CN109934579A - For the key generation method of block chain network, endorsement method, storage medium, calculate equipment - Google Patents

For the key generation method of block chain network, endorsement method, storage medium, calculate equipment Download PDF

Info

Publication number
CN109934579A
CN109934579A CN201811454405.7A CN201811454405A CN109934579A CN 109934579 A CN109934579 A CN 109934579A CN 201811454405 A CN201811454405 A CN 201811454405A CN 109934579 A CN109934579 A CN 109934579A
Authority
CN
China
Prior art keywords
key
block chain
chain node
management program
key management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811454405.7A
Other languages
Chinese (zh)
Inventor
史锋锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Point Information Technology Co Ltd
Original Assignee
Shanghai Point Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Point Information Technology Co Ltd filed Critical Shanghai Point Information Technology Co Ltd
Priority to CN201811454405.7A priority Critical patent/CN109934579A/en
Publication of CN109934579A publication Critical patent/CN109934579A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

It is a kind of for the key generation method of block chain network, endorsement method, storage medium, calculate equipment, the key generation method includes: that A. obtains the first key that block chain node is locally stored, and the calculating environment of the block chain node includes trusted computation environment;B. in the trusted computation environment; it is encrypted using first key described in the second key pair; to generate third key; wherein; second key is pre-stored in shielded memory associated with the block chain node, and is only capable of being run the key management program reading in the trusted computation environment;C. the third key storage is local to the block chain node.The scheme provided through the invention can be improved the safety coefficient of the key of block chain node, reduces key and is stolen risk, it is ensured that is stored in the safety of the data on block chain account book.

Description

For the key generation method of block chain network, endorsement method, storage medium, calculating Equipment
Technical field
The present invention relates to block chain technical field, more particularly to a kind of key generation method for block chain network, Endorsement method, calculates equipment at storage medium.
Background technique
Block chain be with distributed data base identification, propagate and information-recording intelligent peer-to-peer network, be also referred to as worth Internet.Block chain technology includes guaranteeing transmission and access safety etc. using cryptography with block structure storing data, can be real Existing data consistency storage, tamper-resistant, the technical system for going to center.
According to existing block catenary system, block chain is safeguarded jointly by the block chain node of all participation, each participation The block chain node of maintenance can obtain the complete copy of a block chain data (may be simply referred to as data) and independently be tested Card.Specifically, each block chain node is owned by a node key (may be simply referred to as key), when each transaction is at one When executing on block chain node, which can sign to the transaction, and the key used of signing is the block chain The key of node.Block chain node for transaction Signature Confirmation transaction in the reliability for executing link.
Summary of the invention
It is situated between the embodiment provides a kind of for the key generation method of block chain network, endorsement method, storage Matter calculates equipment.
The first aspect of the embodiment of the present invention provides a kind of key generation method for block chain network, comprising: A. is obtained The calculating environment of the first key for taking block chain node to be locally stored, the block chain node includes trusted computation environment;B. exist In the trusted computation environment, it is encrypted using first key described in the second key pair, to generate third key, In, second key is pre-stored in shielded memory associated with the block chain node, and is only capable of being run in institute The key management program for stating trusted computation environment is read;C. the third key storage is local to the block chain node.
Scheme described in the present embodiment is by the key encapsulation of block chain node in the key data file of safety, it can be ensured that The safety of key itself improves the safety coefficient of the key of block chain node, reduces key and is stolen risk.Specifically, can Letter is calculated in environment and is encrypted using the key (alternatively referred to as first key) of the second key pair block chain node, is generated Third key is simultaneously stored to the block chain node local, since second key is only capable of being run in the trust computing ring The key management program in border is read, so that extraneous can not directly obtain the first key of block chain node, to reduce block chain The risk that node is falsely used improves the safety coefficient of first key.The external world can be in addition to the block chain node Tripartite.
The embodiment of the present invention also provides a kind of calculating equipment, including processor and memory, is stored on the memory The computer instruction that can be run on the processor, the processor execute following step when running the computer instruction Rapid: A. obtains the first key that block chain node is locally stored, and the calculating environment of the block chain node includes trust computing ring Border;B. it in the trusted computation environment, is encrypted using first key described in the second key pair, it is close to generate third Key, wherein second key is pre-stored in shielded memory associated with the block chain node, and is only capable of being run It is read in the key management program of the trusted computation environment;C. by the third key storage to the block chain node sheet Ground.
The embodiment of the present invention also provides a kind of endorsement method for block chain network, comprising: A. obtains number to be signed According to;B. the third key that block chain node is locally stored is obtained, the calculating environment of the block chain node includes trust computing ring Border, the third key are to be generated in the trusted computation environment using the second key pair first key encryption, institute It states the second key to be pre-stored in shielded memory associated with the block chain node, and is only capable of being run in described credible The key management program for calculating environment is read;C. in the trusted computation environment, third described in second key pair is used Key is decrypted, to obtain the first key;D. in the trusted computation environment, the first key pair is used The data to be signed are signed.
Scheme described in the present embodiment operates in the arithmetic logic for using key to sign in trusted computation environment, can Ensure the safety in signature calculating process, while ensuring to be stored in the safety of the data on block chain.Specifically, label are treated The operation that the data of name are signed is to carry out in trusted computation environment, and be used to sign to data to be signed The key of block chain node be it is processed in advance, be only capable of being used in the trusted computation environment, reduce block chain The risk that the key of node is stolen, so that other people can not forge the data on block chain node treatment region block chain, to reach Improve the effect of Information Security.Further, it is stored in the local really third key of the block chain node, other people are Making to steal the third key cannot also use.The block chain node can be used in signature in trusted computation environment Second key decrypts third key, carries out signature operation to restore first key.
The embodiment of the present invention also provides a kind of calculating equipment, including processor and memory, is stored on the memory The computer instruction that can be run on the processor, the processor execute following step when running the computer instruction Rapid: A. obtains data to be signed;B. the third key that block chain node is locally stored, the calculating of the block chain node are obtained Environment includes trusted computation environment, and the third key is that the second key pair first key is used in the trusted computation environment What encryption generated, second key is pre-stored in shielded memory associated with the block chain node, and only The key management program reading in the trusted computation environment can be run;C. in the trusted computation environment, using described Third key described in second key pair is decrypted, to obtain the first key;D. in the trusted computation environment, It is signed using the first key to the data to be signed.
The embodiment of the present invention also provides a kind of storage medium, is stored thereon with computer instruction, the computer instruction fortune The step of above method is executed when row.
Detailed description of the invention
Fig. 1 is a kind of flow chart of key generation method for block chain network of the embodiment of the present invention;
Fig. 2 is the schematic diagram of a typical application scenarios of the embodiment of the present invention;
Fig. 3 is a kind of flow chart of endorsement method for block chain network of the embodiment of the present invention;
Fig. 4 is the schematic diagram of another typical application scenarios of the embodiment of the present invention.
Specific embodiment
Present inventor the analysis found that, in existing block catenary system, lack to the key of block chain node Effective protection seriously affects the safety of data in block chain network.
Specifically, the key of existing block chain node is stored in clear in the disk of block chain node, in block When chain node serve starts, key is loaded to memory from disk, when then trading every time, is signed using key pair transaction.
The key of existing block chain node is stored in clear on block chain node, and the protection of key is relied primarily on In the user right mechanism of operating system.But if the permission of the root user (root) of the block chain node is stolen or lets out Leakage, then criminal can easily get the key of the block chain node.
Once the key of block chain node is obtained by other people, also mean that other people can pretend to be normal block chain node Transaction is executed, and the transaction data of mistake is entered in block chain.
The first aspect of the embodiment of the present invention provides a kind of key generation method for block chain network, comprising: A. is obtained The calculating environment of the first key for taking block chain node to be locally stored, the block chain node includes trusted computation environment;B. exist In the trusted computation environment, it is encrypted using first key described in the second key pair, to generate third key, In, second key is pre-stored in shielded memory associated with the block chain node, and is only capable of being run in institute The key management program for stating trusted computation environment is read;C. the third key storage is local to the block chain node.
Scheme described in the present embodiment is by the key encapsulation of block chain node in the key data file of safety, it can be ensured that The safety of key itself improves the safety coefficient of the key of block chain node, reduces key and is stolen risk.Specifically, can Letter is calculated in environment and is encrypted using the key (alternatively referred to as first key) of the second key pair block chain node, is generated Third key is simultaneously stored to the block chain node local, since second key is only capable of being run in the trust computing ring The key management program in border is read, so that extraneous can not directly obtain the first key of block chain node, to reduce block chain The risk that node is falsely used improves the safety coefficient of first key.The external world can be in addition to the block chain node Tripartite.
It is understandable to enable above-mentioned purpose of the invention, feature and beneficial effect to become apparent, with reference to the accompanying drawing to this The specific embodiment of invention is described in detail.
Below with reference to each exemplary embodiment of the attached drawing detailed description disclosure.Flow chart and block diagram in attached drawing are shown The architecture, function and operation in the cards of method and system according to various embodiments of the present disclosure.It should be noted that Each box in flowchart or block diagram can represent a part of a module, section or code, the module, program segment Or a part of code may include it is one or more for realizing in each embodiment the logic function of defined it is executable Instruction.It should also be noted that in some alternative implementations, function marked in the box can also be according to different from attached drawing Middle marked sequence occurs.For example, two boxes succeedingly indicated can actually be basically executed in parallel or they Sometimes it can also execute in a reverse order, this depends on related function.It should also be noted that flow chart and/ Or the combination of each box in block diagram and the box in flowchart and or block diagram, can be used execution as defined in function or The dedicated hardware based system of operation realizes, or can be used specialized hardware and computer instruction combination come it is real It is existing.It shall also be noted that the serial number of each step does not represent the restriction to the execution sequence of each step in flow chart.
Term as used herein "comprising", " comprising " and similar terms are understood to open term, i.e., " including/including but not limited to ", expression can also include other content.In this disclosure, term "based" is " at least portion It is based on dividing ";Term " one embodiment " expression " at least one embodiment ";Term " another embodiment " expression " at least one Other embodiment ".
Herein presented " first key " refers to: when deployment block chain node, distributing to the close of the block chain node Key, that is, the key of the block chain node.The first key can be used for signing to data, the number after being signed According to may be added to newly-generated block.The data may include the related letter for the transaction that the block chain node executes Breath.
In one embodiment, the first key can be corresponded with the block chain node, and be obtained from BaaS Platform.
Herein presented " the calculating environment of block chain node " refers to: what the block chain link point was handled and calculated Environment.Typically, the calculating environment of block chain node may include based on central processing unit (Central Processing Unit, abbreviation CPU) realize computing environment.More specifically, the computing environment may include conventional environment and trust computing ring Border, trusted computation environment are to calculate the part for only allowing specific software or application program to run, access in environment, conventional environment To calculate the part for allowing all software or application program operation, access in environment.Furthermore, based on the credible of CPU The safety protecting mechanism that environment is a kind of chip level is calculated, credible performing environment (Trusted Execution is referred to as Environment, abbreviation TEE).
For example, can use software protection extension (Software Guard Extensions, abbreviation SGX) technology building The trusted computation environment, alternatively referred to as based on the trusted computation environment of SGX.Specifically, the trusted computation environment will be legal The safety operation of software is encapsulated in a region (enclave), protects it from the attack of Malware, franchise or non-spy The software of power can not all access the region.That is, when software and data are located in the region, even if operating system also can not shadow Ring the code and data inside the region.The security boundary in the region only includes CPU and own.A CPU can in SGX To run multiple safety zones, concurrently executes and also may be used.
Herein presented " third key " refers to: the key generated after the first key is encrypted.Institute Stating third key can store local in block chain node, such as can store in trusted computation environment and/or commonly calculate ring Border, still, the third key are only capable of being used in the trusted computation environment of the block chain node.
For example, the first key, which is encrypted, to be referred to: being carried out using first key described in the second key pair Encryption.
In one embodiment, after generating the third key, it is close that the block chain node can delete described first Key, either effectively to ensure in addition to the block chain node to be unable to get the first key.The block chain node When needing using the first key, can be solved in trusted computation environment using the second key pair third key It is close, to obtain the first key.
Alternatively, the first key is stored in shielded memory associated with the block chain node, Since the shielded memory only allows to run on the routine access of the trusted computation environment, such implementation also can Reduce the risk of leakage of first key.
Herein presented " the second key " refers to: being stored in shielded memory associated with the block chain node In, it is only capable of being run in the key of the key management program reading of the trusted computation environment.Thus, it is possible to ensure using The third key that two keys encrypt is only capable of in trusted computation environment being used.
Specifically, second key initially can be hardware-level, by the CPU in the trusted computation environment The key inside generated at random is stored to the shielded memory, for future use after generating second key.By institute Stating trusted computation environment only allows specific softward interview, and calculating the part in environment in addition to trusted computation environment can not obtain It is close also can not directly to decrypt this even if other people obtain the third key for being stored in block chain node local for second key Key data also can not just obtain the first key.
Herein presented " shielded memory " refers to: only allowing to run on the routine access in trusted computation environment Calculator memory.In embodiments of the present invention, shielded memory associated with the block chain node can be the area Block chain node locally specially marks off the region of memory come, is also possible to set independently of the external storage of the block chain node Standby, the External memory equipment is communicated with the block chain node, and only allows the trust computing ring of the block chain node The routine access run in border.
In one embodiment, second key can be associated with CPU, that is, the CPU of different blocks chain node is in institute It is different for stating the second key generated in trusted computation environment.In other words, the trusted computation environment of different CPU is for same A key management program can generate the second different keys.Thus, it is possible to ensure the first key of a block chain node be only capable of by The block chain node oneself uses.
In another embodiment, for being run in the trusted computation environment of different blocks chain node by same tissue The key management program of signature, the trusted computation environment for running the CPU of each key management program can use identical key Create-rule generates identical second key.Other side can be decrypted mutually by the key management program of same tissue signature as a result, Third key be conducive to tissue treatment block to obtain belonging to the first key of other block chain nodes of the tissue Affairs in chain network.
In a change case, the tissue can have multiple block chain nodes, aforementioned shielded memory with it is described Multiple block chain nodes are associated, in other words, associated with the tissue.
For the either block chain node in the multiple block chain node, the block chain node is in its trust computing ring It after generating the second key in border, can store to the shielded memory, and can read that be also stored in this shielded The second key that other either block chain nodes store in the multiple block chain node of memory.
Further, second key can be and the group in the key management program and the block chain network It knits associated.Specifically, the mark (identification, abbreviation ID) of second key and the key management program, And the certificate binding of the tissue.The certificate of mark and the tissue to the key management program and described second close The operation associated of key can be in hardware-level realization.At this point, the shielded memory can be and the block link network Network is associated, by the incidence relation of second key and key management program and tissue, convenient for running on particular block The key management program of the trusted computation environment of chain node accurately reads correct second key.
Herein presented " key management program " refers to: the first key being encrypted, and in transaction The application program signed when chain to data.The key management program is only capable of operating in the trusted computation environment.Its In, it will include that the block of transaction data is added to block chain account book that cochain, which refers to,.
In one embodiment, described key management program itself can be signed by the tissue in the block chain network, To protect the key management program itself not to be tampered.Further, it can be carried in the key management program described The certificate of tissue.
In another embodiment, described key management program itself can be stored in the block chain link not as file Point, but be maintained in block chain and service (Blockchain as a Service, abbreviation BaaS) platform, the BaaS platform The service providing platform that can be a block chain is mainly responsible for block chain underlying platform and the application service based on block chain Deployment, management and O&M.It, can be from described when the block chain node is when being disposed, restarting or being triggered by call instruction BaaS platform calls the key management program.
Wherein, the BaaS platform can be communicated with each block chain node in the block chain network, with management With block chain network described in O&M.After calling the key management program, block chain node can be deposited key management program Storage is in local, until calling the key management program from BaaS platform again restart or receive call instruction next time after. The call instruction for example can be to be issued by BaaS platform.
Further, the signature operation of the key management program can be by BaaS platform execution.
In yet another embodiment, in the scene that the CPU of second key and block chain node is bound, in the area The second key generated in the trusted computation environment of block chain node can be only limitted to the block chain node, even if in other block chains The key management program of the block chain node is run in the trusted computation environment of node, it also can not be based on the close of the block chain node Key decryption obtains the first key of the block chain node.
In the present embodiment, the key management program can be stored in the form of a file on the block chain node, Even if the third that can not also decrypt the block chain node on other computer is close because the key management program is stolen Key.
Herein presented " request voucher " refers to: for proving the verifying letter of the identity legitimacy of the block chain node Breath.For example, the request voucher can be sent to the label (token) of block chain node, block chain link in advance for BaaS platform After point is activated, described in request when key management program, the block chain node can send institute to the BaaS platform Token is stated, after the BaaS platform validation passes through, Xiang Suoshu block chain node sends the key management program.Thus, it is possible to In the case where the key of block chain node is sealed by the trusted computation environment of itself, a kind of Authentication mechanism is provided, so as to Block chain node described in BaaS platform management.
Herein presented " data " refer to: at least one affairs that block chain node generates or is related in process of exchange In Transaction Information.Wherein, the Transaction Information refers to that affairs (transaction) carries out the various data generated in the process. Further, Transaction Information may include affairs carry out during generate various intermediate data and affairs carry out after the completion of Obtained various result datas.
Herein presented " business " includes the system in order to reach specific purpose or realize specific function and carry out The set of column (i.e. one or more, usually multiple) affairs.For example, tracing back to reach the commodity that commodity are traced to the source purpose and carried out Source business may include a series of affairs such as source area delivery affairs, carrier transport affairs.
It should be appreciated that provide these exemplary embodiments merely to make those skilled in the art can better understand that into And realize embodiment of the disclosure, and do not in any way limit the scope of the invention.
The block chain technical solution of the embodiment of the present invention can be applied in different fields, in the present embodiment, for It answers chain financial business and commodity to trace to the source for business to be illustrated.
In an application scenarios of supply chain financial business, the block chain node can be in supply chain financial business The node that any participant maintains, the data may include being authorized to the thing of the business association of inquiry in supply chain financial business Business data, for example, upstream and downstream block chain node additional various files in process of exchange in supply chain financial business, such as order Single, contract etc..
In the application scenarios that commodity trace to the source business, the block chain node is that commodity are traced to the source any participation in business The node just maintained, the data may include the Transaction Information for generating and being related in a series of links such as Commodity Transportation, delivery, For example, a series of Transaction Information of affairs such as source area delivery affairs, carrier transport affairs.
Fig. 1 is a kind of flow chart of key generation method for block chain network of the embodiment of the present invention.Wherein, described Block chain network can be made of multiple block chain nodes communicated, and the scheme of the present embodiment can be by the block chain node It executes.
Specifically, in the present embodiment, the key generation method for block chain network may include:
At 101, step A is executed, obtains the first key that block chain node is locally stored, the meter of the block chain node Calculating environment includes trusted computation environment;
At 102, step B is executed, in the trusted computation environment, is carried out using first key described in the second key pair Encryption, to generate third key, wherein second key is pre-stored in associated protected with the block chain node Memory in, and be only capable of being run the key management program reading in the trusted computation environment;
At 103, step C is executed, the third key storage is local to the block chain node.
More specifically, the first key and third key can store in the file of block chain node local In system, the difference of the two is, the first key is to be stored with clear-text way, and the third key is then encrypted It is processed, be only capable of being used in trusted computation environment.
In one embodiment, for further increase block chain node key safety, the step C can be into one Step includes: step C1, and the third key is replaced the first key and is stored in the block chain node local.Institute as a result, It states block chain node and is locally only stored with the third key, even if other people obtain the user right of the block chain node and obtain The third key is taken, the third key can not be also decrypted, it is even more impossible to pretend to be the block chain node to execute transaction cochain etc. Operation.
In yet another embodiment, the step B can be executed by the key management program, the key management program It is only capable of running in the trusted computation environment.
As a change case, the step A can also be executed by the key management program.For example, can be by described Key management program executes read operation in the trusted computation environment, with read be stored in the block chain node it is local the One key.
In another embodiment, such as when the block chain node starts, before executing the step B, the present embodiment The key generation method can also include: step D, download the key management program, the BaaS from the BaaS platform Platform is communicated for storing the key management program with each block chain node in the block chain network.
Further, after the step D, before the step B, key generation method described in the present embodiment can be with Include: step E, the signature of the key management program is verified, to confirm that the key management program is by the area What the tissue in block chain network was signed.
For example, itself certificate can be sent to the block chain node in advance by the tissue, it is described in response to receiving The key management program that BaaS platform is sent, the block chain node can extract the tissue from the key management program Certificate and signature, whether correct sign described in the certification authentication by the tissue, while comparing the key management received Whether the certificate and the tissue certificate for being previously transmitted to block chain node in program are consistent, to judge that the key management program is No signed by the tissue.
In a further embodiment, the step D may further include: the transmission of step D1, Xiang Suoshu BaaS platform is asked Information is sought, the solicited message includes the request voucher of the block chain node, the request voucher and the block chain node It corresponds and is obtained from the BaaS platform in advance;Step D2 receives the feedback information of information in response to the request, described Feedback information includes the key management program.
For example, the request voucher, which can be to be generated and sent by BaaS platform when disposing block chain node, gives block chain Node, the starting opportunity of the block chain node can be by the BaaS platform courses, as started institute by BaaS platform State block chain node.In response to being activated, it includes the request that the block chain node can be sent to the BaaS platform Whether the solicited message of voucher, request voucher described in the BaaS platform validation match with the block chain node.Work as verifying By when, Xiang Suoshu block chain node send feedback information, the feedback information include the block chain node key management Program.
In one embodiment, second key can be in the trusted computation environment after dynamic generation, storage To in the shielded memory.
For example, the trusted computation environment can generate the second key based on CPU hardware at random, and by second key It stores into the shielded memory, when the scheme for needing to be implemented the present embodiment encrypts the first key, fortune Row reads second key in the key management program of the trusted computation environment from the shielded memory, and It is encrypted using first key described in second key pair, to generate the third key.
In a typical application scenarios, with reference to Fig. 2, the generating process of this scene third key described in the present embodiment Do exemplary elaboration.
Specifically, trusted computation environment 32, key management program can have been run on the CPU of the block chain node 31 35 are only capable of running in the trusted computation environment 32.
It further, can be by the BaaS platform by the first key when the block chain node 31 is mounted It is stored in block chain node 31, the memory block 33 of block chain node 31 as described in can be stored in the first key.
Further, to generate the third key, the cipher key initialization program 34 of the block chain node 31 can be held Row: operation s1, to read the first key from the memory block 33;S2 is operated, to call the trusted computation environment based on CPU The first key is encrypted in 32 key management program 35.
Further, in response to receiving the first key, the key management program 35 executes real shown in above-mentioned Fig. 1 Step B described in example is applied, to call the encryption function of CPU, from shielded memory associated with the block chain node 31 It is middle to read the second key (not shown), and the first key is converted into third key using second key.? In this scene, it is assumed that specially dividing in the memory block 33 of the block chain node 31 has specific storage region to be protected as described The memory of shield.Therefore, it is possible to think that second key is also stored in the memory block 33, however, described second is close The key management program 35 that key only allows to run on the trusted computation environment 32 is read.
Wherein, the key management program 35 is obtained from the BaaS platform when the block chain node 31 is activated, And run on the trusted computation environment 32 always after being acquired.
In a change case of the present embodiment, the main body for executing the scheme of the present embodiment can be block chain management section Point, the block chain management node are suitable for managing and maintaining one or more block chain nodes in the block chain network.Tool Body, after the third key that each block chain node can be uniformly generated by the block chain management node, directly issue each Block chain node.Thus, it is possible to save the process that each block chain node voluntarily saves first key, first key is further decreased The risk stolen by other people.
The scheme for using the present embodiment as a result, by the key encapsulation of block chain node in the key data file of safety, It can ensure the safety of key itself, improve the safety coefficient of the key of block chain node, reduce key and be stolen risk.Specifically Ground is carried out at encryption in trusted computation environment using the key (alternatively referred to as first key) of the second key pair block chain node Reason, generate third key simultaneously store it is local to the block chain node, due to second key be only capable of being run in it is described can The key management program that letter calculates environment is read, so that extraneous can not directly obtain the first key of block chain node, to drop The risk that low block chain node is falsely used, improves the safety coefficient of first key.The external world can be except the block chain link Third party outside point.
The embodiment of the present invention also provides a kind of calculating equipment, including processor and memory, is stored on the memory The computer instruction that can be run on the processor, the processor execute following step when running the computer instruction Rapid: A. obtains the first key that block chain node is locally stored, and the calculating environment of the block chain node includes trust computing ring Border;B. it in the trusted computation environment, is encrypted using first key described in the second key pair, it is close to generate third Key, wherein second key is pre-stored in shielded memory associated with the block chain node, and is only capable of being run It is read in the key management program of the trusted computation environment;C. by the third key storage to the block chain node sheet Ground.
In one embodiment, before executing the step B, following steps are can also be performed in the calculating equipment: D. Download the key management program from BaaS platform, the BaaS platform for storing the key management program, and with it is described Each block chain node in block chain network communicates.
In one embodiment, after the step D, before the step B, the calculating equipment can also be performed with Lower step: E. verifies the signature of the key management program, to confirm that the key management program is by the block What the tissue in chain network was signed.
In one embodiment, the step D may further include: D1. sends solicited message to the BaaS platform, The solicited message includes the request voucher of the block chain node, and the request voucher and the block chain node correspond And it is obtained from the BaaS platform in advance;D2. the feedback information of information in response to the request is received, the feedback information includes The key management program.
In one embodiment, second key can be in the trusted computation environment after dynamic generation, storage To in the shielded memory.
In one embodiment, the step C may further include: the third key is replaced described first by C1. Key storage is local in the block chain node.
In one embodiment, the section that the block chain node can maintain for participant any in supply chain financial business Point.
In one embodiment, the block chain node can trace to the source the section that any participant maintains in business for commodity Point.
About working principle, the more contents of working method for calculating equipment, it is referred in above-mentioned Fig. 1 and Fig. 2 Associated description, which is not described herein again.
In one embodiment, the calculating equipment can be personal computer, smart phone, server etc..
Fig. 3 is a kind of flow chart of endorsement method for block chain network of the embodiment of the present invention.Wherein, the block Chain network can be made of multiple block chain nodes communicated, and the scheme of the present embodiment can be held by the block chain node Row.
Specifically, in the present embodiment, the endorsement method for block chain network may include:
At 401, step A is executed, data to be signed are obtained;
At 402, step B is executed, obtains the third key that block chain node is locally stored, the meter of the block chain node Calculating environment includes trusted computation environment, and the third key is close using the second key pair first in the trusted computation environment What key encryption generated, second key is pre-stored in shielded memory associated with the block chain node, and It is only capable of being run the key management program reading in the trusted computation environment;
At 403, executes step C and use third key described in second key pair in the trusted computation environment It is decrypted, to obtain the first key;
At 404, step D is executed, in the trusted computation environment, using the first key to described to be signed Data are signed.
More specifically, the data to be signed can refer to the data for needing to be added to block chain.Further, described Data to be signed can be provided by user, and the user can be the user of the block chain node, such as the block chain Tissue in network.
In one embodiment, the step C and step D can be executed by key management program, the key management journey Sequence is only capable of running in the trusted computation environment.
As a change case, the step B can also be executed by the key management program.For example, can be by described Key management program executes read operation in the trusted computation environment, locally to obtain the third from the block chain node Key.
In yet another embodiment, such as when the block chain node is activated, before executing the step B, this reality Applying the example endorsement method can also include: step E, download the key management program, the BaaS platform from BaaS platform It is communicated for storing the key management program, and with each block chain node in the block chain network.
Further, after the step E, before the step B, endorsement method described in the present embodiment can also be wrapped Include: step F verifies the signature of the key management program, to confirm that the key management program is by the block What the tissue in chain network was signed.
For example, itself certificate can be sent to the block chain node in advance by the tissue, it is described in response to receiving The key management program that BaaS platform is sent, the block chain node can extract the tissue from the key management program Certificate and signature, whether correct sign described in the certification authentication by the tissue, while comparing the key management received Whether the certificate and the tissue certificate for being previously transmitted to block chain node in program are consistent, to judge that the key management program is No signed by the tissue.
In a further embodiment, the step E may further include: the transmission of step E1, Xiang Suoshu BaaS platform is asked Information is sought, the solicited message includes the request voucher of the block chain node, the request voucher and the block chain node It corresponds and is obtained from the BaaS platform in advance;Step E2 receives the feedback information of information in response to the request, described Feedback information includes the key management program.
For example, the request voucher, which can be to be generated and sent by BaaS platform when disposing block chain node, gives block chain Node, the starting opportunity of the block chain node can be by the BaaS platform courses, as started institute by BaaS platform State block chain node.In response to being activated, it includes the request that the block chain node can be sent to the BaaS platform Whether the solicited message of voucher, request voucher described in the BaaS platform validation match with the block chain node.Work as verifying By when, Xiang Suoshu block chain node send feedback information, the feedback information include the block chain node key management Program.
In one embodiment, second key can be in the trusted computation environment after dynamic generation, storage To in the shielded memory.For example, it may be executing above-mentioned Fig. 1 and embodiment illustrated in fig. 2 in the block chain node Generation when generating the third key, and store into the shielded memory.It is described credible due to only operating in The key management program for calculating environment can read second key, so that other people can not crack the third key to obtain To the first key, namely can not be by wrong data cochain.
In a typical application scenarios, with reference to Fig. 4, this scene uses the close of block chain node described in the present embodiment The process that key is signed does exemplary elaboration.Wherein, the key of the block chain node is real shown in above-mentioned Fig. 1 and Fig. 2 Apply the first key in example.
Specifically, block chain node 61 have block chain service module 62, for completing the relevant item of block chain, such as with The interaction of other block chain nodes is added to block chain etc. to be traded, by the data generated in process of exchange.
Further, the block chain node kernel service unit 63 of the block chain service module 62 receives transaction request And after having executed process of exchange, signature caller 64 is called to sign transaction results, wherein the transaction results are The data to be signed.
Further, the signature caller 64 receives the data to be signed, and executes operation s1, to call fortune Key management program 65 of the row in the trusted computation environment 66 based on CPU signs to data to be signed.Wherein, described CPU is the CPU of the block chain node 61.For example, the signature caller 64 can be described to be signed by what is received Data are transferred to the key management program 65.
Further, in response to receiving the data to be signed, the key management program 65 can execute operation S2, to read the third key from the memory block 67 of block chain node 61, and using to be signed described in the third key pair Data sign.In this scene, the memory block 67 can correspond to memory block described in above-mentioned embodiment illustrated in fig. 2 33, third key through above-mentioned Fig. 1 and embodiment illustrated in fig. 2 generation and described second close is stored in the memory block 67 Key (not shown).
Further, after completing signature operation, the data after signature can be back to by the key management program 65 The signature caller 64.
Further, the block chain node kernel service unit 63 gets the label from the signature caller 64 After data after name, it can be attached in transaction results and be added to the block chain together.
Wherein, the memory block 67 of the block chain node 61 can be the memory of the block chain node 61.
Wherein, trusted computation environment 66, key management program 65 can have been run on the CPU of the block chain node 61 It is only capable of running in the trusted computation environment 66.
Wherein, the key management program 65 is obtained from the BaaS platform when the block chain node 61 is activated, And run on the trusted computation environment 66 always after being acquired.
The scheme for using the present embodiment as a result, operates in trust computing ring for the arithmetic logic for using key to sign In border, it can be ensured that the safety in signature calculating process, while ensuring to be stored in the safety of the data on block chain.Specifically Ground is to carry out in trusted computation environment, and be used for data to be signed to the operation that data to be signed are signed The key for the block chain node signed be it is processed in advance, be only capable of being used in the trusted computation environment, The risk that the key of block chain node is stolen is reduced, so that other people can not forge the number on block chain node treatment region block chain According to achieve the effect that improve Information Security.Further, it is stored in the local really third of the block chain node Key, other people cannot use stealing the third key.The block chain node, can be in trust computing in signature Third key is decrypted using the second key in environment, carries out signature operation to restore first key
The embodiment of the present invention also provides a kind of calculating equipment, including processor and memory, is stored on the memory The computer instruction that can be run on the processor, the processor can execute following when running the computer instruction Step: A. obtains data to be signed;B. the third key that block chain node is locally stored, the meter of the block chain node are obtained Calculating environment includes trusted computation environment, and the third key is close using the second key pair first in the trusted computation environment What key encryption generated, second key is pre-stored in shielded memory associated with the block chain node, and It is only capable of being run the key management program reading in the trusted computation environment;C. in the trusted computation environment, institute is used It states third key described in the second key pair to be decrypted, to obtain the first key;D. in the trusted computation environment In, it is signed using the first key to the data to be signed.
In one embodiment, before executing the step B, following steps are can also be performed in the calculating equipment: E. Download the key management program from BaaS platform, the BaaS platform for storing the key management program, and with it is described Each block chain node in block chain network communicates.
In one embodiment, after the step E, before the step B, the calculating equipment can also be performed with Lower step: F. verifies the signature of the key management program, to confirm that the key management program is by the block What the tissue in chain network was signed.
In one embodiment, the step E may further include: E1. sends solicited message to the BaaS platform, The solicited message includes the request voucher of the block chain node, and the request voucher and the block chain node correspond And it is obtained from the BaaS platform in advance;E2. the feedback information of information in response to the request is received, the feedback information includes The key management program.
In one embodiment, second key can be in the trusted computation environment after dynamic generation, storage To in the shielded memory.
In one embodiment, the section that the block chain node can maintain for participant any in supply chain financial business Point.
In one embodiment, the block chain node can trace to the source the section that any participant maintains in business for commodity Point.
About working principle, the more contents of working method for calculating equipment, it is referred in above-mentioned Fig. 3 and Fig. 4 Associated description, which is not described herein again.
In one embodiment, the calculating equipment can be personal computer, smart phone, server etc..
The scheme for using the present embodiment as a result, realizes hardware using the trusted computation environment that the CPU of block chain node is provided The cryptographic key protection of level.
Specifically, based on the encryption function of CPU, the encryption storage of first key is realized, so that the external world can not directly decrypt Obtain the first key.
Further, the trusted computation environment provided based on CPU, in signature process, first key is protected in always Distinctive region of memory in CPU, and the region of memory was carried out by CPU using the random key (i.e. described second key) of hardware Encryption, to improve the safety coefficient of the key of block chain node in signature process.
In other words, after completing encryption, first key can be deleted, and the third key that the external world can obtain is By encryption, other people can not directly obtain the first key based on the key, also just not be available key pair mistake Accidentally data are signed.
Further, in signature process, the key management program only operated in the trusted computation environment can The third key is decrypted to obtain first key, is then treated in trusted computation environment using the first key The data of signature are signed.Therefrom, it may be appreciated that be, what the first key was protected in the block chain node always can Letter calculates in environment, is equivalent to and is sealed in black box and will not be cracked by the external world.
In the supply chain financial business scene based on block chain network based on BaaS platform management, the supply chain gold The participant for melting business may include fund side, core enterprise and provide the medium-sized and small enterprises of product for core enterprise, each industry Business side can have the block chain node of oneself.In entire block chain network, relevant financing transaction is all recorded in block chain In account book.For supply chain financial business, the safety of the block chain node of each side is most important.If either party The key of block chain node is leaked, it would be possible to be led to the normal block chain node of malicious node disguise as, be participated in supply chain gold The business activity melted causes direct traffic lost or transaction data to reveal.Thus, using the scheme of the embodiment of the present invention, The block chain node of each side can carry out effective protection to the key of oneself, to guarantee that the financing recorded on block chain account book is handed over The authenticity and validity of easy data.
It traces to the source in business scenario in the commodity based on BaaS platform management, the trace to the source participant of business of the commodity can wrap The participant of each link in commodity circulation is included, each participant accesses in entire block chain network, and possesses the area of oneself Block chain node.When commodity pass through specific link, by the link block chain nodes records commodity information to block chain account book In.If the key of the block chain node of any one link is leaked, it would be possible to lead to the normal area of malicious node disguise as Block chain node, the commodity of misregistration trace to the source information into block chain account book, and commodity is caused to trace to the source the mistake of information.Thus, it adopts Effective protection can be carried out to the key of oneself with the block chain node of the scheme of the embodiment of the present invention, each side, to guarantee area The commodity recorded on block chain account book are traced to the source the authenticity and validity of data.
Further, a kind of storage medium is also disclosed in the embodiment of the present invention, is stored thereon with computer instruction, the calculating Method and technology scheme described in above-mentioned Fig. 1 and embodiment illustrated in fig. 3 is executed when machine instruction operation.Preferably, the storage is situated between Matter may include non-volatile (Non-Volatile) memory or non-transient (Non-Transitory) memory etc. Computer readable storage medium.The storage medium may include ROM, RAM, disk or CD etc..
Although present disclosure is as above, present invention is not limited to this.Anyone skilled in the art are not departing from this It in the spirit and scope of invention, can make various changes or modifications, therefore protection scope of the present invention should be with claim institute Subject to the range of restriction.

Claims (23)

1. a kind of key generation method for block chain network characterized by comprising
A. the first key that block chain node is locally stored is obtained, the calculating environment of the block chain node includes trust computing ring Border;
B. it in the trusted computation environment, is encrypted using first key described in the second key pair, to generate third Key, wherein second key is pre-stored in shielded memory associated with the block chain node, and is only capable of being transported Row is read in the key management program of the trusted computation environment;
C. the third key storage is local to the block chain node.
2. key generation method according to claim 1, which is characterized in that before executing the step B, further includes:
D. the key management program is downloaded from BaaS platform, the BaaS platform is used to store the key management program, and It is communicated with each block chain node in the block chain network.
3. key generation method according to claim 2, which is characterized in that after the step D, the step B it Before, further includes:
E. the signature of the key management program is verified, to confirm that the key management program is by the block link network What the tissue in network was signed.
4. key generation method according to claim 2, which is characterized in that the step D further comprises:
D1. solicited message is sent to the BaaS platform, the solicited message includes the request voucher of the block chain node, institute It states request voucher and the block chain node corresponds and is obtained from the BaaS platform in advance;
D2. the feedback information of information in response to the request is received, the feedback information includes the key management program.
5. key generation method according to any one of claim 1 to 4, which is characterized in that second key be In the trusted computation environment after dynamic generation, store into the shielded memory.
6. key generation method according to any one of claim 1 to 4, which is characterized in that the step C is further wrapped It includes:
C1. the third key is replaced into the first key and is stored in the block chain node local.
7. a kind of calculating equipment, which is characterized in that including processor and memory, being stored on the memory can be described The computer instruction run on processor, the processor execute following steps when running the computer instruction:
A. the first key that block chain node is locally stored is obtained, the calculating environment of the block chain node includes trust computing ring Border;
B. it in the trusted computation environment, is encrypted using first key described in the second key pair, to generate third Key, wherein second key is pre-stored in shielded memory associated with the block chain node, and is only capable of being transported Row is read in the key management program of the trusted computation environment;
C. the third key storage is local to the block chain node.
8. calculating equipment according to claim 7, which is characterized in that before executing the step B, the calculating equipment Also execute following steps:
D. the key management program is downloaded from BaaS platform, the BaaS platform is used to store the key management program, and It is communicated with each block chain node in the block chain network.
9. calculating equipment according to claim 8, which is characterized in that after the step D, before the step B, institute It states calculating equipment and also executes following steps:
E. the signature of the key management program is verified, to confirm that the key management program is by the block link network What the tissue in network was signed.
10. calculating equipment according to claim 8, which is characterized in that the step D further comprises:
D1. solicited message is sent to the BaaS platform, the solicited message includes the request voucher of the block chain node, institute It states request voucher and the block chain node corresponds and is obtained from the BaaS platform in advance;
D2. the feedback information of information in response to the request is received, the feedback information includes the key management program.
11. calculating equipment according to any one of claims 7 to 10, which is characterized in that second key is in institute It states in trusted computation environment after dynamic generation, stores into the shielded memory.
12. calculating equipment according to any one of claims 7 to 10, which is characterized in that the step C is further wrapped It includes:
C1. the third key is replaced into the first key and is stored in the block chain node local.
13. a kind of endorsement method for block chain network characterized by comprising
A. data to be signed are obtained;
B. the third key that block chain node is locally stored is obtained, the calculating environment of the block chain node includes trust computing ring Border, the third key are to be generated in the trusted computation environment using the second key pair first key encryption, institute It states the second key to be pre-stored in shielded memory associated with the block chain node, and is only capable of being run in described credible The key management program for calculating environment is read;
C. it in the trusted computation environment, is decrypted using third key described in second key pair, to obtain The first key;
D. it in the trusted computation environment, is signed using the first key to the data to be signed.
14. endorsement method according to claim 13, which is characterized in that before executing the step B, further includes:
E. the key management program is downloaded from BaaS platform, the BaaS platform is used to store the key management program, and It is communicated with each block chain node in the block chain network.
15. endorsement method according to claim 14, which is characterized in that after the step E, before the step B, Further include:
F. the signature of the key management program is verified, to confirm that the key management program is by the block link network What the tissue in network was signed.
16. endorsement method according to claim 14, which is characterized in that the step E further comprises:
E1. solicited message is sent to the BaaS platform, the solicited message includes the request voucher of the block chain node, institute It states request voucher and the block chain node corresponds and is obtained from the BaaS platform in advance;
E2. the feedback information of information in response to the request is received, the feedback information includes the key management program.
17. endorsement method described in any one of 3 to 16 according to claim 1, which is characterized in that second key is in institute It states in trusted computation environment after dynamic generation, stores into the shielded memory.
18. a kind of calculating equipment, which is characterized in that including processor and memory, being stored on the memory can be in institute The computer instruction run on processor is stated, the processor executes following steps when running the computer instruction:
A. data to be signed are obtained;
B. the third key that block chain node is locally stored is obtained, the calculating environment of the block chain node includes trust computing ring Border, the third key are to be generated in the trusted computation environment using the second key pair first key encryption, institute It states the second key to be pre-stored in shielded memory associated with the block chain node, and is only capable of being run in described credible The key management program for calculating environment is read;
C. it in the trusted computation environment, is decrypted using third key described in second key pair, to obtain The first key;
D. it in the trusted computation environment, is signed using the first key to the data to be signed.
19. calculating equipment according to claim 18, which is characterized in that before executing the step B, the calculating is set It is standby also to execute following steps:
E. the key management program is downloaded from BaaS platform, the BaaS platform is used to store the key management program, and It is communicated with each block chain node in the block chain network.
20. calculating equipment according to claim 19, which is characterized in that after the step E, before the step B, The calculating equipment also executes following steps:
F. the signature of the key management program is verified, to confirm that the key management program is by the block link network What the tissue in network was signed.
21. calculating equipment according to claim 19, which is characterized in that the step E further comprises:
E1. solicited message is sent to the BaaS platform, the solicited message includes the request voucher of the block chain node, institute It states request voucher and the block chain node corresponds and is obtained from the BaaS platform in advance;
E2. the feedback information of information in response to the request is received, the feedback information includes the key management program.
22. calculating equipment described in any one of 8 to 21 according to claim 1, which is characterized in that second key is in institute It states in trusted computation environment after dynamic generation, stores into the shielded memory.
23. a kind of storage medium, is stored thereon with computer instruction, which is characterized in that the computer instruction executes when running The step of any one of any one of claim 1 to 6 the method or claim 13 to 17 the method.
CN201811454405.7A 2018-11-30 2018-11-30 For the key generation method of block chain network, endorsement method, storage medium, calculate equipment Pending CN109934579A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811454405.7A CN109934579A (en) 2018-11-30 2018-11-30 For the key generation method of block chain network, endorsement method, storage medium, calculate equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811454405.7A CN109934579A (en) 2018-11-30 2018-11-30 For the key generation method of block chain network, endorsement method, storage medium, calculate equipment

Publications (1)

Publication Number Publication Date
CN109934579A true CN109934579A (en) 2019-06-25

Family

ID=66984703

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811454405.7A Pending CN109934579A (en) 2018-11-30 2018-11-30 For the key generation method of block chain network, endorsement method, storage medium, calculate equipment

Country Status (1)

Country Link
CN (1) CN109934579A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111339197A (en) * 2020-02-26 2020-06-26 百度在线网络技术(北京)有限公司 Block chain data processing method and device, electronic equipment and medium
CN111680326A (en) * 2020-06-09 2020-09-18 联想(北京)有限公司 Data processing method and device
CN113869901A (en) * 2021-12-02 2021-12-31 腾讯科技(深圳)有限公司 Key generation method, key generation device, computer-readable storage medium and computer equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107342858A (en) * 2017-07-05 2017-11-10 武汉凤链科技有限公司 A kind of intelligent contract guard method and system based on trusted context
US20180068091A1 (en) * 2016-09-06 2018-03-08 Intel Corporation Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content
CN107919954A (en) * 2017-10-20 2018-04-17 浙江大学 A kind of block chain user key guard method and device based on SGX
CN108055133A (en) * 2017-12-12 2018-05-18 江苏安凰领御科技有限公司 A kind of key secure signing method based on block chain technology
CN108600182A (en) * 2018-03-29 2018-09-28 深圳前海微众银行股份有限公司 Block chain key management method, system and key management apparatus, storage medium
CN108768978A (en) * 2018-05-16 2018-11-06 浙江大学 A kind of remote storage method of servicing and system based on SGX

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180068091A1 (en) * 2016-09-06 2018-03-08 Intel Corporation Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content
CN107342858A (en) * 2017-07-05 2017-11-10 武汉凤链科技有限公司 A kind of intelligent contract guard method and system based on trusted context
CN107919954A (en) * 2017-10-20 2018-04-17 浙江大学 A kind of block chain user key guard method and device based on SGX
CN108055133A (en) * 2017-12-12 2018-05-18 江苏安凰领御科技有限公司 A kind of key secure signing method based on block chain technology
CN108600182A (en) * 2018-03-29 2018-09-28 深圳前海微众银行股份有限公司 Block chain key management method, system and key management apparatus, storage medium
CN108768978A (en) * 2018-05-16 2018-11-06 浙江大学 A kind of remote storage method of servicing and system based on SGX

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111339197A (en) * 2020-02-26 2020-06-26 百度在线网络技术(北京)有限公司 Block chain data processing method and device, electronic equipment and medium
CN111680326A (en) * 2020-06-09 2020-09-18 联想(北京)有限公司 Data processing method and device
CN113869901A (en) * 2021-12-02 2021-12-31 腾讯科技(深圳)有限公司 Key generation method, key generation device, computer-readable storage medium and computer equipment
CN113869901B (en) * 2021-12-02 2022-05-10 腾讯科技(深圳)有限公司 Key generation method, key generation device, computer-readable storage medium and computer equipment

Similar Documents

Publication Publication Date Title
US11004067B2 (en) Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
CN111770200B (en) Information sharing method and system
CN110914857B (en) Product promotions using intelligent contracts in blockchain networks
US11233655B2 (en) Data verification methods, apparatuses, and devices
CN109933987A (en) For the key generation method of block chain network, endorsement method, storage medium, calculate equipment
CN105659559B (en) The safety of authenticating remote server
CN103685138B (en) The authentication method of the Android platform application software that mobile interchange is online and system
CN111770199B (en) Information sharing method, device and equipment
WO2019007396A1 (en) Method and device for conducting encrypted transaction based on smart contract, and blockchain
CN107171785A (en) A kind of digital copyright management method based on block chain technology
CN111770198B (en) Information sharing method, device and equipment
CN107278307A (en) Software layer is mutually authenticated
CN111460525B (en) Block chain-based data processing method, device and storage medium
KR100502580B1 (en) Method for distrubution of copyright protected digital contents
CN111818186B (en) Information sharing method and system
CN111770112B (en) Information sharing method, device and equipment
CN109934579A (en) For the key generation method of block chain network, endorsement method, storage medium, calculate equipment
CN109858911A (en) Qualification verification method, device, system, equipment and readable storage medium storing program for executing
CN110417557B (en) Intelligent terminal peripheral data security control method and device
CN110992034A (en) Supply chain transaction privacy protection system and method based on block chain and related equipment
CN111814193B (en) Information sharing method, device and equipment
CN109697368A (en) Method, equipment and system that user information data safety uses, storage medium
CN110189143B (en) Block chain-based marketing label authenticity verification method and system
CN115225346A (en) Data deposit system for credit investigation big data field
Noam et al. Realizing privacy aspects in blockchain networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190625

WD01 Invention patent application deemed withdrawn after publication