CN109886040A - Data processing method, device, storage medium and processor - Google Patents

Data processing method, device, storage medium and processor Download PDF

Info

Publication number
CN109886040A
CN109886040A CN201910068760.9A CN201910068760A CN109886040A CN 109886040 A CN109886040 A CN 109886040A CN 201910068760 A CN201910068760 A CN 201910068760A CN 109886040 A CN109886040 A CN 109886040A
Authority
CN
China
Prior art keywords
file destination
file
authorized
authorization
slicing files
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910068760.9A
Other languages
Chinese (zh)
Other versions
CN109886040B (en
Inventor
王昕辰
胡锴
卢俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan ronghydrogen Technology Co.,Ltd.
Original Assignee
Beijing Rong Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Rong Chain Technology Co Ltd filed Critical Beijing Rong Chain Technology Co Ltd
Priority to CN201910068760.9A priority Critical patent/CN109886040B/en
Publication of CN109886040A publication Critical patent/CN109886040A/en
Application granted granted Critical
Publication of CN109886040B publication Critical patent/CN109886040B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

This application discloses a kind of data processing method, device, storage medium and processors.This method comprises: the storage information of file destination is combined with authorization message, and the information after combination is encrypted using the first public key for being authorized to object, obtains target packet;In the case where authorized object requests access target file, target packet is decrypted using the corresponding private key of the first public key of authorized object, and obtain file destination from block catenary system based on the data after decryption.By the application, solve in the related technology in storage file on central server and when authorizing to the access of file, central server is easy to lead to the problem of accessing file with being difficult to safety and precise by attack.

Description

Data processing method, device, storage medium and processor
Technical field
This application involves technical field of data processing, are situated between in particular to a kind of data processing method, device, storage Matter and processor.
Background technique
Traditional document storage mode is all made of centralization storage mode, and specifically, upper transmitting file N is deposited after user A login On centre server, centralized server S storage file N, user A authorized user B access file N, centralization service Device S verifies the authorization of user A, authorizes successfully, and user B logs on to centralized server S, the file N that access user A is uploaded, In, the authorization of file N and access are to complete on centralized server S, but centralization storage mode is there are certain defect, Specifically, it since centralized server node is single, is easy to be attacked, once there is illegal user to invade centralized server, just The All Files of user's upload can be accessed, and then lead to the leakage of file, be tampered and the generation of false authorization, and Whether the user A of upper transmitting file and the user B for being authorized to the file file that is uncertain about are leaked or are tampered, file The safety of N is unable to get guarantee.
For in storage file on central server and when authorizing to the access of file, central server holds in the related technology The problem of accessing file with being difficult to safety and precise, is easily led to by attack, currently no effective solution has been proposed.
Summary of the invention
The application provides a kind of data processing method, device, storage medium and processor, to solve in the related technology in Storage file and when authorizing to the access of file on central server, central server is easy to be caused with being difficult to safety and precise by attack The problem of accessing file.
According to the one aspect of the application, a kind of data processing method is provided.This method comprises: depositing file destination Storage information is combined with authorization message, and is encrypted using the first public key for being authorized to object to the information after combination, is obtained To target packet, wherein file destination is the file for each node that authorization object fragment is stored in block catenary system, storage Information includes at least the node location that each part slicing files of file destination store, and authorization message is authorized to for authorization object authorization The information of object accesses file destination;In the case where authorized object requests access target file, using authorized object The corresponding private key of first public key decrypts target packet, and obtains target text from block catenary system based on the data after decryption Part.
Further, before being combined the storage information of file destination and authorization message, this method comprises: passing through Symmetric key encrypts the clear text file to be stored of authorization object, obtains file destination;File destination is split, Obtain more parts of slicing files;More parts of slicing files are uploaded to respectively on the different nodes of block catenary system.
Further, after on the different nodes that more parts of slicing files are uploaded to block catenary system respectively, the party Method further include: the node location for storing each part slicing files of the mark of each part slicing files of file destination, file destination And symmetric key is combined, and obtains the first data acquisition system;Using authorization object the second public key to the first data acquisition system into Row encryption, obtains the storage information of file destination;In block catenary system in the case where being verified of information of storage, will store Information is written in the block of block catenary system, and by storage information storage into each node of block catenary system.
Further, the storage information of file destination is combined with authorization message, and using being authorized to the of object One public key encrypts the information after combination, and obtaining target packet includes: the second public key using authorization object to target The storage information of file is decrypted, and obtains the mark of each part slicing files of file destination, each part fragment text of file destination The node location and symmetric key of part storage;By each part of the mark of each part slicing files of file destination, file destination point The number that node location, symmetric key and the authorization of piece file storage are authorized to object accesses file destination is combined, and is obtained To the second data set;The second data set is encrypted using the first public key of authorized object, obtains target packet; In the case where being verified, target packet is written the block of block catenary system to target packet in block catenary system In, and by target packet storage into each node of block catenary system.
Further, public using the first of authorized object in the case where authorized object requests access target file The corresponding private key of key decrypts target packet, and obtains file destination from block catenary system based on the data after decryption and include: In the case where authorized object requests access target file, the access request for being authorized to object is verified;At authorized pair of verifying In the case that the access request of elephant passes through, target packet is obtained, and using the corresponding private key of the first public key for being authorized to object Target packet is decrypted, what each part slicing files of the mark, file destination that obtain each part slicing files of file destination stored Node location, symmetric key and the number for authorizing authorized object accesses file destination;Each part fragment based on file destination On each node of the node location request block catenary system of each part slicing files storage of the mark and file destination of file File destination each part slicing files;Each node verification of block catenary system is requested, and in the case where being verified, is returned Each part slicing files of file destination.
Further, each node verification request of block catenary system returns to file destination in the case where being verified Each part slicing files include: judge authorize be authorized to object accesses file destination number whether be greater than target access number, Wherein, target access number is the history number for being authorized to object accesses file destination;It is authorized to object accesses target authorizing In the case that the number of file is greater than target access number, each node of block catenary system returns to each part fragment of file destination File.
Further, in the case where being verified, after each part slicing files for returning to file destination, this method is also Include: to be combined each part slicing files of file destination, obtains file destination;File destination is carried out using symmetric key Decryption, obtains clear text file.
According to the another aspect of the application, a kind of data processing equipment is provided.The device includes: authorization unit, is used for The storage information of file destination is combined with authorization message, and using the first public key of authorized object to the letter after combination Breath is encrypted, and target packet is obtained, wherein file destination is each section that authorization object fragment is stored in block catenary system The file of point, storage information include at least the node location that each part slicing files of file destination store, and authorization message is authorization Object Authorization is authorized to the information of object accesses file destination;Acquiring unit, in authorized object requests access target text In the case where part, target packet is decrypted using the corresponding private key of the first public key of authorized object, and based on the number after decryption File destination is obtained according to from block catenary system.
To achieve the goals above, according to the another aspect of the application, a kind of storage medium is provided, storage medium includes The program of storage, wherein program executes any one of the above data processing method.
To achieve the goals above, according to the another aspect of the application, a kind of processor is provided, processor is for running Program, wherein program executes any one of the above data processing method when running.
By the application, using following steps: storage information and the authorization message of file destination being combined, and used The first public key for being authorized to object encrypts the information after combination, obtains target packet, wherein file destination is authorization Object fragment is stored in the file of each node of block catenary system, and storage information includes at least each part fragment text of file destination The node location of part storage, authorization message are the information that authorization object authorization is authorized to object accesses file destination;It is being authorized to In the case where object requests access target file, target data is decrypted using the corresponding private key of the first public key of authorized object Packet, and file destination is obtained from block catenary system based on the data after decryption, it solves in the related technology in central server Upper storage file and when authorizing to the access of file, central server is easy to be caused to access file with being difficult to safety and precise by attack The problem of.By using the first public key encryption after combining the storage information of file destination with authorization message, used in access The corresponding private key decryption target packet of first public key obtains file destination, and then has reached storage file and authorized to file When access, the effect of file can be accessed to safety and precise.
Detailed description of the invention
The attached drawing constituted part of this application is used to provide further understanding of the present application, the schematic reality of the application Example and its explanation are applied for explaining the application, is not constituted an undue limitation on the present application.In the accompanying drawings:
Fig. 1 is the flow chart according to data processing method provided by the embodiments of the present application;And
Fig. 2 is the schematic diagram according to data processing equipment provided by the embodiments of the present application.
Specific embodiment
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection It encloses.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein.In addition, term " includes " and " tool Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or units Process, method, system, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include without clear Other step or units listing to Chu or intrinsic for these process, methods, product or equipment.
For ease of description, below to the invention relates to part noun or term be illustrated:
Public key and private key: public key is the key pair obtained by a kind of algorithm with private key, and public key is cipher key pair public affairs The part opened, private key are then private parts.Public key is commonly used in encrypted session key, verifying digital signature, or encryption can With the data decrypted with corresponding private key.
According to an embodiment of the present application, a kind of data processing method is provided.
Fig. 1 is the flow chart according to the data processing method of the embodiment of the present application.As shown in Figure 1, this method includes following Step:
Storage information and the authorization message of file destination are combined by step S101, and using being authorized to the of object One public key encrypts the information after combination, obtains target packet, wherein file destination is that authorization object fragment is stored in The file of each node of block catenary system, storage information include at least the node position that each part slicing files of file destination store It sets, authorization message is the information that authorization object authorization is authorized to object accesses file destination.
It should be noted that by the combined information of the storage information of asymmetric key pair file destination and authorization message into Row encrypts, and trades at authorization, is only authorized to the private key ability decryption and authorization transaction file that object has unsymmetrical key, significantly Improve the safety for obtaining file destination.
Step S102, it is public using the first of authorized object in the case where authorized object requests access target file The corresponding private key of key decrypts target packet, and obtains file destination from block catenary system based on the data after decryption.
Specifically, it is authorized to object and target packet is decrypted using the corresponding private key of the first public key, obtains file destination Information and authorization message are stored, and then in the case where authorization message is proved to be successful, the storage acquisition of information based on file destination File destination specifically gets each part of file destination by the node location that each part slicing files of file destination store Slicing files.
Data processing method provided by the embodiments of the present application, by carrying out the storage information of file destination and authorization message Combination, and the information after combination is encrypted using the first public key for being authorized to object, obtain target packet, wherein mesh Mark file is the file for each node that authorization object fragment is stored in block catenary system, and storage information includes at least file destination Each part slicing files storage node location, authorization message be authorization object authorization be authorized to object accesses file destination letter Breath;In the case where authorized object requests access target file, using the corresponding private key solution of the first public key of authorized object Close target packet, and file destination is obtained from block catenary system based on the data after decryption, it solves and exists in the related technology Storage file and when authorizing to the access of file on central server, central server is easy to be caused to be difficult to safety and precise by attack Ground accesses the problem of file.By using the first public key encryption after combining the storage information of file destination with authorization message, File destination is obtained using the corresponding private key decryption target packet of the first public key when access, and then has reached storage file and has awarded When weighing the access to file, the effect of file can be accessed to safety and precise.
In order to further enhance the safety for the file being stored on block chain, optionally, provided in the embodiment of the present application Data processing method in, before being combined the storage information of file destination and authorization message, this method comprises: passing through Symmetric key encrypts the clear text file to be stored of authorization object, obtains file destination;File destination is split, Obtain more parts of slicing files;More parts of slicing files are uploaded to respectively on the different nodes of block catenary system.
For example, authorization object is user A, being authorized to object is user B, and user A generates symmetric key K0, uses symmetric key K0 encrypting plaintext file F obtains cryptograph files EF namely file destination, and it is N parts that user A, which divides cryptograph files EF, obtains file Fragment SEF0, SEF1, SEF2, SEF3 ... SEFN, user A randomly choose N*M block chain node P00, P01, P02 ... PNM, will P0M storage that SEF0 uploads to P00, P01, P02 ..., SEF1 being uploaded to P10, P11, P12 ..., P1M storage ... uploads to SEFN PN0, PN1, PN2 ... PNM storage.
Through this embodiment, by the way of decentralization multinode storage file, it is divided into multi-disc to deposit file destination Storage is in multiple blocks, the disadvantage for avoiding centralized server node single and vulnerable, while by each of file destination Slicing files store multiple copies in multiple block chain nodes, ensure that the safety of slicing files, prevent in some node When failure, slicing files is caused to be lost, entire file destination can not be decrypted.
Optionally, it in data processing method provided by the embodiments of the present application, is uploaded to respectively by more parts of slicing files After on the different nodes of block catenary system, this method further include: by mark, the target of each part slicing files of file destination The node location and symmetric key of each part slicing files storage of file are combined, and obtain the first data acquisition system;Using awarding Second public key of power object encrypts the first data acquisition system, obtains the storage information of file destination;In block catenary system pair In the case where storage being verified of information, by the block for storing information write-in block catenary system, and will storage information storage Into each node of block catenary system.
Specifically, file encryption key K0, file fragmentation information and corresponding nodal information are combined into the first number by user A According to set, it is denoted as file storage information I, user A oneself block chain public key PBK0 encrypts file and stores information I, generates encryption File stores information SI, and the file of encryption storage information SI is packaged into transaction T0 and is sent on block chain, the verifying of block chain Trade T0, writes transaction in block after, and synchronizes block to all nodes.
It should be noted that due to the corresponding cryptographic Hash of each block in block chain, and each block be It is formed on the basis of the cryptographic Hash of previous block, New Transaction block and random number, therefore once has modified one of area Data in block will change current block and the corresponding cryptographic Hash of back block, it is necessary to recalculate cryptographic Hash and form area Block could form block chain, and the workload for calculating cryptographic Hash is very big, it is difficult to complete, it is ensured that block file will not be usurped Change.
Optionally, in data processing method provided by the embodiments of the present application, by the storage information of file destination and authorization Information is combined, and is encrypted using the first public key for being authorized to object to the information after combination, and target packet is obtained Include: that the storage information of file destination is decrypted using the second public key of authorization object, obtains each part point of file destination The node location and symmetric key that the mark of piece file, each part slicing files of file destination store;By each of file destination The mark of part slicing files, node location, symmetric key and the authorization of each part slicing files storage of file destination are authorized to The number of object accesses file destination is combined, and obtains the second data set;Using the first public key of authorized object to Two data acquisition systems are encrypted, and target packet is obtained;In block catenary system to target packet in the case where being verified, Target packet is written in the block of block catenary system, and target packet is stored into each node to block catenary system In.
Specifically, user A obtains transaction T0 from block chain, stores information SI by the file that transaction T0 obtains encryption, and Information I and file decryption key K0 is stored with the file that the block chain public key PBK0 decryption SI of oneself generates plaintext.Determination is awarded In the case that the object of power is user B, file is stored information I, file decryption key K0 and authorizes the access times C of B by user A It is combined generation the second data set, is denoted as IC, user A encrypts IC using the public key PBK1 of user B, generates target data Packet is denoted as SIC, and SIC is generated authorization transaction T1 and is sent to block catenary system, block catenary system verifying transaction T1, and will Authorization transaction T1 is bundled to block, is synchronized to all nodes.
Through this embodiment, the storage information of file destination and file destination is uploaded into block linkwork in authorization object After system, generate authorization transaction packet further according to different authorized users, different authorization access times, the storage of file destination with award Power access is independent to be carried out, and more flexible authorization is realized.
Optionally, in data processing method provided by the embodiments of the present application, in authorized object requests access target text In the case where part, target packet is decrypted using the corresponding private key of the first public key of authorized object, and based on the number after decryption It include: to verify quilt in the case where authorized object requests access target file according to file destination is obtained from block catenary system The access request of authorization object;In the case where the access request for verifying authorized object passes through, target packet is obtained, and adopt Target packet is decrypted with the corresponding private key of the first public key of authorized object, obtains the mark of each part slicing files of file destination Know, the node location of each part slicing files of file destination storage, symmetric key and authorization are authorized to object accesses target text The number of part;The node of each part slicing files storage of the mark and file destination of each part slicing files based on file destination Each part slicing files of file destination on each node of position requests block catenary system;Each node of block catenary system is tested Card request, in the case where being verified, returns to each part slicing files of file destination.
Specifically, user B generates the transaction T2 of reading file F, is sent to block catenary system, the verifying transaction of block catenary system After T2, transaction T2 is packaged to block, and synchronous block, to all nodes, user B obtains authorization transaction T1, with the public key of oneself The corresponding private key PRK1 decryption SIC of PBK1 obtains IC, and obtains file by IC and store information I, file decryption key K0, file Access times C is authorized, further according to close in the file fragmentation information and nodal stored information requesting node in file storage information I Literary file fragmentation P00, P01, P02 ... PNM returns to ciphertext slicing files in the case that node verification request passes through.
Through this embodiment, in authorized object accesses file destination, mesh is decrypted with the corresponding private key of the public key of itself Data packet is marked, ensure that the safety of access data.
Optionally, in data processing method provided by the embodiments of the present application, each node verification of block catenary system is asked It asks, in the case where being verified, each part slicing files for returning to file destination include: that judgement authorizes authorized object accesses mesh Whether the number of mark file is greater than target access number, wherein target access number is to be authorized to object accesses file destination History number;In the case where authorizing the number for being authorized to object accesses file destination to be greater than target access number, block linkwork Each node of system returns to each part slicing files of file destination.
It should be noted that the case where authorizing the number for being authorized to object accesses file destination to be less than target access number Under, return to the information of request error.
Specifically, node PN0, PN1, PN2 ... PNM gets the read request of user B and obtains corresponding reading transaction T2 and authorization transaction T1, node PN0, PN1, PN2 ... PNM verifying authorize transaction T1 and read transaction T2, if user B's has read The frequency of reading that number is less than authorization is read, then encryption burst information P00, P01, P02 ... PNM is returned to, if frequency of reading etc. In authorization frequency of reading, then the error message of " authorization number has been used up " is returned.
Optionally, in data processing method provided by the embodiments of the present application, in the case where being verified, mesh is being returned to After each part slicing files for marking file, this method further include: each part slicing files of file destination are combined, mesh is obtained Mark file;File destination is decrypted using symmetric key, obtains clear text file.
Specifically, after user B gets encryption burst information P00, P01, P02 ... PNM, according to the burst information group of decryption The complete encryption file EF of synthesis, and decrypt encryption file EF with decruption key K0 and obtain clear text file F, so that user B Clear text file F can be had secure access to.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not The sequence being same as herein executes shown or described step.
The embodiment of the present application also provides a kind of data processing equipments, it should be noted that the data of the embodiment of the present application Processing unit can be used for executing provided by the embodiment of the present application for data processing method.The embodiment of the present application is mentioned below The data processing equipment of confession is introduced.
Fig. 2 is the schematic diagram according to the data processing equipment of the embodiment of the present application.As shown in Fig. 2, the device includes: authorization Unit 10 and acquiring unit 20.
Specifically, authorization unit 10 for the storage information of file destination to be combined with authorization message, and use quilt First public key of authorization object encrypts the information after combination, obtains target packet, wherein file destination is authorization pair As fragment is stored in the file of each node of block catenary system, each part slicing files of the storage information including at least file destination The node location of storage, authorization message are the information that authorization object authorization is authorized to object accesses file destination.
Acquiring unit 20 is used in the case where authorized object requests access target file, using authorized object The corresponding private key of first public key decrypts target packet, and obtains target text from block catenary system based on the data after decryption Part.
Data processing equipment provided by the embodiments of the present application, by authorization unit 10 by the storage information of file destination with award Power information is combined, and is encrypted using the first public key for being authorized to object to the information after combination, and target data is obtained Packet, wherein file destination is the file for each node that authorization object fragment is stored in block catenary system, and storage information is at least wrapped The node location of each part slicing files storage of file destination is included, authorization message is that authorization object authorization is authorized to object accesses mesh Mark the information of file;Acquiring unit 20 is in the case where authorized object requests access target file, using authorized object The corresponding private key of first public key decrypts target packet, and obtains target text from block catenary system based on the data after decryption Part solves in the related technology in storage file on central server and when authorizing to the access of file, and central server is easy The problem of accessing file with being difficult to safety and precise, is led to by attack, by combining the storage information of file destination with authorization message The first public key encryption is used afterwards, and file destination is obtained using the corresponding private key decryption target packet of the first public key in access, And then when having reached storage file and having authorized the access to file, the effect of file can be accessed to safety and precise.
Optionally, in data processing equipment provided by the embodiments of the present application, which includes: the first encryption unit, is used In before being combined the storage information of file destination and authorization message, by symmetric key to authorization object wait store Clear text file encrypted, obtain file destination;Cutting unit obtains more parts of fragments for being split to file destination File;Uploading unit, for more parts of slicing files to be uploaded to the different nodes of block catenary system respectively.
Optionally, in data processing equipment provided by the embodiments of the present application, the device further include: the first assembled unit, After on the different nodes that more parts of slicing files are uploaded to block catenary system respectively, by each part of file destination point The mark of piece file, file destination the storage of each part slicing files node location and symmetric key be combined, obtain the One data acquisition system;Second encryption unit is obtained for being encrypted using the second public key of authorization object to the first data acquisition system The storage information of file destination;Storage unit, for, in the case where being verified of information of storage, will be deposited in block catenary system In the block for storing up information write-in block catenary system, and by storage information storage into each node of block catenary system.
Optionally, in data processing equipment provided by the embodiments of the present application, the first assembled unit includes: deciphering module, For the storage information of file destination to be decrypted using the second public key of authorization object, each part fragment of file destination is obtained The node location and symmetric key that the mark of file, each part slicing files of file destination store;Composite module is used for mesh Mark the mark of each part slicing files of file, the node location of each part slicing files storage of file destination, symmetric key and It authorizes the number for being authorized to object accesses file destination to be combined, obtains the second data set;Encrypting module, for using quilt First public key of authorization object encrypts the second data set, obtains target packet;Memory module, in block chain System is in the case where being verified of target packet, by the block of target packet write-in block catenary system, and by mesh Data packet storage is marked into each node of block catenary system.
Optionally, in data processing equipment provided by the embodiments of the present application, acquiring unit 20 includes: authentication module, is used In in the case where authorized object requests access target file, the access request for being authorized to object is verified;Module is obtained, is used for In the case where the access request for verifying authorized object passes through, target packet is obtained, and using the first of authorized object The corresponding private key of public key decrypts target packet, obtains the mark of each part slicing files of file destination, each part of file destination Node location, symmetric key and the number for authorizing authorized object accesses file destination of slicing files storage;Request module, The node location of each part slicing files storage of mark and file destination for each part slicing files based on file destination Request each part slicing files of the file destination on each node of block catenary system;Return module, for block catenary system Each node verification request, in the case where being verified, returns to each part slicing files of file destination.
Optionally, in data processing equipment provided by the embodiments of the present application, return module includes: judging submodule, is used Whether it is greater than target access number in the number for judging the authorized object accesses file destination of authorization, wherein target access number For the history number for being authorized to object accesses file destination;Submodule is returned to, for authorizing authorized object accesses target text In the case that the number of part is greater than target access number, each node of block catenary system returns to each part fragment text of file destination Part.
Optionally, in data processing equipment provided by the embodiments of the present application, in the case where being verified, the device is also It include: the second assembled unit, for after each part slicing files for returning to file destination, by each part fragment of file destination text Part is combined, and obtains file destination;Decryption unit is obtained in plain text for file destination to be decrypted using symmetric key File.
The data processing equipment includes processor and memory, the conduct such as above-mentioned authorization unit 10 and acquiring unit 20 Program unit stores in memory, executes above procedure unit stored in memory by processor to realize corresponding function Energy.
Include kernel in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can be set one Or more, it solves storage file and to authorize visit to file on central server in the related technology by adjusting kernel parameter When asking, central server is easy to lead to the problem of accessing file with being difficult to safety and precise by attack.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, if read-only memory (ROM) or flash memory (flash RAM), memory include that at least one is deposited Store up chip.
The embodiment of the invention provides a kind of storage mediums, are stored thereon with program, real when which is executed by processor The existing data processing method.
The embodiment of the invention provides a kind of processor, the processor is for running program, wherein described program operation Data processing method described in Shi Zhihang.
The embodiment of the invention provides a kind of equipment, equipment include processor, memory and storage on a memory and can The program run on a processor, processor are performed the steps of when executing program by the storage information of file destination and authorization Information is combined, and is encrypted using the first public key for being authorized to object to the information after combination, and target packet is obtained, Wherein, file destination is the file for each node that authorization object fragment is stored in block catenary system, and storage information includes at least The node location of each part slicing files storage of file destination, authorization message are that authorization object authorization is authorized to object accesses target The information of file;It is corresponding using the first public key of authorized object in the case where authorized object requests access target file Private key decrypt target packet, and obtain file destination from block catenary system based on the data after decryption.
Before being combined the storage information of file destination and authorization message, this method comprises: passing through symmetric key The clear text file to be stored of authorization object is encrypted, file destination is obtained;File destination is split, obtains more parts Slicing files;More parts of slicing files are uploaded to respectively on the different nodes of block catenary system.
After on the different nodes that more parts of slicing files are uploaded to block catenary system respectively, this method further include: Node location that each part slicing files of the mark of each part slicing files of file destination, file destination are stored and symmetrical close Key is combined, and obtains the first data acquisition system;The first data acquisition system is encrypted using the second public key of authorization object, is obtained The storage information of file destination;In block catenary system in the case where being verified of information of storage, information write area will be stored In the block of block catenary system, and by storage information storage into each node of block catenary system.
The storage information of file destination is combined with authorization message, and using the first public key of authorized object to group Information after conjunction is encrypted, and obtaining target packet includes: the storage using the second public key of authorization object to file destination Information is decrypted, and obtains the section of the mark of each part slicing files of file destination, each part slicing files storage of file destination Point position and symmetric key;Each part slicing files of the mark of each part slicing files of file destination, file destination are stored Node location, symmetric key and authorize be authorized to object accesses file destination number be combined, obtain the second data Set;The second data set is encrypted using the first public key of authorized object, obtains target packet;In block linkwork It unites in the case where being verified of target packet, by the block of target packet write-in block catenary system, and by target Data packet is stored into each node of block catenary system.
In the case where authorized object requests access target file, using the corresponding private of the first public key of authorized object Key decrypts target packet, and it includes: at authorized pair that file destination is obtained from block catenary system based on the data after decryption In the case where requesting access to file destination, the access request for being authorized to object is verified;It is asked verifying the access for being authorized to object It asks in the case where, obtains target packet, and number of targets is decrypted using the corresponding private key of the first public key for being authorized to object According to packet, the node location, right of the mark of each part slicing files of file destination, each part slicing files storage of file destination is obtained Claim key and authorizes the number for being authorized to object accesses file destination;The mark of each part slicing files based on file destination with And the file destination on each node of the node location request block catenary system of each part slicing files storage of file destination Each part slicing files;Each node verification of block catenary system is requested, and in the case where being verified, returns to each of file destination Part slicing files.
Each node verification of block catenary system is requested, and in the case where being verified, returns to each part point of file destination Piece file includes: to judge to authorize whether the number for being authorized to object accesses file destination is greater than target access number, wherein target Access times are the history number for being authorized to object accesses file destination;Authorizing the number for being authorized to object accesses file destination In the case where target access number, each node of block catenary system returns to each part slicing files of file destination.
In the case where being verified, after each part slicing files for returning to file destination, this method further include: by mesh Each part slicing files of mark file are combined, and obtain file destination;File destination is decrypted using symmetric key, is obtained Clear text file.Equipment herein can be server, PC, PAD, mobile phone etc..
Present invention also provides a kind of computer program products, when executing on data processing equipment, are adapted for carrying out just The program of beginningization there are as below methods step: storage information and the authorization message of file destination are combined, and using being authorized to First public key of object encrypts the information after combination, obtains target packet, wherein file destination is authorization object point Piece is stored in the file of each node of block catenary system, and each part slicing files that storage information includes at least file destination store Node location, authorization message be authorization object authorization be authorized to object accesses file destination information;It is asked in authorized object In the case where seeking access target file, target packet, and base are decrypted using the corresponding private key of the first public key of authorized object Data after decryption obtain file destination from block catenary system.
Before being combined the storage information of file destination and authorization message, this method comprises: passing through symmetric key The clear text file to be stored of authorization object is encrypted, file destination is obtained;File destination is split, obtains more parts Slicing files;More parts of slicing files are uploaded to respectively on the different nodes of block catenary system.
After on the different nodes that more parts of slicing files are uploaded to block catenary system respectively, this method further include: Node location that each part slicing files of the mark of each part slicing files of file destination, file destination are stored and symmetrical close Key is combined, and obtains the first data acquisition system;The first data acquisition system is encrypted using the second public key of authorization object, is obtained The storage information of file destination;In block catenary system in the case where being verified of information of storage, information write area will be stored In the block of block catenary system, and by storage information storage into each node of block catenary system.
The storage information of file destination is combined with authorization message, and using the first public key of authorized object to group Information after conjunction is encrypted, and obtaining target packet includes: the storage using the second public key of authorization object to file destination Information is decrypted, and obtains the section of the mark of each part slicing files of file destination, each part slicing files storage of file destination Point position and symmetric key;Each part slicing files of the mark of each part slicing files of file destination, file destination are stored Node location, symmetric key and authorize be authorized to object accesses file destination number be combined, obtain the second data Set;The second data set is encrypted using the first public key of authorized object, obtains target packet;In block linkwork It unites in the case where being verified of target packet, by the block of target packet write-in block catenary system, and by target Data packet is stored into each node of block catenary system.
In the case where authorized object requests access target file, using the corresponding private of the first public key of authorized object Key decrypts target packet, and it includes: at authorized pair that file destination is obtained from block catenary system based on the data after decryption In the case where requesting access to file destination, the access request for being authorized to object is verified;It is asked verifying the access for being authorized to object It asks in the case where, obtains target packet, and number of targets is decrypted using the corresponding private key of the first public key for being authorized to object According to packet, the node location, right of the mark of each part slicing files of file destination, each part slicing files storage of file destination is obtained Claim key and authorizes the number for being authorized to object accesses file destination;The mark of each part slicing files based on file destination with And the file destination on each node of the node location request block catenary system of each part slicing files storage of file destination Each part slicing files;Each node verification of block catenary system is requested, and in the case where being verified, returns to each of file destination Part slicing files.
Each node verification of block catenary system is requested, and in the case where being verified, returns to each part point of file destination Piece file includes: to judge to authorize whether the number for being authorized to object accesses file destination is greater than target access number, wherein target Access times are the history number for being authorized to object accesses file destination;Authorizing the number for being authorized to object accesses file destination In the case where target access number, each node of block catenary system returns to each part slicing files of file destination.
In the case where being verified, after each part slicing files for returning to file destination, this method further include: by mesh Each part slicing files of mark file are combined, and obtain file destination;File destination is decrypted using symmetric key, is obtained Clear text file.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable Jie The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The above is only embodiments herein, are not intended to limit this application.To those skilled in the art, Various changes and changes are possible in this application.It is all within the spirit and principles of the present application made by any modification, equivalent replacement, Improve etc., it should be included within the scope of the claims of this application.

Claims (10)

1. a kind of data processing method characterized by comprising
The storage information of file destination is combined with authorization message, and using be authorized to object the first public key to combination after Information encrypted, obtain target packet, wherein the file destination be the authorization object fragment be stored in block chain The file of each node of system, the storage information include at least the node that each part slicing files of the file destination store Position, the authorization message are to be authorized to the information of file destination described in object accesses described in the authorization object authorization;
In the case where the authorized object requests access the file destination, using the first public key of the authorized object Corresponding private key decrypts the target packet, and obtains the target from the block catenary system based on the data after decryption File.
2. the method according to claim 1, wherein being carried out by the storage information of file destination and authorization message Before combination, which comprises
It is encrypted by be stored clear text file of the symmetric key to the authorization object, obtains the file destination;
The file destination is split, more parts of slicing files are obtained;
The more parts of slicing files are uploaded to respectively on the different nodes of the block catenary system.
3. according to the method described in claim 2, it is characterized in that, the more parts of slicing files are uploaded to the area respectively After on the different nodes of block catenary system, the method also includes:
The node position that each part slicing files of the mark of each part slicing files of the file destination, the file destination are stored It sets and the symmetric key is combined, obtain the first data acquisition system;
First data acquisition system is encrypted using the second public key of the authorization object, obtains depositing for the file destination Store up information;
In the block catenary system in the case where being verified of information of storage, the area is written into the storage information In the block of block catenary system, and by storage information storage into each node of the block catenary system.
4. according to the method described in claim 3, it is characterized in that, the storage information of file destination and authorization message are carried out group It closes, and the information after combination is encrypted using the first public key for being authorized to object, obtaining target packet includes:
The storage information of the file destination is decrypted using the second public key of the authorization object, obtains the target text The marks of each part slicing files of part, the node location of each part slicing files storage of the file destination and described symmetrical close Key;
The node position that each part slicing files of the mark of each part slicing files of the file destination, the file destination are stored Set, the number of file destination described in the symmetric key and the authorization authorized object accesses is combined, obtain second Data acquisition system;
The second data set is encrypted using the first public key of the authorized object, obtains the target data Packet;
In the case where being verified, institute is written by the target packet to the target packet in the block catenary system In the block for stating block catenary system, and by target packet storage into each node of the block catenary system.
5. according to the method described in claim 4, it is characterized in that, accessing the file destination in the authorized object requests In the case where, the target packet is decrypted using the corresponding private key of the first public key of the authorized object, and based on decryption Data afterwards obtain the file destination from the block catenary system
In the case where the authorized object requests access the file destination, the access for verifying the authorized object is asked It asks;
In the case where the access request for verifying the authorized object passes through, the target packet is obtained, and described in use The corresponding private key of the first public key for being authorized to object decrypts the target packet, obtains each part fragment text of the file destination The mark of part, the node location of each part slicing files storage of the file destination, the symmetric key and the authorization quilt Authorization object accesses the number of the file destination;
Each part slicing files storage of the mark and file destination of each part slicing files based on the file destination Node location requests each part slicing files of the file destination on each node of the block catenary system;
It is requested described in each node verification of the block catenary system, in the case where being verified, returns to the file destination Each part slicing files.
6. according to the method described in claim 5, it is characterized in that, being asked described in each node verification of the block catenary system It asks, in the case where being verified, each part slicing files for returning to the file destination include:
Judge whether the number for authorizing file destination described in the authorized object accesses is greater than target access number, wherein institute State the history number that target access number is file destination described in the authorized object accesses;
In the case where authorizing the number of file destination described in the authorized object accesses to be greater than the target access number, institute The each node for stating block catenary system returns to each part slicing files of the file destination.
7. according to the method described in claim 5, it is characterized in that, returning to the target text in the case where being verified After each part slicing files of part, the method also includes:
Each part slicing files of the file destination are combined, the file destination is obtained;
The file destination is decrypted using the symmetric key, obtains the clear text file.
8. a kind of data processing equipment characterized by comprising
Authorization unit, for the storage information of file destination to be combined with authorization message, and using being authorized to the of object One public key encrypts the information after combination, obtains target packet, wherein the file destination is the authorization object point Piece is stored in the file of each node of block catenary system, and the storage information includes at least each part fragment of the file destination The node location of file storage, the authorization message are to be authorized to the text of target described in object accesses described in the authorization object authorization The information of part;
Acquiring unit, for being authorized to using described in the case where the authorized object requests access the file destination The corresponding private key of first public key of object decrypts the target packet, and based on the data after decryption from the block catenary system It is middle to obtain the file destination.
9. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein described program right of execution Benefit require any one of 1 to 7 described in data processing method.
10. a kind of processor, which is characterized in that the processor is for running program, wherein right of execution when described program is run Benefit require any one of 1 to 7 described in data processing method.
CN201910068760.9A 2019-01-24 2019-01-24 Data processing method, data processing device, storage medium and processor Active CN109886040B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910068760.9A CN109886040B (en) 2019-01-24 2019-01-24 Data processing method, data processing device, storage medium and processor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910068760.9A CN109886040B (en) 2019-01-24 2019-01-24 Data processing method, data processing device, storage medium and processor

Publications (2)

Publication Number Publication Date
CN109886040A true CN109886040A (en) 2019-06-14
CN109886040B CN109886040B (en) 2021-06-22

Family

ID=66926828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910068760.9A Active CN109886040B (en) 2019-01-24 2019-01-24 Data processing method, data processing device, storage medium and processor

Country Status (1)

Country Link
CN (1) CN109886040B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110619236A (en) * 2019-08-15 2019-12-27 中国人民银行数字货币研究所 File authorization access method, device and system based on file credential information
CN110636043A (en) * 2019-08-16 2019-12-31 中国人民银行数字货币研究所 File authorization access method, device and system based on block chain
CN110784463A (en) * 2019-10-24 2020-02-11 深圳市超算科技开发有限公司 File storage and access method and system based on block chain
CN110795702A (en) * 2019-10-12 2020-02-14 山东英信计算机技术有限公司 Software anti-cracking method, device, equipment and medium
CN112100144A (en) * 2020-08-20 2020-12-18 东软集团股份有限公司 Block chain file sharing method and device, storage medium and electronic equipment
CN113094394A (en) * 2021-03-19 2021-07-09 广东省重工建筑设计院有限公司 Data access method and device, computer equipment and storage medium
CN113609221A (en) * 2021-07-27 2021-11-05 卓尔智联(武汉)研究院有限公司 Data storage method, data access device and storage medium
CN113626855A (en) * 2021-07-15 2021-11-09 杭州玖欣物联科技有限公司 Data protection method based on block chain
CN113726873A (en) * 2021-08-27 2021-11-30 平安科技(深圳)有限公司 Block chain-based file processing method, system, device and storage medium
CN114422263A (en) * 2022-02-23 2022-04-29 蚂蚁区块链科技(上海)有限公司 Data acquisition method, device and system based on block chain network
CN115499249A (en) * 2022-11-17 2022-12-20 南京可信区块链与算法经济研究院有限公司 File storage method and system based on block chain distributed encryption
CN116629804A (en) * 2023-06-06 2023-08-22 河北华正信息工程有限公司 Letters, interviews, supervision and tracking management system and management method
EP4010811A4 (en) * 2019-07-27 2023-08-23 Truckl LLC Systems for multi-party dashboards

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104023027A (en) * 2014-06-18 2014-09-03 西安电子科技大学 Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph
GB2532039A (en) * 2014-11-06 2016-05-11 Ibm Secure database backup and recovery
CN107249046A (en) * 2017-08-15 2017-10-13 李俊庄 A kind of distributed cloud storage system construction method based on block chain
CN108134822A (en) * 2017-12-15 2018-06-08 成都链网络科技有限公司 The method for down loading of storage system based on block chain
CN109063498A (en) * 2018-07-27 2018-12-21 深圳市新名泽科技有限公司 Digital asset storage method, device, restoration methods and device
CN109101830A (en) * 2018-09-03 2018-12-28 安徽太阳石科技有限公司 Real time data safety protecting method and system based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104023027A (en) * 2014-06-18 2014-09-03 西安电子科技大学 Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph
GB2532039A (en) * 2014-11-06 2016-05-11 Ibm Secure database backup and recovery
CN107249046A (en) * 2017-08-15 2017-10-13 李俊庄 A kind of distributed cloud storage system construction method based on block chain
CN108134822A (en) * 2017-12-15 2018-06-08 成都链网络科技有限公司 The method for down loading of storage system based on block chain
CN109063498A (en) * 2018-07-27 2018-12-21 深圳市新名泽科技有限公司 Digital asset storage method, device, restoration methods and device
CN109101830A (en) * 2018-09-03 2018-12-28 安徽太阳石科技有限公司 Real time data safety protecting method and system based on block chain

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4010811A4 (en) * 2019-07-27 2023-08-23 Truckl LLC Systems for multi-party dashboards
CN110619236A (en) * 2019-08-15 2019-12-27 中国人民银行数字货币研究所 File authorization access method, device and system based on file credential information
CN110636043A (en) * 2019-08-16 2019-12-31 中国人民银行数字货币研究所 File authorization access method, device and system based on block chain
CN110795702A (en) * 2019-10-12 2020-02-14 山东英信计算机技术有限公司 Software anti-cracking method, device, equipment and medium
CN110784463A (en) * 2019-10-24 2020-02-11 深圳市超算科技开发有限公司 File storage and access method and system based on block chain
CN110784463B (en) * 2019-10-24 2021-08-31 深圳市超算科技开发有限公司 File storage and access method based on block chain
CN112100144A (en) * 2020-08-20 2020-12-18 东软集团股份有限公司 Block chain file sharing method and device, storage medium and electronic equipment
CN113094394A (en) * 2021-03-19 2021-07-09 广东省重工建筑设计院有限公司 Data access method and device, computer equipment and storage medium
CN113626855A (en) * 2021-07-15 2021-11-09 杭州玖欣物联科技有限公司 Data protection method based on block chain
CN113609221A (en) * 2021-07-27 2021-11-05 卓尔智联(武汉)研究院有限公司 Data storage method, data access device and storage medium
CN113726873A (en) * 2021-08-27 2021-11-30 平安科技(深圳)有限公司 Block chain-based file processing method, system, device and storage medium
CN114422263A (en) * 2022-02-23 2022-04-29 蚂蚁区块链科技(上海)有限公司 Data acquisition method, device and system based on block chain network
CN114422263B (en) * 2022-02-23 2024-03-26 蚂蚁区块链科技(上海)有限公司 Data acquisition method, device, system, computer equipment and machine-readable storage medium based on blockchain network
CN115499249A (en) * 2022-11-17 2022-12-20 南京可信区块链与算法经济研究院有限公司 File storage method and system based on block chain distributed encryption
CN116629804A (en) * 2023-06-06 2023-08-22 河北华正信息工程有限公司 Letters, interviews, supervision and tracking management system and management method
CN116629804B (en) * 2023-06-06 2024-01-09 河北华正信息工程有限公司 Letters, interviews, supervision and tracking management system and management method

Also Published As

Publication number Publication date
CN109886040B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN109886040A (en) Data processing method, device, storage medium and processor
CN111181720B (en) Service processing method and device based on trusted execution environment
CN111082934B (en) Cross-domain secure multiparty computing method and device based on trusted execution environment
CN108737374B (en) Privacy protection method for data storage in block chain
TWI709314B (en) Data processing method and device
CN110061845A (en) Block chain data ciphering method, device, computer equipment and storage medium
CN110199287A (en) It is unsealed using the data that area is surrounded in sealing
CN110199288A (en) Crossover-platform surrounds area's seal data
CN107959566A (en) Quantal data key agreement system and quantal data cryptographic key negotiation method
CN110199286A (en) The seal data in area is surrounded using sealing
CN109788002A (en) A kind of Http request encryption and decryption method and system
CN109936626A (en) Method, node and the storage medium of secret protection are realized in block chain
CN102075544A (en) Encryption system, encryption method and decryption method for local area network shared file
CN110214324A (en) Key vault surrounds area
CN107370595A (en) One kind is based on fine-grained ciphertext access control method
CN110020855A (en) Method, the node, storage medium of secret protection are realized in block chain
CN106027503A (en) Cloud storage data encryption method based on TPM
CN110226167A (en) It is abstract to surround area's identity
CN110050437A (en) The device and method of distributed certificate registration
CN110263544A (en) In conjunction with the receipt storage method and node of type of transaction and Rule of judgment
CN109039611B (en) Decruption key segmentation and decryption method, device, medium based on SM9 algorithm
CN109478214A (en) Device and method for certificate registration
CN109921902A (en) A kind of key management method, safety chip, service server and information system
CN110049032A (en) A kind of the data content encryption method and device of two-way authentication
CN110214321A (en) Nesting surrounds area's identity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211203

Address after: 430000 No. 1304, 13th floor, wuhuantiandi office building, No. 271, Zhuodaoquan Road, Hongshan District, Wuhan City, Hubei Province

Patentee after: Wuhan ronghydrogen Technology Co.,Ltd.

Address before: Room 504, 5 / F, block C, Zhonghui Plaza, 11 Dongzhimen South Street, Dongcheng District, Beijing

Patentee before: BEIJING MIXISLINK TECHNOLOGY CO.,LTD.