file that transaction T0 obtains encryption, and
Information I and file decryption key K0 is stored with the file that the block chain public key PBK0 decryption SI of oneself generates plaintext.Determination is awarded
In the case that the object of power is user B, file is stored information I, file decryption key K0 and authorizes the access times C of B by user A
It is combined generation the second data set, is denoted as IC, user A encrypts IC using the public key PBK1 of user B, generates target data
Packet is denoted as SIC, and SIC is generated authorization transaction T1 and is sent to block catenary system, block catenary system verifying transaction T1, and will
Authorization transaction T1 is bundled to block, is synchronized to all nodes.
Through this embodiment, the storage information of file destination and file destination is uploaded into block linkwork in authorization object
After system, generate authorization transaction packet further according to different authorized users, different authorization access times, the storage of file destination with award
Power access is independent to be carried out, and more flexible authorization is realized.
Optionally, in data processing method provided by the embodiments of the present application, in authorized object requests access target text
In the case where part, target packet is decrypted using the corresponding private key of the first public key of authorized object, and based on the number after decryption
It include: to verify quilt in the case where authorized object requests access target file according to file destination is obtained from block catenary system
The access request of authorization object;In the case where the access request for verifying authorized object passes through, target packet is obtained, and adopt
Target packet is decrypted with the corresponding private key of the first public key of authorized object, obtains the mark of each part slicing files of file destination
Know, the node location of each part slicing files of file destination storage, symmetric key and authorization are authorized to object accesses target text
The number of part;The node of each part slicing files storage of the mark and file destination of each part slicing files based on file destination
Each part slicing files of file destination on each node of position requests block catenary system;Each node of block catenary system is tested
Card request, in the case where being verified, returns to each part slicing files of file destination.
Specifically, user B generates the transaction T2 of reading file F, is sent to block catenary system, the verifying transaction of block catenary system
After T2, transaction T2 is packaged to block, and synchronous block, to all nodes, user B obtains authorization transaction T1, with the public key of oneself
The corresponding private key PRK1 decryption SIC of PBK1 obtains IC, and obtains file by IC and store information I, file decryption key K0, file
Access times C is authorized, further according to close in the file fragmentation information and nodal stored information requesting node in file storage information I
Literary file fragmentation P00, P01, P02 ... PNM returns to ciphertext slicing files in the case that node verification request passes through.
Through this embodiment, in authorized object accesses file destination, mesh is decrypted with the corresponding private key of the public key of itself
Data packet is marked, ensure that the safety of access data.
Optionally, in data processing method provided by the embodiments of the present application, each node verification of block catenary system is asked
It asks, in the case where being verified, each part slicing files for returning to file destination include: that judgement authorizes authorized object accesses mesh
Whether the number of mark file is greater than target access number, wherein target access number is to be authorized to object accesses file destination
History number;In the case where authorizing the number for being authorized to object accesses file destination to be greater than target access number, block linkwork
Each node of system returns to each part slicing files of file destination.
It should be noted that the case where authorizing the number for being authorized to object accesses file destination to be less than target access number
Under, return to the information of request error.
Specifically, node PN0, PN1, PN2 ... PNM gets the read request of user B and obtains corresponding reading transaction
T2 and authorization transaction T1, node PN0, PN1, PN2 ... PNM verifying authorize transaction T1 and read transaction T2, if user B's has read
The frequency of reading that number is less than authorization is read, then encryption burst information P00, P01, P02 ... PNM is returned to, if frequency of reading etc.
In authorization frequency of reading, then the error message of " authorization number has been used up " is returned.
Optionally, in data processing method provided by the embodiments of the present application, in the case where being verified, mesh is being returned to
After each part slicing files for marking file, this method further include: each part slicing files of file destination are combined, mesh is obtained
Mark file;File destination is decrypted using symmetric key, obtains clear text file.
Specifically, after user B gets encryption burst information P00, P01, P02 ... PNM, according to the burst information group of decryption
The complete encryption file EF of synthesis, and decrypt encryption file EF with decruption key K0 and obtain clear text file F, so that user B
Clear text file F can be had secure access to.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions
It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not
The sequence being same as herein executes shown or described step.
The embodiment of the present application also provides a kind of data processing equipments, it should be noted that the data of the embodiment of the present application
Processing unit can be used for executing provided by the embodiment of the present application for data processing method.The embodiment of the present application is mentioned below
The data processing equipment of confession is introduced.
Fig. 2 is the schematic diagram according to the data processing equipment of the embodiment of the present application.As shown in Fig. 2, the device includes: authorization
Unit 10 and acquiring unit 20.
Specifically, authorization unit 10 for the storage information of file destination to be combined with authorization message, and use quilt
First public key of authorization object encrypts the information after combination, obtains target packet, wherein file destination is authorization pair
As fragment is stored in the file of each node of block catenary system, each part slicing files of the storage information including at least file destination
The node location of storage, authorization message are the information that authorization object authorization is authorized to object accesses file destination.
Acquiring unit 20 is used in the case where authorized object requests access target file, using authorized object
The corresponding private key of first public key decrypts target packet, and obtains target text from block catenary system based on the data after decryption
Part.
Data processing equipment provided by the embodiments of the present application, by authorization unit 10 by the storage information of file destination with award
Power information is combined, and is encrypted using the first public key for being authorized to object to the information after combination, and target data is obtained
Packet, wherein file destination is the file for each node that authorization object fragment is stored in block catenary system, and storage information is at least wrapped
The node location of each part slicing files storage of file destination is included, authorization message is that authorization object authorization is authorized to object accesses mesh
Mark the information of file;Acquiring unit 20 is in the case where authorized object requests access target file, using authorized object
The corresponding private key of first public key decrypts target packet, and obtains target text from block catenary system based on the data after decryption
Part solves in the related technology in storage file on central server and when authorizing to the access of file, and central server is easy
The problem of accessing file with being difficult to safety and precise, is led to by attack, by combining the storage information of file destination with authorization message
The first public key encryption is used afterwards, and file destination is obtained using the corresponding private key decryption target packet of the first public key in access,
And then when having reached storage file and having authorized the access to file, the effect of file can be accessed to safety and precise.
Optionally, in data processing equipment provided by the embodiments of the present application, which includes: the first encryption unit, is used
In before being combined the storage information of file destination and authorization message, by symmetric key to authorization object wait store
Clear text file encrypted, obtain file destination;Cutting unit obtains more parts of fragments for being split to file destination
File;Uploading unit, for more parts of slicing files to be uploaded to the different nodes of block catenary system respectively.
Optionally, in data processing equipment provided by the embodiments of the present application, the device further include: the first assembled unit,
After on the different nodes that more parts of slicing files are uploaded to block catenary system respectively, by each part of file destination point
The mark of piece file, file destination the storage of each part slicing files node location and symmetric key be combined, obtain the
One data acquisition system;Second encryption unit is obtained for being encrypted using the second public key of authorization object to the first data acquisition system
The storage information of file destination;Storage unit, for, in the case where being verified of information of storage, will be deposited in block catenary system
In the block for storing up information write-in block catenary system, and by storage information storage into each node of block catenary system.
Optionally, in data processing equipment provided by the embodiments of the present application, the first assembled unit includes: deciphering module,
For the storage information of file destination to be decrypted using the second public key of authorization object, each part fragment of file destination is obtained
The node location and symmetric key that the mark of file, each part slicing files of file destination store;Composite module is used for mesh
Mark the mark of each part slicing files of file, the node location of each part slicing files storage of file destination, symmetric key and
It authorizes the number for being authorized to object accesses file destination to be combined, obtains the second data set;Encrypting module, for using quilt
First public key of authorization object encrypts the second data set, obtains target packet;Memory module, in block chain
System is in the case where being verified of target packet, by the block of target packet write-in block catenary system, and by mesh
Data packet storage is marked into each node of block catenary system.
Optionally, in data processing equipment provided by the embodiments of the present application, acquiring unit 20 includes: authentication module, is used
In in the case where authorized object requests access target file, the access request for being authorized to object is verified;Module is obtained, is used for
In the case where the access request for verifying authorized object passes through, target packet is obtained, and using the first of authorized object
The corresponding private key of public key decrypts target packet, obtains the mark of each part slicing files of file destination, each part of file destination
Node location, symmetric key and the number for authorizing authorized object accesses file destination of slicing files storage;Request module,
The node location of each part slicing files storage of mark and file destination for each part slicing files based on file destination
Request each part slicing files of the file destination on each node of block catenary system;Return module, for block catenary system
Each node verification request, in the case where being verified, returns to each part slicing files of file destination.
Optionally, in data processing equipment provided by the embodiments of the present application, return module includes: judging submodule, is used
Whether it is greater than target access number in the number for judging the authorized object accesses file destination of authorization, wherein target access number
For the history number for being authorized to object accesses file destination;Submodule is returned to, for authorizing authorized object accesses target text
In the case that the number of part is greater than target access number, each node of block catenary system returns to each part fragment text of file destination
Part.
Optionally, in data processing equipment provided by the embodiments of the present application, in the case where being verified, the device is also
It include: the second assembled unit, for after each part slicing files for returning to file destination, by each part fragment of file destination text
Part is combined, and obtains file destination;Decryption unit is obtained in plain text for file destination to be decrypted using symmetric key
File.
The data processing equipment includes processor and memory, the conduct such as above-mentioned authorization unit 10 and acquiring unit 20
Program unit stores in memory, executes above procedure unit stored in memory by processor to realize corresponding function
Energy.
Include kernel in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can be set one
Or more, it solves storage file and to authorize visit to file on central server in the related technology by adjusting kernel parameter
When asking, central server is easy to lead to the problem of accessing file with being difficult to safety and precise by attack.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/
Or the forms such as Nonvolatile memory, if read-only memory (ROM) or flash memory (flash RAM), memory include that at least one is deposited
Store up chip.
The embodiment of the invention provides a kind of storage mediums, are stored thereon with program, real when which is executed by processor
The existing data processing method.
The embodiment of the invention provides a kind of processor, the processor is for running program, wherein described program operation
Data processing method described in Shi Zhihang.
The embodiment of the invention provides a kind of equipment, equipment include processor, memory and storage on a memory and can
The program run on a processor, processor are performed the steps of when executing program by the storage information of file destination and authorization
Information is combined, and is encrypted using the first public key for being authorized to object to the information after combination, and target packet is obtained,
Wherein, file destination is the file for each node that authorization object fragment is stored in block catenary system, and storage information includes at least
The node location of each part slicing files storage of file destination, authorization message are that authorization object authorization is authorized to object accesses target
The information of file;It is corresponding using the first public key of authorized object in the case where authorized object requests access target file
Private key decrypt target packet, and obtain file destination from block catenary system based on the data after decryption.
Before being combined the storage information of file destination and authorization message, this method comprises: passing through symmetric key
The clear text file to be stored of authorization object is encrypted, file destination is obtained;File destination is split, obtains more parts
Slicing files;More parts of slicing files are uploaded to respectively on the different nodes of block catenary system.
After on the different nodes that more parts of slicing files are uploaded to block catenary system respectively, this method further include:
Node location that each part slicing files of the mark of each part slicing files of file destination, file destination are stored and symmetrical close
Key is combined, and obtains the first data acquisition system;The first data acquisition system is encrypted using the second public key of authorization object, is obtained
The storage information of file destination;In block catenary system in the case where being verified of information of storage, information write area will be stored
In the block of block catenary system, and by storage information storage into each node of block catenary system.
The storage information of file destination is combined with authorization message, and using the first public key of authorized object to group
Information after conjunction is encrypted, and obtaining target packet includes: the storage using the second public key of authorization object to file destination
Information is decrypted, and obtains the section of the mark of each part slicing files of file destination, each part slicing files storage of file destination
Point position and symmetric key;Each part slicing files of the mark of each part slicing files of file destination, file destination are stored
Node location, symmetric key and authorize be authorized to object accesses file destination number be combined, obtain the second data
Set;The second data set is encrypted using the first public key of authorized object, obtains target packet;In block linkwork
It unites in the case where being verified of target packet, by the block of target packet write-in block catenary system, and by target
Data packet is stored into each node of block catenary system.
In the case where authorized object requests access target file, using the corresponding private of the first public key of authorized object
Key decrypts target packet, and it includes: at authorized pair that file destination is obtained from block catenary system based on the data after decryption
In the case where requesting access to file destination, the access request for being authorized to object is verified;It is asked verifying the access for being authorized to object
It asks in the case where, obtains target packet, and number of targets is decrypted using the corresponding private key of the first public key for being authorized to object
According to packet, the node location, right of the mark of each part slicing files of file destination, each part slicing files storage of file destination is obtained
Claim key and authorizes the number for being authorized to object accesses file destination;The mark of each part slicing files based on file destination with
And the file destination on each node of the node location request block catenary system of each part slicing files storage of file destination
Each part slicing files;Each node verification of block catenary system is requested, and in the case where being verified, returns to each of file destination
Part slicing files.
Each node verification of block catenary system is requested, and in the case where being verified, returns to each part point of file destination
Piece file includes: to judge to authorize whether the number for being authorized to object accesses file destination is greater than target access number, wherein target
Access times are the history number for being authorized to object accesses file destination;Authorizing the number for being authorized to object accesses file destination
In the case where target access number, each node of block catenary system returns to each part slicing files of file destination.
In the case where being verified, after each part slicing files for returning to file destination, this method further include: by mesh
Each part slicing files of mark file are combined, and obtain file destination;File destination is decrypted using symmetric key, is obtained
Clear text file.Equipment herein can be server, PC, PAD, mobile phone etc..
Present invention also provides a kind of computer program products, when executing on data processing equipment, are adapted for carrying out just
The program of beginningization there are as below methods step: storage information and the authorization message of file destination are combined, and using being authorized to
First public key of object encrypts the information after combination, obtains target packet, wherein file destination is authorization object point
Piece is stored in the file of each node of block catenary system, and each part slicing files that storage information includes at least file destination store
Node location, authorization message be authorization object authorization be authorized to object accesses file destination information;It is asked in authorized object
In the case where seeking access target file, target packet, and base are decrypted using the corresponding private key of the first public key of authorized object
Data after decryption obtain file destination from block catenary system.
Before being combined the storage information of file destination and authorization message, this method comprises: passing through symmetric key
The clear text file to be stored of authorization object is encrypted, file destination is obtained;File destination is split, obtains more parts
Slicing files;More parts of slicing files are uploaded to respectively on the different nodes of block catenary system.
After on the different nodes that more parts of slicing files are uploaded to block catenary system respectively, this method further include:
Node location that each part slicing files of the mark of each part slicing files of file destination, file destination are stored and symmetrical close
Key is combined, and obtains the first data acquisition system;The first data acquisition system is encrypted using the second public key of authorization object, is obtained
The storage information of file destination;In block catenary system in the case where being verified of information of storage, information write area will be stored
In the block of block catenary system, and by storage information storage into each node of block catenary system.
The storage information of file destination is combined with authorization message, and using the first public key of authorized object to group
Information after conjunction is encrypted, and obtaining target packet includes: the storage using the second public key of authorization object to file destination
Information is decrypted, and obtains the section of the mark of each part slicing files of file destination, each part slicing files storage of file destination
Point position and symmetric key;Each part slicing files of the mark of each part slicing files of file destination, file destination are stored
Node location, symmetric key and authorize be authorized to object accesses file destination number be combined, obtain the second data
Set;The second data set is encrypted using the first public key of authorized object, obtains target packet;In block linkwork
It unites in the case where being verified of target packet, by the block of target packet write-in block catenary system, and by target
Data packet is stored into each node of block catenary system.
In the case where authorized object requests access target file, using the corresponding private of the first public key of authorized object
Key decrypts target packet, and it includes: at authorized pair that file destination is obtained from block catenary system based on the data after decryption
In the case where requesting access to file destination, the access request for being authorized to object is verified;It is asked verifying the access for being authorized to object
It asks in the case where, obtains target packet, and number of targets is decrypted using the corresponding private key of the first public key for being authorized to object
According to packet, the node location, right of the mark of each part slicing files of file destination, each part slicing files storage of file destination is obtained
Claim key and authorizes the number for being authorized to object accesses file destination;The mark of each part slicing files based on file destination with
And the file destination on each node of the node location request block catenary system of each part slicing files storage of file destination
Each part slicing files;Each node verification of block catenary system is requested, and in the case where being verified, returns to each of file destination
Part slicing files.
Each node verification of block catenary system is requested, and in the case where being verified, returns to each part point of file destination
Piece file includes: to judge to authorize whether the number for being authorized to object accesses file destination is greater than target access number, wherein target
Access times are the history number for being authorized to object accesses file destination;Authorizing the number for being authorized to object accesses file destination
In the case where target access number, each node of block catenary system returns to each part slicing files of file destination.
In the case where being verified, after each part slicing files for returning to file destination, this method further include: by mesh
Each part slicing files of mark file are combined, and obtain file destination;File destination is decrypted using symmetric key, is obtained
Clear text file.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/
Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable Jie
The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element
There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The above is only embodiments herein, are not intended to limit this application.To those skilled in the art,
Various changes and changes are possible in this application.It is all within the spirit and principles of the present application made by any modification, equivalent replacement,
Improve etc., it should be included within the scope of the claims of this application.
Claims (10)
1. a kind of data processing method characterized by comprising
The storage information of file destination is combined with authorization message, and using be authorized to object the first public key to combination after
Information encrypted, obtain target packet, wherein the file destination be the authorization object fragment be stored in block chain
The file of each node of system, the storage information include at least the node that each part slicing files of the file destination store
Position, the authorization message are to be authorized to the information of file destination described in object accesses described in the authorization object authorization;
In the case where the authorized object requests access the file destination, using the first public key of the authorized object
Corresponding private key decrypts the target packet, and obtains the target from the block catenary system based on the data after decryption
File.
2. the method according to claim 1, wherein being carried out by the storage information of file destination and authorization message
Before combination, which comprises
It is encrypted by be stored clear text file of the symmetric key to the authorization object, obtains the file destination;
The file destination is split, more parts of slicing files are obtained;
The more parts of slicing files are uploaded to respectively on the different nodes of the block catenary system.
3. according to the method described in claim 2, it is characterized in that, the more parts of slicing files are uploaded to the area respectively
After on the different nodes of block catenary system, the method also includes:
The node position that each part slicing files of the mark of each part slicing files of the file destination, the file destination are stored
It sets and the symmetric key is combined, obtain the first data acquisition system;
First data acquisition system is encrypted using the second public key of the authorization object, obtains depositing for the file destination
Store up information;
In the block catenary system in the case where being verified of information of storage, the area is written into the storage information
In the block of block catenary system, and by storage information storage into each node of the block catenary system.
4. according to the method described in claim 3, it is characterized in that, the storage information of file destination and authorization message are carried out group
It closes, and the information after combination is encrypted using the first public key for being authorized to object, obtaining target packet includes:
The storage information of the file destination is decrypted using the second public key of the authorization object, obtains the target text
The marks of each part slicing files of part, the node location of each part slicing files storage of the file destination and described symmetrical close
Key;
The node position that each part slicing files of the mark of each part slicing files of the file destination, the file destination are stored
Set, the number of file destination described in the symmetric key and the authorization authorized object accesses is combined, obtain second
Data acquisition system;
The second data set is encrypted using the first public key of the authorized object, obtains the target data
Packet;
In the case where being verified, institute is written by the target packet to the target packet in the block catenary system
In the block for stating block catenary system, and by target packet storage into each node of the block catenary system.
5. according to the method described in claim 4, it is characterized in that, accessing the file destination in the authorized object requests
In the case where, the target packet is decrypted using the corresponding private key of the first public key of the authorized object, and based on decryption
Data afterwards obtain the file destination from the block catenary system
In the case where the authorized object requests access the file destination, the access for verifying the authorized object is asked
It asks;
In the case where the access request for verifying the authorized object passes through, the target packet is obtained, and described in use
The corresponding private key of the first public key for being authorized to object decrypts the target packet, obtains each part fragment text of the file destination
The mark of part, the node location of each part slicing files storage of the file destination, the symmetric key and the authorization quilt
Authorization object accesses the number of the file destination;
Each part slicing files storage of the mark and file destination of each part slicing files based on the file destination
Node location requests each part slicing files of the file destination on each node of the block catenary system;
It is requested described in each node verification of the block catenary system, in the case where being verified, returns to the file destination
Each part slicing files.
6. according to the method described in claim 5, it is characterized in that, being asked described in each node verification of the block catenary system
It asks, in the case where being verified, each part slicing files for returning to the file destination include:
Judge whether the number for authorizing file destination described in the authorized object accesses is greater than target access number, wherein institute
State the history number that target access number is file destination described in the authorized object accesses;
In the case where authorizing the number of file destination described in the authorized object accesses to be greater than the target access number, institute
The each node for stating block catenary system returns to each part slicing files of the file destination.
7. according to the method described in claim 5, it is characterized in that, returning to the target text in the case where being verified
After each part slicing files of part, the method also includes:
Each part slicing files of the file destination are combined, the file destination is obtained;
The file destination is decrypted using the symmetric key, obtains the clear text file.
8. a kind of data processing equipment characterized by comprising
Authorization unit, for the storage information of file destination to be combined with authorization message, and using being authorized to the of object
One public key encrypts the information after combination, obtains target packet, wherein the file destination is the authorization object point
Piece is stored in the file of each node of block catenary system, and the storage information includes at least each part fragment of the file destination
The node location of file storage, the authorization message are to be authorized to the text of target described in object accesses described in the authorization object authorization
The information of part;
Acquiring unit, for being authorized to using described in the case where the authorized object requests access the file destination
The corresponding private key of first public key of object decrypts the target packet, and based on the data after decryption from the block catenary system
It is middle to obtain the file destination.
9. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein described program right of execution
Benefit require any one of 1 to 7 described in data processing method.
10. a kind of processor, which is characterized in that the processor is for running program, wherein right of execution when described program is run
Benefit require any one of 1 to 7 described in data processing method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910068760.9A CN109886040B (en) | 2019-01-24 | 2019-01-24 | Data processing method, data processing device, storage medium and processor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910068760.9A CN109886040B (en) | 2019-01-24 | 2019-01-24 | Data processing method, data processing device, storage medium and processor |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109886040A true CN109886040A (en) | 2019-06-14 |
CN109886040B CN109886040B (en) | 2021-06-22 |
Family
ID=66926828
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910068760.9A Active CN109886040B (en) | 2019-01-24 | 2019-01-24 | Data processing method, data processing device, storage medium and processor |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109886040B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110619236A (en) * | 2019-08-15 | 2019-12-27 | 中国人民银行数字货币研究所 | File authorization access method, device and system based on file credential information |
CN110636043A (en) * | 2019-08-16 | 2019-12-31 | 中国人民银行数字货币研究所 | File authorization access method, device and system based on block chain |
CN110784463A (en) * | 2019-10-24 | 2020-02-11 | 深圳市超算科技开发有限公司 | File storage and access method and system based on block chain |
CN110795702A (en) * | 2019-10-12 | 2020-02-14 | 山东英信计算机技术有限公司 | Software anti-cracking method, device, equipment and medium |
CN112100144A (en) * | 2020-08-20 | 2020-12-18 | 东软集团股份有限公司 | Block chain file sharing method and device, storage medium and electronic equipment |
CN113094394A (en) * | 2021-03-19 | 2021-07-09 | 广东省重工建筑设计院有限公司 | Data access method and device, computer equipment and storage medium |
CN113609221A (en) * | 2021-07-27 | 2021-11-05 | 卓尔智联(武汉)研究院有限公司 | Data storage method, data access device and storage medium |
CN113626855A (en) * | 2021-07-15 | 2021-11-09 | 杭州玖欣物联科技有限公司 | Data protection method based on block chain |
CN113726873A (en) * | 2021-08-27 | 2021-11-30 | 平安科技(深圳)有限公司 | Block chain-based file processing method, system, device and storage medium |
CN114422263A (en) * | 2022-02-23 | 2022-04-29 | 蚂蚁区块链科技(上海)有限公司 | Data acquisition method, device and system based on block chain network |
CN115499249A (en) * | 2022-11-17 | 2022-12-20 | 南京可信区块链与算法经济研究院有限公司 | File storage method and system based on block chain distributed encryption |
CN116629804A (en) * | 2023-06-06 | 2023-08-22 | 河北华正信息工程有限公司 | Letters, interviews, supervision and tracking management system and management method |
EP4010811A4 (en) * | 2019-07-27 | 2023-08-23 | Truckl LLC | Systems for multi-party dashboards |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023027A (en) * | 2014-06-18 | 2014-09-03 | 西安电子科技大学 | Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph |
GB2532039A (en) * | 2014-11-06 | 2016-05-11 | Ibm | Secure database backup and recovery |
CN107249046A (en) * | 2017-08-15 | 2017-10-13 | 李俊庄 | A kind of distributed cloud storage system construction method based on block chain |
CN108134822A (en) * | 2017-12-15 | 2018-06-08 | 成都链网络科技有限公司 | The method for down loading of storage system based on block chain |
CN109063498A (en) * | 2018-07-27 | 2018-12-21 | 深圳市新名泽科技有限公司 | Digital asset storage method, device, restoration methods and device |
CN109101830A (en) * | 2018-09-03 | 2018-12-28 | 安徽太阳石科技有限公司 | Real time data safety protecting method and system based on block chain |
-
2019
- 2019-01-24 CN CN201910068760.9A patent/CN109886040B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023027A (en) * | 2014-06-18 | 2014-09-03 | 西安电子科技大学 | Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph |
GB2532039A (en) * | 2014-11-06 | 2016-05-11 | Ibm | Secure database backup and recovery |
CN107249046A (en) * | 2017-08-15 | 2017-10-13 | 李俊庄 | A kind of distributed cloud storage system construction method based on block chain |
CN108134822A (en) * | 2017-12-15 | 2018-06-08 | 成都链网络科技有限公司 | The method for down loading of storage system based on block chain |
CN109063498A (en) * | 2018-07-27 | 2018-12-21 | 深圳市新名泽科技有限公司 | Digital asset storage method, device, restoration methods and device |
CN109101830A (en) * | 2018-09-03 | 2018-12-28 | 安徽太阳石科技有限公司 | Real time data safety protecting method and system based on block chain |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4010811A4 (en) * | 2019-07-27 | 2023-08-23 | Truckl LLC | Systems for multi-party dashboards |
CN110619236A (en) * | 2019-08-15 | 2019-12-27 | 中国人民银行数字货币研究所 | File authorization access method, device and system based on file credential information |
CN110636043A (en) * | 2019-08-16 | 2019-12-31 | 中国人民银行数字货币研究所 | File authorization access method, device and system based on block chain |
CN110795702A (en) * | 2019-10-12 | 2020-02-14 | 山东英信计算机技术有限公司 | Software anti-cracking method, device, equipment and medium |
CN110784463A (en) * | 2019-10-24 | 2020-02-11 | 深圳市超算科技开发有限公司 | File storage and access method and system based on block chain |
CN110784463B (en) * | 2019-10-24 | 2021-08-31 | 深圳市超算科技开发有限公司 | File storage and access method based on block chain |
CN112100144A (en) * | 2020-08-20 | 2020-12-18 | 东软集团股份有限公司 | Block chain file sharing method and device, storage medium and electronic equipment |
CN113094394A (en) * | 2021-03-19 | 2021-07-09 | 广东省重工建筑设计院有限公司 | Data access method and device, computer equipment and storage medium |
CN113626855A (en) * | 2021-07-15 | 2021-11-09 | 杭州玖欣物联科技有限公司 | Data protection method based on block chain |
CN113609221A (en) * | 2021-07-27 | 2021-11-05 | 卓尔智联(武汉)研究院有限公司 | Data storage method, data access device and storage medium |
CN113726873A (en) * | 2021-08-27 | 2021-11-30 | 平安科技(深圳)有限公司 | Block chain-based file processing method, system, device and storage medium |
CN114422263A (en) * | 2022-02-23 | 2022-04-29 | 蚂蚁区块链科技(上海)有限公司 | Data acquisition method, device and system based on block chain network |
CN114422263B (en) * | 2022-02-23 | 2024-03-26 | 蚂蚁区块链科技(上海)有限公司 | Data acquisition method, device, system, computer equipment and machine-readable storage medium based on blockchain network |
CN115499249A (en) * | 2022-11-17 | 2022-12-20 | 南京可信区块链与算法经济研究院有限公司 | File storage method and system based on block chain distributed encryption |
CN116629804A (en) * | 2023-06-06 | 2023-08-22 | 河北华正信息工程有限公司 | Letters, interviews, supervision and tracking management system and management method |
CN116629804B (en) * | 2023-06-06 | 2024-01-09 | 河北华正信息工程有限公司 | Letters, interviews, supervision and tracking management system and management method |
Also Published As
Publication number | Publication date |
---|---|
CN109886040B (en) | 2021-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109886040A (en) | Data processing method, device, storage medium and processor | |
CN111181720B (en) | Service processing method and device based on trusted execution environment | |
CN111082934B (en) | Cross-domain secure multiparty computing method and device based on trusted execution environment | |
CN108737374B (en) | Privacy protection method for data storage in block chain | |
TWI709314B (en) | Data processing method and device | |
CN110061845A (en) | Block chain data ciphering method, device, computer equipment and storage medium | |
CN110199287A (en) | It is unsealed using the data that area is surrounded in sealing | |
CN110199288A (en) | Crossover-platform surrounds area's seal data | |
CN107959566A (en) | Quantal data key agreement system and quantal data cryptographic key negotiation method | |
CN110199286A (en) | The seal data in area is surrounded using sealing | |
CN109788002A (en) | A kind of Http request encryption and decryption method and system | |
CN109936626A (en) | Method, node and the storage medium of secret protection are realized in block chain | |
CN102075544A (en) | Encryption system, encryption method and decryption method for local area network shared file | |
CN110214324A (en) | Key vault surrounds area | |
CN107370595A (en) | One kind is based on fine-grained ciphertext access control method | |
CN110020855A (en) | Method, the node, storage medium of secret protection are realized in block chain | |
CN106027503A (en) | Cloud storage data encryption method based on TPM | |
CN110226167A (en) | It is abstract to surround area's identity | |
CN110050437A (en) | The device and method of distributed certificate registration | |
CN110263544A (en) | In conjunction with the receipt storage method and node of type of transaction and Rule of judgment | |
CN109039611B (en) | Decruption key segmentation and decryption method, device, medium based on SM9 algorithm | |
CN109478214A (en) | Device and method for certificate registration | |
CN109921902A (en) | A kind of key management method, safety chip, service server and information system | |
CN110049032A (en) | A kind of the data content encryption method and device of two-way authentication | |
CN110214321A (en) | Nesting surrounds area's identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20211203 Address after: 430000 No. 1304, 13th floor, wuhuantiandi office building, No. 271, Zhuodaoquan Road, Hongshan District, Wuhan City, Hubei Province Patentee after: Wuhan ronghydrogen Technology Co.,Ltd. Address before: Room 504, 5 / F, block C, Zhonghui Plaza, 11 Dongzhimen South Street, Dongcheng District, Beijing Patentee before: BEIJING MIXISLINK TECHNOLOGY CO.,LTD. |