CN110020544A - The Hash information processing method and system of record are stored in the block of block chain - Google Patents

The Hash information processing method and system of record are stored in the block of block chain Download PDF

Info

Publication number
CN110020544A
CN110020544A CN201811605349.2A CN201811605349A CN110020544A CN 110020544 A CN110020544 A CN 110020544A CN 201811605349 A CN201811605349 A CN 201811605349A CN 110020544 A CN110020544 A CN 110020544A
Authority
CN
China
Prior art keywords
block chain
block
hash information
account book
chain account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811605349.2A
Other languages
Chinese (zh)
Other versions
CN110020544B (en
Inventor
栗志果
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Chain Technology Co ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811605349.2A priority Critical patent/CN110020544B/en
Publication of CN110020544A publication Critical patent/CN110020544A/en
Priority to TW108137037A priority patent/TW202024951A/en
Priority to PCT/CN2019/122552 priority patent/WO2020134898A1/en
Application granted granted Critical
Publication of CN110020544B publication Critical patent/CN110020544B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present application discloses Hash information processing method, system and the electronic equipment that record is stored in the block of block chain a kind of, this method comprises: obtaining the Hash informations of multiple storage records in the block of the first block chain account book;At least one layer is carried out to the multiple Hash information and obscures encryption, obtains at least one target Hash information;At least one described target Hash information is stored into the second block chain account book, wherein target user has the permission of the second block chain account book of access and do not have the permission of the first block chain account book of access.

Description

The Hash information processing method and system of record are stored in the block of block chain
Technical field
This application involves the Hash that record is stored in computer software technical field more particularly to a kind of block of block chain Information processing method and system.
Background technique
Block chain account book has true transparent, the characteristic of unsuppressible-suppression, will be used wider and wider general, relates generally to each A industry.
But due to the framework of block chain account book, even if to encrypting in plain text, using the mode of hash cochain, The public still can obtain the true sale amount on block chain by parsing block chain account book.
While ensureing that data are really transparent, how the transaction size trading volume grade of business is protected, be urgently The technical issues of solution.
Summary of the invention
The purpose of the embodiment of the present application is to provide the Hash information processing method that record is stored in a kind of block of block chain And system, it is protected with the transaction size trading volume grade to business in block chain, so that more business are able to use block Business datum is preferably protected while chain technology.
In order to solve the above technical problems, the embodiment of the present application is achieved in that
In a first aspect, proposing the Hash information processing method for storing record in the block of block chain a kind of, this method packet It includes:
Obtain the Hash information of multiple storage records in the block of the first block chain account book;
At least one layer is carried out to the multiple Hash information and obscures encryption, obtains at least one target Hash information;
At least one described target Hash information is stored into the second block chain account book, wherein target user, which has, to be visited It asks the permission of the second block chain account book and does not have the permission of the first block chain account book of access.
Second aspect proposes a kind of block catenary system, which includes:
Module is obtained, the Hash information of multiple storage records in the block of the first block chain account book is obtained;
Obscure encryption processing module, at least one layer is carried out to the multiple Hash information and obscures encryption, is obtained at least One target Hash information;
Memory module stores at least one described target Hash information into the second block chain account book, wherein target is used Family has the permission of the second block chain account book of access and does not have the permission of the first block chain account book of access.
The third aspect proposes a kind of electronic equipment, which includes:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
Obtain the Hash information of multiple storage records in the block of the first block chain account book;To the multiple Hash information into Row at least one layer obscures encryption, obtains at least one target Hash information;At least one described target Hash information is deposited It stores up into the second block chain account book, wherein target user has the permission of the second block chain account book of access and do not have access the The permission of one block chain account book.
Fourth aspect proposes a kind of computer readable storage medium, the computer-readable recording medium storage one Or multiple programs, one or more of programs are when the electronic equipment for being included multiple application programs executes, so that the electricity Sub- equipment executes following operation:
Obtain the Hash information of multiple storage records in the block of the first block chain account book;To the multiple Hash information into Row at least one layer obscures encryption, obtains at least one target Hash information;At least one described target Hash information is deposited It stores up into the second block chain account book, wherein target user has the permission of the second block chain account book of access and do not have access the The permission of one block chain account book.
As can be seen from the technical scheme provided by the above embodiments of the present application, the embodiment of the present application scheme at least has following one kind Technical effect:
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in application, for those of ordinary skill in the art, in the premise of not making the creative labor property Under, it is also possible to obtain other drawings based on these drawings.
Fig. 1 be one embodiment block chain of the application block in store the Hash information processing method process of record Figure.
Fig. 2 is the structural schematic diagram of one embodiment electronic equipment of the application.
Fig. 3 is the structural schematic diagram of one embodiment block catenary system of the application.
Specific embodiment
The embodiment of the present application provides Hash information processing method, system and the electricity that record is stored in the block of block chain a kind of Sub- equipment.
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common The application protection all should belong in technical staff's every other embodiment obtained without creative efforts Range.
Fig. 1 be one embodiment block chain of the application block in store the Hash information processing method process of record Figure.The method of Fig. 1 can include:
S110 obtains the Hash information of multiple storage records in the block of the first block chain account book.
It should be understood that the storage record in block chain can store different contents in different block chain application scenarios.Example Such as, in the system for being related to the transaction of block chain, a storage record is a transaction record of block chain.
It should be understood that in the embodiment of the present application, the Kazakhstan of multiple storage records in the block for obtaining the first block chain account book When uncommon information, the Hash information of multiple storage records can be obtained by the transaction tree of the block.
It should be understood that in the block catenary system of the blocks such as bit coin chain 1.0, only one Merkel (Merkle) tree, certain For in kind degree, this tree is referred to as transaction tree;And in the block catenary system of the blocks chain such as ether mill 2.0, then it deposits Three Merkle trees are set in transaction (Transactions) tree, receipt (Receipts) tree and state (State).
Optionally, as one embodiment, step S110 can be realized are as follows: block obtains the area of the first block chain account book one by one The Hash information of multiple storage records in block, to carry out obscuring encryption, until having read the newest block of block chain.
It, can be by the information of the history block of block chain all in accordance with the scheme of the embodiment of the present application for the present embodiment It carries out obscuring encryption.
Alternatively, optional, as another embodiment, step S110 can be realized are as follows: in response to the first block chain account book The storage event of newest block obtains the Hash information of multiple storage records in the newest block.
For the present embodiment, the block chain belonging to the first block chain account book is needed to be carried out the application reality when starting The scheme of example is applied, just can guarantee the Hash information after the storage record of all blocks of the first block chain account book is obscured in the secondth area Block chain account book can be inquired.Certainly, if you do not need to the storage of all blocks of the first block chain account book of inquiry records after obscuring Hash information can not also limit on the execution opportunity to the method for the embodiment of the present application.
S120 carries out at least one layer to the multiple Hash information and obscures encryption, obtains at least one target Hash Information.
In the embodiment of the present application, it carries out obscuring encryption by the Hash information of the storage record to block, it can be with Avoid the deal size information of block in leakage block chain.
Particularly, the number of at least one target Hash information is not equal to the number of the multiple Hash information.
S130 stores at least one described target Hash information into the second block chain account book, wherein target user's tool There is the permission of the second block chain account book of access and does not have the permission of the first block chain account book of access.
In the embodiment of the present application, by the way that the Hash information of the storage record of block in the first block chain account book is obscured In the second block chain account book that encryption storage is able to access that target user, so as to avoid target user from directly accessing Divulging a secret for the information such as the first block chain account book bring transaction size and transaction magnitude, has ensured belonging to the first block chain account book The information security of block catenary system.
It should be understood that target user has the permission of the second block chain account book of access and does not have the first block chain account book of access Permission, there are many implementation:
Such as the block chain where the first block chain account book is privately owned chain;Area where the second block chain account book Block chain.At this point, other nodes other than the account node of the block chain where the first block chain account book will not have first The access authority of block chain account book, but accessible second block chain account book.
In another example the block chain where block chain and the second block chain account book where the first block chain account book It is all privately owned chain, target account is configured with the access authority of the second block chain account book, but without the first block chain account book of configuration Access authority.
It should be understood that in the embodiment of the present application, the encryption of obscuring to Hash information may include various ways.
Optionally, in one implementation, the content that multiple Hash informations form can be subjected to Hash calculation and obtains one A Hash information.
For example, it is assumed that 4 in some block of block chain storages record corresponding Hash information be respectively HashA, HashB, HashC and HashD, then the Hash information HashABCD=Hash (HashA+HashB+HashC after obscuring encryption + HashD), wherein function Hash () indicates Hash calculation function, such as MD5, SHA-1, SHA-256, SHA-384 and SHA- 512, etc..In bit coin system, the hash algorithm used is SHA-256.
Optionally, in another implementation, the content that any one Hash information can be divided into multiple portions is distinguished again Hash calculation is carried out, the corresponding multiple Hash informations of content of the multiple part are obtained.
For example, it is assumed that it is HashA that a storage in some block of block chain, which records corresponding Hash information, can incite somebody to action HashA splits into HashA1 and HashA2, then carries out Hash respectively and handles to get HashA1 '=Hash (HashA1) is arrived, HashA2 '=Hash (HashA2), HashA1 ' and HashA2 ' at this time, which obscure to HashA, to be obtained after encryption Hash information.Certainly, HashA can also be split into 3 parts, 4 parts or even more parts, specifically split into how many a portions Point, how to split, is configurable.
Optionally, in another implementation, the content that multiple Hash informations form can be separated into multiple portions Content, and Hash calculation is carried out respectively to the content of each part, obtain the corresponding multiple Hash of content of the multiple part Information.
For example, it is assumed that 4 in some block of block chain storages record corresponding Hash information be respectively HashA, HashB, HashC and HashD, the content HashABCD=(HashA+HashB+HashC+HashD) of composition;It can incite somebody to action HashABCD is divided into HashABCD1 and HashABCD2, then carries out Hash calculation respectively to HashABCD1 and HashABCD2 and obtain Hash (HashABCD1) and Hash (HashABCD2), Hash (HashABCD1) and Hash (HashABCD2) are multiple portion The corresponding multiple Hash informations of content divided.
Certainly, only list several before, specifically there is likely to be the modes of other processing, with no restriction.
Furthermore, it is to be understood that the obfuscation schemes of the embodiment of the present application, can also carry out multilayer and obscure encryption, i.e., by one layer Obscure the Hash information after encryption, then carry out one or more layers obscure encryption.Different layers obscure encryption Algorithm, may be the same or different.
For example, for example, it is assumed that 4 in some block of block chain storages record corresponding Hash information is respectively HashA, HashB, HashC and HashD, then first layer obscures the Hash information HashABCD=Hash (HashA after encryption +HashB+HashC+HashD);It is Hash (HashABCD1) and Hash that the second layer, which obscures the Hash information after encryption, (HashABCD2), wherein HashABCD=HashABCD1+HashABCD2.
Optionally, as one embodiment, at least one described target Hash information is the M of the transaction tree of the block Root.The storage record Hash in block is obtained into Hash information referring to the generating mode of Merkle tree, then by Hash information two Two Hash obtain new Hash information, until obtaining a cryptographic Hash.
Optionally, as one embodiment, step S130 specifically be can be achieved are as follows:
The unique identification of the block and at least one described target Hash information are stored to the second block chain account In this.
In the embodiment of the present application, the unique identification of block and at least one the target Hash information generated are stored arrive together The second block chain account book, so that target user can determine at least one described target Hash based on the unique identification of block Which block is information belong to.
Further, in a specific implementation of the embodiment of the present application, can by the unique identification of the block and At least one described target Hash information is as a storage record storage into the second block chain account book.
In the embodiment of the present application, block it is all obscure after Hash information deposited as a storage record Storage.
Alternatively, it is further, it, can be by the unique of the block in another specific implementation of the embodiment of the present application In mark and a target Hash information as storage record storage into the second block chain account book.
In the embodiment of the present application, a Hash information after the obscuring of block is deposited as a storage record Storage.
Alternatively, it is further, it, can be by the unique of the block in another specific implementation of the embodiment of the present application The target Hash information of mark and not more than predetermined number is as storage record storage into the second block chain account book.
It should be understood, of course, that can also be carried in the storage record described in the above-mentioned implementation of the embodiment of the present application At least one of the block head of block information, such as the Hash information of father's block, the timestamp information of the block, etc..
Optionally, as one embodiment, the method also includes:
The code of Obfuscating Algorithms is stored in third block chain account book, the Obfuscating Algorithms are used for the multiple Hash Information carries out at least one layer and obscures encryption to obtain at least one described target Hash information.
Optionally, the intelligence for passing through the block chain where calling the first block chain account book as one embodiment, the method It can contract realization.
It should be understood, of course, that the method can be as the third party device other than the block chain where the first block chain account book It realizes, the embodiment of the present application is without limitation.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can With or may be advantageous.
Fig. 2 is the structural schematic diagram of one embodiment electronic equipment of the application.Referring to FIG. 2, in hardware view, the electricity Sub- equipment includes processor, optionally further comprising internal bus, network interface, memory.Wherein, memory may be comprising interior It deposits, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-volatile memories Device (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible that other Hardware required for business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA (Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always Line etc..Only to be indicated with a four-headed arrow in Fig. 2, it is not intended that an only bus or a type of convenient for indicating Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer Block catenary system is formed on face.Processor executes the program that memory is stored, and is specifically used for executing following operation:
Obtain the Hash information of multiple storage records in the block of the first block chain account book;
At least one layer is carried out to the multiple Hash information and obscures encryption, obtains at least one target Hash information;
At least one described target Hash information is stored into the second block chain account book, wherein target user, which has, to be visited It asks the permission of the second block chain account book and does not have the permission of the first block chain account book of access.
The method that block catenary system disclosed in the above-mentioned embodiment illustrated in fig. 1 such as the application executes can be applied to processor In, or realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.It was realizing Each step of Cheng Zhong, the above method can be complete by the integrated logic circuit of the hardware in processor or the instruction of software form At.Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), Network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processor, DSP), it is specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing Field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device are divided Vertical door or transistor logic, discrete hardware components.It may be implemented or execute and is in the embodiment of the present application disclosed each Method, step and logic diagram.General processor can be microprocessor or the processor is also possible to any conventional place Manage device etc..The step of method in conjunction with disclosed in the embodiment of the present application, can be embodied directly in hardware decoding processor and execute At, or in decoding processor hardware and software module combination execute completion.Software module can be located at random access memory, This fields such as flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register maturation In storage medium.The storage medium is located at memory, and processor reads the information in memory, completes above-mentioned side in conjunction with its hardware The step of method.
The method that the electronic equipment can also carry out Fig. 1, and realize the function of block catenary system embodiment shown in Fig. 1, this Apply for that details are not described herein for embodiment.
Certainly, other than software realization mode, other implementations are not precluded in the electronic equipment of the application, for example patrol Collect device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to each patrol Unit is collected, hardware or logical device are also possible to.
The embodiment of the present application also proposed a kind of computer readable storage medium, the computer-readable recording medium storage one A or multiple programs, the one or more program include instruction, and the instruction is when by the portable electronic including multiple application programs When equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 1, and be specifically used for executing following behaviour Make:
Obtain the Hash information of multiple storage records in the block of the first block chain account book;
At least one layer is carried out to the multiple Hash information and obscures encryption, obtains at least one target Hash information;
At least one described target Hash information is stored into the second block chain account book, wherein target user, which has, to be visited It asks the permission of the second block chain account book and does not have the permission of the first block chain account book of access.
Fig. 3 is the structural schematic diagram of one embodiment block catenary system 300 of the application.Referring to FIG. 3, in a kind of software In embodiment, block catenary system 300 can include:
Module 310 is obtained, the Hash information of multiple storage records in the block of the first block chain account book is obtained;
Obscure encryption processing module 320, to the multiple Hash information carry out at least one layer obscure encryption, obtain to A few target Hash information;
Memory module 330 stores at least one described target Hash information into the second block chain account book, wherein mesh Marking user has the permission of the second block chain account book of access and does not have the permission of the first block chain account book of access.
In the embodiment of the present application, by the way that the Hash information of the storage record of block in the first block chain account book is obscured In the second block chain account book that encryption storage is able to access that target user, so as to avoid target user from directly accessing Divulging a secret for the information such as the first block chain account book bring transaction size and transaction magnitude, has ensured belonging to the first block chain account book The information security of block catenary system.
Optionally, module 310 is obtained to be particularly used in:
In response to the storage event of the newest block of the first block chain account book, multiple storage notes in the newest block are obtained The Hash information of record.
Optionally, the block chain where the first block chain account book is privately owned chain, the second block chain account book place Block chain be publicly-owned chain.
Alternatively, optionally, the block chain where the first block chain account book is privately owned chain, the second block chain account book The block chain at place is privately owned chain.
Optionally, it includes one of following that encryption is obscured described in one layer:
The content that multiple Hash informations form is subjected to Hash calculation and obtains a Hash information;
The content that any one Hash information is divided into multiple portions is subjected to Hash calculation respectively again, obtains the multiple part The corresponding multiple Hash informations of content;
The content that multiple Hash informations form is separated into the content of multiple portions, and to the content of each part respectively into Row Hash calculation obtains the corresponding multiple Hash informations of content of the multiple part.
Optionally, at least one described target Hash information is the M root of the transaction tree of the block.
Optionally, as one embodiment, memory module 330 is specifically used for:
At least one described target Hash information is stored into the second block chain account book, comprising:
The unique identification of the block and at least one described target Hash information are stored to the second block chain account In this.
Further, in a kind of implementation of the present embodiment, memory module 330 is specifically used for:
It is arrived using the unique identification of the block and at least one described target Hash information as a storage record storage In the second block chain account book.
Alternatively, further, in another implementation of the present embodiment, memory module 330 is specifically used for:
Storage record storage will be used as to secondth area in the unique identification of the block and a target Hash information In block chain account book.
Alternatively, further, in another implementation of the present embodiment, memory module 330 is specifically used for:
It is arrived the target Hash information of the unique identification of the block and not more than predetermined number as storage record storage In the second block chain account book.
Further, in above-mentioned concrete implementation mode, the area of the block can be also carried in the storage record At least one of build information.
Optionally, the memory module 330 can also be used in:
The code of Obfuscating Algorithms is stored in third block chain account book, the Obfuscating Algorithms are used for the multiple Hash Information carries out at least one layer and obscures encryption to obtain at least one described target Hash information.
Optionally, the number of at least one target Hash information is not equal to the number of the multiple Hash information.
The method that block catenary system 300 can also carry out embodiment illustrated in fig. 1, specific implementation can refer to embodiment illustrated in fig. 1, It repeats no more.
In short, being not intended to limit the protection scope of the application the foregoing is merely the preferred embodiment of the application. Within the spirit and principles of this application, any modification, equivalent replacement, improvement and so on should be included in the application's Within protection scope.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.

Claims (16)

1. storing the Hash information processing method of record in a kind of block of block chain, comprising:
Obtain the Hash information of multiple storage records in the block of the first block chain account book;
At least one layer is carried out to the multiple Hash information and obscures encryption, obtains at least one target Hash information;
Will at least one target Hash information storage into the second block chain account book, wherein target user has access the The permission of two block chain account books and the permission for not having the first block chain account book of access.
2. the method as described in claim 1,
Block chain where the first block chain account book is privately owned chain, and the block chain where the second block chain account book is public affairs There is chain;Or
The block chain where block chain and the second block chain account book where the first block chain account book is all privately owned chain.
3. the method as described in claim 1, it includes one of following that encryption is obscured described in one layer:
The content that multiple Hash informations form is subjected to Hash calculation and obtains a Hash information;
The content that any one Hash information is divided into multiple portions is subjected to Hash calculation respectively again, obtains the interior of the multiple part Hold corresponding multiple Hash informations;
The content that multiple Hash informations form is separated into the content of multiple portions, and the content of each part is breathed out respectively It is uncommon to calculate, obtain the corresponding multiple Hash informations of content of the multiple part.
4. the method as described in claim 1,
At least one described target Hash information is the M root of the transaction tree of the block.
5. the method as described in claim 1,
At least one described target Hash information is stored into the second block chain account book, comprising:
By the unique identification of the block and the storage of at least one described target Hash information into the second block chain account book.
6. method as claimed in claim 5,
By the unique identification of the block and the storage of at least one described target Hash information into the second block chain account book, Include:
Using the unique identification of the block and at least one described target Hash information as a storage record storage described in In second block chain account book.
7. method as claimed in claim 5,
By the unique identification of the block and the storage of at least one described target Hash information into the second block chain account book, Include:
Storage record storage will be used as to the second block chain in the unique identification of the block and a target Hash information In account book.
8. method as claimed in claim 5,
By the unique identification of the block and the storage of at least one described target Hash information into the second block chain account book, Include:
Using the target Hash information of the unique identification of the block and not more than predetermined number as storage record storage described in In second block chain account book.
9. described to store in the block head for also carrying the block in record such as the described in any item methods of claim 6-8 At least one information.
10. the method as described in claim 1, the method also includes:
The code of Obfuscating Algorithms is stored in third block chain account book, the Obfuscating Algorithms are used for the multiple Hash information It carries out at least one layer and obscures encryption to obtain at least one described target Hash information.
11. the method as described in claim 1, the intelligence that the method passes through the block chain where calling the first block chain account book Contract is realized.
12. the method as described in claim 1,
The number of at least one target Hash information is not equal to the number of the multiple Hash information.
13. the method as described in claim 1,
Obtain the Hash information of multiple storage records in the block of the first block chain account book, comprising:
In response to the storage event of the newest block of the first block chain account book, multiple storage records in the newest block are obtained Hash information.
14. a kind of block catenary system, comprising:
Module is obtained, the Hash information of multiple storage records in the block of the first block chain account book is obtained;
Obscure encryption processing module, at least one layer is carried out to the multiple Hash information and obscures encryption, obtains at least one Target Hash information;
Memory module stores at least one described target Hash information into the second block chain account book, wherein target user's tool There is the permission of the second block chain account book of access and does not have the permission of the first block chain account book of access.
15. a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
Obtain the Hash information of multiple storage records in the block of the first block chain account book;
At least one layer is carried out to the multiple Hash information and obscures encryption, obtains at least one target Hash information;
Will at least one target Hash information storage into the second block chain account book, wherein target user has access the The permission of two block chain account books and the permission for not having the first block chain account book of access.
16. a kind of computer readable storage medium, the computer-readable recording medium storage one or more program, described one A or multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following behaviour Make:
Obtain the Hash information of multiple storage records in the block of the first block chain account book;
At least one layer is carried out to the multiple Hash information and obscures encryption, obtains at least one target Hash information;
Will at least one target Hash information storage into the second block chain account book, wherein target user has access the The permission of two block chain account books and the permission for not having the first block chain account book of access.
CN201811605349.2A 2018-12-26 2018-12-26 Hash information processing method and system for storage record in block of block chain Active CN110020544B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201811605349.2A CN110020544B (en) 2018-12-26 2018-12-26 Hash information processing method and system for storage record in block of block chain
TW108137037A TW202024951A (en) 2018-12-26 2019-10-15 Hash information processing method and system for storing records in block of block chain
PCT/CN2019/122552 WO2020134898A1 (en) 2018-12-26 2019-12-03 Hash information processing method and system for storage records in block of blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811605349.2A CN110020544B (en) 2018-12-26 2018-12-26 Hash information processing method and system for storage record in block of block chain

Publications (2)

Publication Number Publication Date
CN110020544A true CN110020544A (en) 2019-07-16
CN110020544B CN110020544B (en) 2021-08-24

Family

ID=67188705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811605349.2A Active CN110020544B (en) 2018-12-26 2018-12-26 Hash information processing method and system for storage record in block of block chain

Country Status (3)

Country Link
CN (1) CN110020544B (en)
TW (1) TW202024951A (en)
WO (1) WO2020134898A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111125020A (en) * 2019-12-20 2020-05-08 西安翻译学院 Block chain-based information security management method, system and server
WO2020134898A1 (en) * 2018-12-26 2020-07-02 阿里巴巴集团控股有限公司 Hash information processing method and system for storage records in block of blockchain
CN111984614A (en) * 2020-08-04 2020-11-24 中国人民银行数字货币研究所 Method, device and system for sharing files
CN112131307A (en) * 2020-07-15 2020-12-25 北京天德科技有限公司 Novel multi-block chain and multi-intelligent contract interaction architecture
CN112468577A (en) * 2020-11-25 2021-03-09 上海欧冶金融信息服务股份有限公司 Data controllable sharing method and system based on data mapping relation

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI776203B (en) * 2020-08-11 2022-09-01 大陸商昆山吉崴微電子科技有限公司 Blockchain authorizing system for silicon intellectual property and method thereof
GB2616433A (en) * 2022-03-08 2023-09-13 Nchain Licensing Ag Translucent blockchain database

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN107154850A (en) * 2017-05-17 2017-09-12 北京汇通金财信息科技有限公司 A kind of processing method and processing device of block chain data
CN107659531A (en) * 2016-07-25 2018-02-02 蓝树荣 A kind of method for facilitating block chain to carry out decentralization and high in the clouds encrypted authentication
CN108768663A (en) * 2018-05-31 2018-11-06 中国地质大学(武汉) A kind of block chain access control method and its processing system
CN109063169A (en) * 2018-08-17 2018-12-21 福建省农村信用社联合社 A kind of customer data management system based on block chain
CN109493221A (en) * 2018-10-26 2019-03-19 全链通有限公司 Transaction record time slot scrambling, equipment, network and storage medium in block chain

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372533B (en) * 2016-09-14 2020-04-21 中国银联股份有限公司 Content storage method based on block chain technology
CN107395557B (en) * 2017-03-28 2020-05-15 创新先进技术有限公司 Service request processing method and device
CN108710658B (en) * 2018-05-11 2021-12-03 创新先进技术有限公司 Data record storage method and device
CN110020544B (en) * 2018-12-26 2021-08-24 创新先进技术有限公司 Hash information processing method and system for storage record in block of block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659531A (en) * 2016-07-25 2018-02-02 蓝树荣 A kind of method for facilitating block chain to carry out decentralization and high in the clouds encrypted authentication
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN107154850A (en) * 2017-05-17 2017-09-12 北京汇通金财信息科技有限公司 A kind of processing method and processing device of block chain data
CN108768663A (en) * 2018-05-31 2018-11-06 中国地质大学(武汉) A kind of block chain access control method and its processing system
CN109063169A (en) * 2018-08-17 2018-12-21 福建省农村信用社联合社 A kind of customer data management system based on block chain
CN109493221A (en) * 2018-10-26 2019-03-19 全链通有限公司 Transaction record time slot scrambling, equipment, network and storage medium in block chain

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020134898A1 (en) * 2018-12-26 2020-07-02 阿里巴巴集团控股有限公司 Hash information processing method and system for storage records in block of blockchain
CN111125020A (en) * 2019-12-20 2020-05-08 西安翻译学院 Block chain-based information security management method, system and server
CN112131307A (en) * 2020-07-15 2020-12-25 北京天德科技有限公司 Novel multi-block chain and multi-intelligent contract interaction architecture
CN111984614A (en) * 2020-08-04 2020-11-24 中国人民银行数字货币研究所 Method, device and system for sharing files
CN111984614B (en) * 2020-08-04 2023-05-26 中国人民银行数字货币研究所 Method, device and system for sharing files
CN112468577A (en) * 2020-11-25 2021-03-09 上海欧冶金融信息服务股份有限公司 Data controllable sharing method and system based on data mapping relation
CN112468577B (en) * 2020-11-25 2021-11-02 上海欧冶金融信息服务股份有限公司 Data controllable sharing method and system based on data mapping relation

Also Published As

Publication number Publication date
CN110020544B (en) 2021-08-24
WO2020134898A1 (en) 2020-07-02
TW202024951A (en) 2020-07-01

Similar Documents

Publication Publication Date Title
CN110020544A (en) The Hash information processing method and system of record are stored in the block of block chain
EP3547198B1 (en) Method, system and apparatus for data access
US10621376B2 (en) Personal ledger blockchain
US11726968B2 (en) Methods, apparatuses, and devices for transferring data assets based on blockchain
CN110032880A (en) Record screen evidence collecting method, system and electronic equipment based on block chain
CN108364223A (en) A kind of method and device of Data Audit
CN110033261A (en) Block chain data processing method, apparatus and system
EP3965359B1 (en) Trusted hardware-based data management methods, apparatuses, and devices
CN110163007A (en) Data integrity verification method, equipment and storage medium based on block chain
CN110046156A (en) Content Management System and method, apparatus, electronic equipment based on block chain
CN110020542A (en) Data read-write method and device, electronic equipment
CN110263544A (en) In conjunction with the receipt storage method and node of type of transaction and Rule of judgment
CN108846749A (en) A kind of sliced transaction execution system and method based on block chain technology
CN109146699A (en) Blind date friend-making integrated management approach and system based on block chain
KR20210008486A (en) Secure dataset management
CN115033919A (en) Data acquisition method, device and equipment based on trusted equipment
CN110263502A (en) Image processing method and device based on block chain
CN110263505A (en) Image processing method and device based on block chain
CN109145625A (en) Processing method, device and the block chain data-storage system of policy information
CN113076527A (en) Block chain-based digital asset processing method and device
CN110008747A (en) A kind of guard method, device and the electronic equipment of the private data based on block chain
CN110033367A (en) Based on the contract record method and device of block chain, electronic equipment
CN112597525A (en) Data processing method and device based on privacy protection and server
CN110019490A (en) Information query method, device and its equipment based on block chain
CN109150994A (en) Hot spot data processing method, device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240929

Address after: Guohao Times City # 20-01, 128 Meizhi Road, Singapore

Patentee after: Ant Chain Technology Co.,Ltd.

Country or region after: Singapore

Address before: P.O. Box 31119, grand exhibition hall, hibiscus street, 802 West Bay Road, Grand Cayman, Cayman Islands

Patentee before: Innovative advanced technology Co.,Ltd.

Country or region before: Cayman Islands