CN109948359A - Short message data safety sharing method and device based on block chain - Google Patents

Short message data safety sharing method and device based on block chain Download PDF

Info

Publication number
CN109948359A
CN109948359A CN201910143396.8A CN201910143396A CN109948359A CN 109948359 A CN109948359 A CN 109948359A CN 201910143396 A CN201910143396 A CN 201910143396A CN 109948359 A CN109948359 A CN 109948359A
Authority
CN
China
Prior art keywords
data
sent
public key
decentralization
encrypted public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910143396.8A
Other languages
Chinese (zh)
Inventor
牟卫洋
杨杰
孙金虎
孙玉辰
杨志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Southern Tide Mdt Infotech Ltd
Original Assignee
Shanghai Southern Tide Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Southern Tide Mdt Infotech Ltd filed Critical Shanghai Southern Tide Mdt Infotech Ltd
Priority to CN201910143396.8A priority Critical patent/CN109948359A/en
Publication of CN109948359A publication Critical patent/CN109948359A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

This application discloses a kind of short message data safety sharing methods and device based on block chain.Wherein, the method applied to data providing terminal includes: that data sharing request is sent to the decentralization application of block chain;In the case where the decentralization applies data sharing request being sent to data user's terminal, the encrypted public key of the data user terminal is received;Shared data is encrypted using the encrypted public key, encryption data is sent to the decentralization application, is applied so as to the decentralization and the encryption data is sent to the data user terminal.Using this method, shared data can be transmitted by block chain, solving the problems, such as that data can be tampered using the mechanism that block chain can be weighed really can be spoofed with sender's identity, substantially increases the safety of user information, protects privacy of user.

Description

Short message data safety sharing method and device based on block chain
Technical field
This application involves field of information security technology, total more particularly to a kind of short message data safety based on block chain Enjoy method and apparatus.
Background technique
Short message generally refers to the little digital information of data volume, for example, a string of passwords.It is shared for the safety of short message Typically rely on third-party platform, such as chat software, Email.If user requires safety and can transmit in short message Encipherment protection privacy is used in the process.In general, the form of data can by plain text and two kinds of forms of ciphertext be present in it is shared In the process.For in plain text, carrying out maintenance and management to system due to being third-party platform, third-party platform also has the ability to look into See data therein, there are hidden troubles for the safety of plaintext.For ciphertext, although being solved the problem of Information Security Certainly, but both sides are still and complete the shared procedure of data in the system platform that third party provides, therefore can generate certain Agency fee.If it is free platform, which may obtain interests by other aspects, for example, selling the use being collected into A possibility that private datas such as family information, use habit, the private data of user still has leakage.
Summary of the invention
Aiming to overcome that the above problem or at least being partially solved or extenuate for the application solves the above problems.
According to the first aspect of the application, a kind of short message data safety sharing method based on block chain is provided, Applied to data providing terminal, this method comprises:
Sending step is requested in data sharing: data sharing request is sent to the decentralization application of block chain (Decentralized Application,DAPP);
Encrypted public key receiving step: it is applied in the decentralization and data sharing request is sent to data user In the case where terminal, the encrypted public key of the data user terminal is received;
Encryption data sending step: shared data is encrypted using the encrypted public key, encryption data is sent to The decentralization application applies so as to the decentralization encryption data being sent to the data user terminal.
Using this method, shared data can be transmitted by block chain, the MECHANISM SOLUTION that can be really weighed using block chain Certainly data can be tampered with sender's identity can be spoofed problem, substantially increase the safety of user information, protect use Family privacy.
Optionally, the encrypted public key receiving step includes:
It is applied in the decentralization and data sharing request is sent to data user's terminal, and receive institute In the case where the encrypted public key for stating the submission of data user's terminal, it is public to receive the encryption that the decentralization application is sent Key.
Optionally, in the encrypted public key receiving step, the encrypted public key for receiving the data user terminal Pass through the encrypted public key sent under chain to receive the data user terminal.
Optionally, the encrypted public key receiving step includes:
It is stored with the encrypted public key that the data user terminal is sent in the decentralization application, goes to center described Change application and data sharing request is sent to data user's terminal, receives adding for the data user terminal transmission Migong key sends instruction, and is indicated in the case where sending the encrypted public key based on encrypted public key transmission, goes described in reception The encrypted public key that centralization application is sent.
Optionally, the quantity of the data user terminal is two or more, correspondingly, the encryption data sending step Include:
Shared data is encrypted respectively using the encrypted public key of each data user terminal, is obtained corresponding The encryption data is sent to the decentralization application by encryption data, so that the decentralization is applied the encryption Data are sent to the corresponding data user terminal.
Optionally, the data sharing request includes: data providing terminal iidentification, data user terminal iidentification, asks Seek information.
Optionally, the data providing terminal by Software Development Kit (Software Development Kit, SDK the interface) provided and decentralization application carry out data interaction.
According to the second aspect of the application, a kind of short message data safety sharing method based on block chain is provided, Applied to data user's terminal, this method comprises:
Receiving step is requested in data sharing: receiving what data providing terminal was sent via the decentralization application of block chain Data sharing request;
Encrypted public key sending step: encrypted public key is sent to the data providing;
Encrypted data reception step: shared data is added using the encrypted public key in the data user terminal It is close, and in the case that encryption data is sent to decentralization application, receive the encryption that the decentralization application is sent Data, so that the encryption data is decrypted using private key.
Using this method, data user's terminal is based on sharing request and sends public key, thus realize point-to-point data sharing, Since the data such as public key are transmitted by block chain, the mechanism that can be really weighed using block chain, which solves data, can be tampered and send Square identity can be spoofed problem, substantially increase the safety of user information, protect privacy of user.
In terms of according to the third of the application, a kind of short message data safety sharing means based on block chain are provided, Applied to data providing terminal, which includes:
Data sharing request sending module is disposed for requesting data sharing into the decentralization for being sent to block chain Using;
Encrypted public key receiving module is disposed for applying in the decentralization and requests to send by the data sharing In the case where to data user's terminal, the encrypted public key of the data user terminal is received;With
Encryption data sending module is disposed for encrypting shared data using the encrypted public key, will be added Ciphertext data is sent to the decentralization application, applies so as to the decentralization encryption data being sent to the data User's terminal.
According to the 4th of the application the aspect, a kind of short message data safety sharing means based on block chain are provided, Applied to data user's terminal, which includes:
Data sharing request receiving module is disposed for reception data providing terminal via block chain and goes to center Change the data sharing request that application is sent;
Encrypted public key sending module is disposed for for encrypted public key being sent to the data providing;With
Encrypted data reception module is disposed in the data user terminal using the encrypted public key to altogether It enjoys data to be encrypted, and in the case that encryption data is sent to decentralization application, receives the decentralization and answer With the encryption data of transmission, so that the encryption data is decrypted using private key.
According to the accompanying drawings to the detailed description of the specific embodiment of the application, those skilled in the art will be more Above-mentioned and other purposes, the advantages and features of the application are illustrated.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.Hereinafter by reference Some specific embodiments of the application are described in detail by way of example and not limitation in attached drawing.Identical attached drawing mark in attached drawing Note denotes same or similar part or part.It will be understood by those skilled in the art that these attached drawings be not necessarily by than What example was drawn.In the accompanying drawings:
Fig. 1 is the signal according to the short message data safety sharing method based on block chain of one embodiment of the application Property flow chart;
Fig. 2 is run based on the short message data safety sharing method by block chain according to the application one embodiment Calculation machine device hardware structural diagram;
Fig. 3 is the short message based on block chain applied to data providing terminal according to one embodiment of the application The schematic flow chart of data safety sharing method;
Fig. 4 is the short message based on block chain applied to data user terminal according to one embodiment of the application The schematic flow chart of data safety sharing method;
Fig. 5 is the short message based on block chain applied to data providing terminal according to one embodiment of the application The schematic block diagram of data safety sharing means;
Fig. 6 is the short message based on block chain applied to data user terminal according to one embodiment of the application The schematic block diagram of data safety sharing means;
Fig. 7 is the block diagram of one embodiment of the calculating equipment of the application;
Fig. 8 is the block diagram of one embodiment of the computer readable storage medium of the application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection It encloses.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
According to the embodiment of the present application, a kind of short message data safety sharing method implementation based on block chain is additionally provided Example, it should be noted that step shown in the flowchart of the accompanying drawings can be in the calculating of such as a group of computer-executable instructions It is executed in machine system, although also, logical order is shown in flow charts, and it in some cases, can be to be different from Sequence herein executes shown or described step.
Fig. 1 is the signal according to the short message data safety sharing method based on block chain of one embodiment of the application Property flow chart.Data providing terminal, data involved in the embodiment of the present application are applicable in square terminal and block chain tripartite, wherein number Data interaction is carried out by the DAPP of SDK and block chain according to provider's terminal and the data side of being applicable in terminal.
It can be held in mobile terminal, terminal or similar arithmetic unit in provided embodiment of the method Row.The hardware block diagram for the computer installation (or mobile device) that Fig. 2 shows a kind of for the application method.Data provide Square terminal and data are applicable in square terminal and can be realized using the computer installation.As shown in Figure 1, computer installation 10 (or move Dynamic equipment 10) it may include that (in figure using 102a, 102b ... ..., 102n is shown one or more processors, and processor can To include but is not limited to the processing unit of Micro-processor MCV or programmable logic device FPGA etc.), storage for storing data Device 104 and transmission module for communication function.It in addition to this, can also include: display, input/output interface (I/O Interface), the port universal serial bus (USB) (a port that can be used as in the port of I/O interface is included), network connect Mouth, power supply and/or camera.It will appreciated by the skilled person that structure shown in Fig. 2 is only to illustrate, not to upper The structure for stating electronic device causes to limit.For example, computer installation 10 may also include than shown in Fig. 2 more or less groups Part, or with the configuration different from shown in Fig. 2.
It is to be noted that said one or multiple processors and/or other data processing circuits usually may be used herein To be referred to as " data processing circuit ".The data processing circuit all or part of can be presented as software, hardware, firmware or its His any combination.In addition, data processing circuit for single independent processing module or all or part of can be integrated to computer In any one in other elements in device 10 (or mobile device).As involved in the embodiment of the present application, the number (such as the selection for the variable resistance end path connecting with interface) is controlled as a kind of processor according to processing circuit.
Memory 104 can be used for storing the software program and module of application software, as being based on area in the embodiment of the present application Corresponding program instruction/the data storage device of short message data safety sharing method of block chain, processor are stored in by operation Software program and module in memory 104 realize above-mentioned answer thereby executing various function application and data processing With the method for program.Memory 104 may include high speed random access memory, may also include nonvolatile memory, such as one or Multiple magnetic storage devices, flash memory or other non-volatile solid state memories.In some instances, memory 104 can be into one Step includes the memory remotely located relative to processor, these remote memories can pass through network connection to computer installation 10.The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Transmitting device is used to that data to be received or sent via a network.Above-mentioned network specific example may include calculating The wireless network that the communication providers of machine device 10 provide.In an example, transmitting device includes a network adapter (Network Interface Controller, NIC), can be connected by base station with other network equipments so as to interconnection Net is communicated.In an example, transmitting device can be radio frequency (Radio Frequency, RF) module, be used to pass through Wireless mode is communicated with internet.
Display can such as touch-screen type liquid crystal display (LCD), the liquid crystal display aloow user with The user interface of computer installation 10 (or mobile device) interacts.
Under above-mentioned running environment, the short message data safety sharing method based on block chain that this application provides a kind of. Fig. 3 is the short message data safety based on block chain applied to data providing terminal according to one embodiment of the application The schematic flow chart of sharing method.This method may include:
Sending step is requested in S110 data sharing: data sharing request is sent to the decentralization application of block chain.
S120 encrypted public key receiving step: it is applied in the decentralization and data sharing request is sent to data and makes In the case where with square terminal, the encrypted public key of the data user terminal is received.
S130 encryption data sending step: shared data is encrypted using the encrypted public key, encryption data is sent out The decentralization application is given, is applied so as to the decentralization and the encryption data is sent to the data user end End.
Using this method, shared data can be transmitted by block chain, the MECHANISM SOLUTION that can be really weighed using block chain Certainly data can be tampered with sender's identity can be spoofed problem, substantially increase the safety of user information, protect use Family privacy.
Optionally, the interface that the data providing terminal is provided by Software Development Kit SDK goes to center with described Change application and carries out data interaction.
In S110 data sharing request sending step, data sharing request include: data providing terminal iidentification, Data user terminal iidentification, solicited message.
It, can be using one of following methods, several or combination in S120 encrypted public key receiving step:
Optionally, it is applied in the decentralization and data sharing request is sent to data user's terminal, and In the case where receiving the encrypted public key that the data user terminal is submitted, the described of the decentralization application transmission is received Encrypted public key.In the method, encrypted public key is transmitted by block chain, encrypted public key is prevented to be tampered, transmission history It can trace, improve the safety of data ciphering and deciphering.
Optionally, the encrypted public key for receiving the data user terminal is to receive the data user terminal to lead to Cross the encrypted public key sent under chain.This method transmits encrypted public key using other channels, can be avoided some possible emergency cases, Such as block catenary system failure problems bring data the problem of can not transmitting.
Optionally, it is stored with the encrypted public key that the data user terminal is sent in the decentralization application, in institute It states decentralization and is sent to data user's terminal using by data sharing request, receive the data user terminal The encrypted public key of transmission sends instruction, and is indicated in the case where sending the encrypted public key based on encrypted public key transmission, connects Receive the encrypted public key that the decentralization application is sent.This method can reduce the number of transmissions of encrypted public key, reduce institute The burden of data user's terminal is stated, especially in the frequent situation of encrypted public key access times, advantage is more obvious.
In above-mentioned technical proposal, shared data is that data user's terminal of default is sent to by data providing terminal. But it is also not excluded for other data user and wants the case where data are checked in application.Other data user and data sender can Agreed beforehand or common recognition.
Optionally, the quantity of the data user terminal is two or more, and correspondingly, the S130 encryption data is sent Step includes:
Shared data is encrypted respectively using the encrypted public key of each data user terminal, is obtained corresponding The encryption data is sent to the decentralization application by encryption data, so that the decentralization is applied the encryption Data are sent to the corresponding data user terminal.
One embodiment of the application provides a kind of short message data safety sharing method based on block chain.Fig. 4 is It is shared according to the short message data safety based on block chain applied to data user terminal of one embodiment of the application The schematic flow chart of method.This method may include:
Receiving step is requested in S210 data sharing: receiving data providing terminal via the decentralization application hair of block chain The data sharing request sent;
S220 encrypted public key sending step: encrypted public key is sent to the data providing.
S230 encrypted data reception step: the data user terminal using the encrypted public key to shared data into Row encryption, and in the case that encryption data is sent to decentralization application, receive what the decentralization application was sent Encryption data, so that the encryption data is decrypted using private key.
Using this method, data user's terminal is based on sharing request and sends public key, thus realize point-to-point data sharing, Since the data such as public key are transmitted by block chain, the mechanism that can be really weighed using block chain, which solves data, can be tampered and send Square identity can be spoofed problem, substantially increase the safety of user information, protect privacy of user.
Optionally, the data user terminal carries out data by the SDK interface provided and decentralization application Interaction.
It, can be using one of following methods, several or combination in S220 encrypted public key sending step:
Optionally, the case where data sharing request is sent to data user's terminal is applied in the decentralization Under, encrypted public key is sent to data providing terminal via centralization application.In the method, public to encryption by block chain Key is transmitted, and encrypted public key is prevented to be tampered, and transmission history can trace, and improves the safety of data ciphering and deciphering.
Optionally, by the way that encrypted public key is sent to the data providing terminal under chain.This method uses other channels Encrypted public key is transmitted, can be avoided some possible emergency cases, such as block catenary system failure problems bring data can not pass Defeated problem.
Optionally, it is stored with the encrypted public key that the data user terminal is sent in the decentralization application, connect In the case where receiving the data sharing request, encrypted public key is sent into instruction and is sent to decentralization application, to go to center Change application and encrypted public key is sent to data providing terminal.This method can reduce the number of transmissions of encrypted public key, reduce institute The burden of data user's terminal is stated, especially in the frequent situation of encrypted public key access times, advantage is more obvious.
Optionally, the quantity of the data user terminal is two or more.
According to the embodiment of the present application, a kind of short message data safety sharing means based on block chain are additionally provided, are applied In data providing terminal.Fig. 5 be according to one embodiment of the application be applied to data providing terminal based on block The schematic block diagram of the short message data safety sharing means of chain.The apparatus may include:
Data sharing request sending module 110 is disposed for requesting to be sent in the going of block chain by data sharing Heart application;
Encrypted public key receiving module 120 is disposed for applying in the decentralization and requests the data sharing In the case where being sent to data user's terminal, the encrypted public key of the data user terminal is received;
Encryption data sending module 130 is disposed for encrypting shared data using the encrypted public key, will Encryption data is sent to the decentralization application, applies so as to the decentralization encryption data being sent to the number According to user's terminal.
According to the embodiment of the present application, a kind of short message data safety sharing means based on block chain are additionally provided, are applied In data user's terminal.Fig. 6 be according to one embodiment of the application be applied to data user terminal based on block The schematic block diagram of the short message data safety sharing means of chain.The apparatus may include:
Data sharing request receiving module 210 is disposed for reception data providing terminal and goes via block chain The data sharing request that centralization application is sent;
Encrypted public key sending module 220 is disposed for for encrypted public key being sent to the data providing;
Encrypted data reception module 230 is disposed for utilizing the encrypted public key in the data user terminal Shared data is encrypted, and in the case that encryption data is sent to decentralization application, center is gone to described in reception Change the encryption data that application is sent, so that the encryption data is decrypted using private key.
The one aspect of embodiments herein provides a kind of calculating equipment, and referring to Fig. 7, which includes storage Device 1120, processor 1110 and it is stored in the computer journey that can be run in the memory 1120 and by the processor 1110 Sequence, the computer program are stored in the space 1130 for program code in memory 1120, the computer program by Reason device 1110 is realized when executing for any one of executing according to the application applied to data providing terminal based on block chain Short message data safety sharing method step 1131.
The one aspect of embodiments herein additionally provides a kind of computer readable storage medium.Referring to Fig. 8, the calculating Machine readable storage medium storing program for executing includes the storage unit for program code, which is provided with for executing according to the application's The program 1131 ' of the short message data safety sharing method step based on block chain applied to data providing terminal, the journey Sequence is executed by processor.
The one aspect of embodiments herein provides a kind of calculating equipment, which includes memory, processing Device is stored in storage with the computer program that can be run in the memory and by the processor, the computer program is stored The space for program code in device, the computer program are realized when executed by the processor for executing any one according to this The short message data safety sharing method step based on block chain applied to data user terminal of application.
The one aspect of embodiments herein additionally provides a kind of computer readable storage medium.This is computer-readable to deposit Storage media includes the storage unit for program code, which, which is provided with, is applied to number according to the application for executing According to the program of the short message data safety sharing method step based on block chain of user's terminal, which is held by processor Row.
The one aspect of the embodiment of the present application additionally provides a kind of computer program product comprising instruction, including computer Readable code causes the calculating equipment to execute as described above when the computer-readable code is executed by calculating equipment One of method.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.The computer program Product includes one or more computer instructions.When computer loads and executes the computer program instructions, whole or portion Ground is divided to generate according to process or function described in the embodiment of the present application.The computer can be general purpose computer, dedicated computing Machine, computer network obtain other programmable devices.The computer instruction can store in computer readable storage medium In, or from a computer readable storage medium to the transmission of another computer readable storage medium, for example, the computer Instruction can pass through wired (such as coaxial cable, optical fiber, number from a web-site, computer, server or data center User's line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or Data center is transmitted.The computer readable storage medium can be any usable medium that computer can access or It is comprising data storage devices such as one or more usable mediums integrated server, data centers.The usable medium can be with It is magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid State Disk (SSD)) etc..
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description. These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution. Professional technician can use different methods to achieve the described function each specific application, but this realization It is not considered that exceeding scope of the present application.
Those of ordinary skill in the art will appreciate that implement the method for the above embodiments be can be with By program come instruction processing unit completion, the program be can store in computer readable storage medium, and the storage is situated between Matter is non-transitory (English: non-transitory) medium, such as random access memory, read-only memory, flash Device, hard disk, solid state hard disk, tape (English: magnetic tape), floppy disk (English: floppy disk), CD (English: Optical disc) and any combination thereof.
The preferable specific embodiment of the above, only the application, but the protection scope of the application is not limited thereto, Within the technical scope of the present application, any changes or substitutions that can be easily thought of by anyone skilled in the art, Should all it cover within the scope of protection of this application.Therefore, the protection scope of the application should be with scope of protection of the claims Subject to.

Claims (10)

1. a kind of short message data safety sharing method based on block chain is applied to data providing terminal, this method comprises:
Sending step is requested in data sharing: data sharing request is sent to the decentralization application of block chain;
Encrypted public key receiving step: it is applied in the decentralization and data sharing request is sent to data user's terminal In the case where, receive the encrypted public key of the data user terminal;With
Encryption data sending step: encrypting shared data using the encrypted public key, encryption data is sent to described Decentralization application applies so as to the decentralization encryption data being sent to the data user terminal.
2. the method according to claim 1, wherein the encrypted public key receiving step includes:
It is applied in the decentralization and data sharing request is sent to data user's terminal, and receive the number In the case where the encrypted public key submitted according to user's terminal, the encrypted public key that the decentralization application is sent is received.
3. the method according to claim 1, wherein in the encrypted public key receiving step, the reception institute The encrypted public key for stating data user's terminal is to receive the data user terminal to pass through the encrypted public key sent under chain.
4. the method according to claim 1, wherein the encrypted public key receiving step includes:
It is stored with the encrypted public key that the data user terminal is sent in the decentralization application, is answered in the decentralization It is sent to data user's terminal with by data sharing request, it is public to receive the encryption that the data user terminal is sent Key sends instruction, and is indicated in the case where sending the encrypted public key based on encrypted public key transmission, and center is gone to described in reception Change the encrypted public key that application is sent.
5. the method according to claim 1, wherein the quantity of the data user terminal be two or more, Correspondingly, the encryption data sending step includes:
Shared data is encrypted respectively using the encrypted public key of each data user terminal, obtains corresponding encryption The encryption data is sent to the decentralization application by data, so that the decentralization is applied the encryption data It is sent to the corresponding data user terminal.
6. the method according to claim 1, wherein data sharing request includes: data providing terminal Mark, data user terminal iidentification, solicited message.
7. method according to any one of claim 1 to 6, which is characterized in that the data providing terminal passes through soft The interface and decentralization application that part development kit provides carry out data interaction.
8. a kind of short message data safety sharing method based on block chain is applied to data user terminal, this method comprises:
Receiving step is requested in data sharing: receiving the data that data providing terminal is sent via the decentralization application of block chain Sharing request;
Encrypted public key sending step: encrypted public key is sent to the data providing;With
Encrypted data reception step: encrypting shared data using the encrypted public key in the data user terminal, And in the case that encryption data is sent to decentralization application, the encryption number that the decentralization application is sent is received According to so that the encryption data is decrypted using private key.
9. a kind of short message data safety sharing means based on block chain, are applied to data providing terminal, which includes:
Data sharing request sending module is disposed for requesting the decentralization for being sent to block chain to be answered data sharing With;
Encrypted public key receiving module is disposed for applying in the decentralization and requests the data sharing to be sent to number In the case where according to user's terminal, the encrypted public key of the data user terminal is received;With
Encryption data sending module is disposed for encrypting shared data using the encrypted public key, will encrypt number According to the decentralization application is sent to, is applied so as to the decentralization and the encryption data is sent to the data use Square terminal.
10. a kind of short message data safety sharing means based on block chain are applied to data user terminal, the device packet It includes:
Data sharing request receiving module is disposed for reception data providing terminal and answers via the decentralization of block chain It is requested with the data sharing of transmission;
Encrypted public key sending module is disposed for for encrypted public key being sent to the data providing;With
Encrypted data reception module is disposed in the data user terminal using the encrypted public key to shared number According to being encrypted, and in the case that encryption data is sent to the decentralization application, the decentralization application hair is received The encryption data sent, so that the encryption data is decrypted using private key.
CN201910143396.8A 2019-02-26 2019-02-26 Short message data safety sharing method and device based on block chain Pending CN109948359A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910143396.8A CN109948359A (en) 2019-02-26 2019-02-26 Short message data safety sharing method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910143396.8A CN109948359A (en) 2019-02-26 2019-02-26 Short message data safety sharing method and device based on block chain

Publications (1)

Publication Number Publication Date
CN109948359A true CN109948359A (en) 2019-06-28

Family

ID=67007738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910143396.8A Pending CN109948359A (en) 2019-02-26 2019-02-26 Short message data safety sharing method and device based on block chain

Country Status (1)

Country Link
CN (1) CN109948359A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111586012A (en) * 2020-04-29 2020-08-25 中国联合网络通信集团有限公司 Encryption information sharing method and device
CN111585754A (en) * 2020-04-29 2020-08-25 中国联合网络通信集团有限公司 Information sharing method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106973040A (en) * 2017-03-01 2017-07-21 北京工业大学 A kind of smart mobile phone secret short message security system and secret short message transmission method
CN108765064A (en) * 2018-05-14 2018-11-06 韩明 A kind of shared trip operation management method based on block chain technology
US20180331835A1 (en) * 2017-05-11 2018-11-15 Shapeshift Ag Trusted agent blockchain oracle

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106973040A (en) * 2017-03-01 2017-07-21 北京工业大学 A kind of smart mobile phone secret short message security system and secret short message transmission method
US20180331835A1 (en) * 2017-05-11 2018-11-15 Shapeshift Ag Trusted agent blockchain oracle
CN108765064A (en) * 2018-05-14 2018-11-06 韩明 A kind of shared trip operation management method based on block chain technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
向凌云著: "《区块链的逻辑》", 31 May 2018, 中国商业出版社 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111586012A (en) * 2020-04-29 2020-08-25 中国联合网络通信集团有限公司 Encryption information sharing method and device
CN111585754A (en) * 2020-04-29 2020-08-25 中国联合网络通信集团有限公司 Information sharing method and device

Similar Documents

Publication Publication Date Title
WO2022247576A1 (en) Data processing method and apparatus, device, and computer-readable storage medium
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN101317417B (en) Network access control for many-core systems
CN109462472A (en) The methods, devices and systems of data encryption and decryption
CN109905474B (en) Data security sharing method and device based on block chain
CN109067528A (en) Crypto-operation, method, cryptographic service platform and the equipment for creating working key
CN107113319A (en) Method, device, system and the proxy server of response in a kind of Virtual Networking Computing certification
CN112400299B (en) Data interaction method and related equipment
US10841081B2 (en) Threshold oblivious pseudorandom function in a key management system
CN109862103B (en) File data secure sharing method and device based on block chain
CN105407097B (en) Based on third-party data furnishing method and device
CN105556403A (en) Restricting communications in industrial control
CN103986723B (en) A kind of secret communication control, secret communication method and device
CN107590396A (en) Data processing method and device, storage medium, electronic equipment
CN109361508A (en) Data transmission method, electronic equipment and computer readable storage medium
US20180115535A1 (en) Blind En/decryption for Multiple Clients Using a Single Key Pair
CN111327605B (en) Method, terminal, server and system for transmitting private information
CN109800588A (en) Bar code dynamic encrypting method and device, bar code dynamic decryption method and device
CN109067527A (en) A kind of quantum encryption communication method, communication terminal and computer readable storage medium
CA3102933C (en) Encryption device, a communication system and method of exchanging encrypted data in a communication network
CN109948359A (en) Short message data safety sharing method and device based on block chain
CN111246407B (en) Data encryption and decryption method and device for short message transmission
CN110048994A (en) A kind of communication means and device
CN110519203A (en) A kind of data encryption and transmission method and device
CN114329565A (en) Data sharing method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190628