CN110020544B - Hash information processing method and system for storage record in block of block chain - Google Patents

Hash information processing method and system for storage record in block of block chain Download PDF

Info

Publication number
CN110020544B
CN110020544B CN201811605349.2A CN201811605349A CN110020544B CN 110020544 B CN110020544 B CN 110020544B CN 201811605349 A CN201811605349 A CN 201811605349A CN 110020544 B CN110020544 B CN 110020544B
Authority
CN
China
Prior art keywords
hash information
block
block chain
target
account book
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811605349.2A
Other languages
Chinese (zh)
Other versions
CN110020544A (en
Inventor
栗志果
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201811605349.2A priority Critical patent/CN110020544B/en
Publication of CN110020544A publication Critical patent/CN110020544A/en
Priority to TW108137037A priority patent/TW202024951A/en
Priority to PCT/CN2019/122552 priority patent/WO2020134898A1/en
Application granted granted Critical
Publication of CN110020544B publication Critical patent/CN110020544B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application discloses a hash information processing method, a system and electronic equipment for storage records in a block of a block chain, wherein the method comprises the following steps: acquiring hash information of a plurality of storage records in a block of a first block chain account book; performing at least one layer of confusion encryption processing on the plurality of hash information to obtain at least one target hash information; storing the at least one target hash information into a second blockchain ledger, wherein the target user has permission to access the second blockchain ledger and does not have permission to access the first blockchain ledger.

Description

Hash information processing method and system for storage record in block of block chain
Technical Field
The present application relates to the field of computer software technologies, and in particular, to a hash information processing method and system for storage records in a block of a block chain.
Background
The block chain account book has the characteristics of real transparency and indelibility, has an increasingly wide application range, and basically relates to various industries.
However, due to the structural reason of the blockchain ledger, even if plaintext is encrypted, the public can still obtain the real transaction amount on the blockchain by analyzing the blockchain ledger by using a hash uplink mode.
How to protect the transaction scale transaction magnitude of the business while ensuring the data to be real and transparent is a technical problem to be solved urgently.
Disclosure of Invention
An object of the embodiments of the present application is to provide a hash information processing method and system for storing records in a block of a block chain, so as to protect a transaction scale transaction magnitude of a service in the block chain, so that more services can better protect service data while using a block chain technology.
In order to solve the above technical problem, the embodiment of the present application is implemented as follows:
in a first aspect, a hash information processing method for storing records in a block of a block chain is provided, where the method includes:
acquiring hash information of a plurality of storage records in a block of a first block chain account book;
performing at least one layer of confusion encryption processing on the plurality of hash information to obtain at least one target hash information;
storing the at least one target hash information into a second blockchain ledger, wherein the target user has permission to access the second blockchain ledger and does not have permission to access the first blockchain ledger.
In a second aspect, a blockchain system is proposed, the blockchain system comprising:
the acquisition module acquires hash information of a plurality of storage records in a block of the first block chain account book;
the confusion encryption processing module is used for carrying out at least one layer of confusion encryption processing on the plurality of hash information to obtain at least one target hash information;
and the storage module is used for storing the at least one target hash information into a second blockchain account book, wherein the target user has the authority of accessing the second blockchain account book and does not have the authority of accessing the first blockchain account book.
In a third aspect, an electronic device is provided, which includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring hash information of a plurality of storage records in a block of a first block chain account book; performing at least one layer of confusion encryption processing on the plurality of hash information to obtain at least one target hash information; storing the at least one target hash information into a second blockchain ledger, wherein the target user has permission to access the second blockchain ledger and does not have permission to access the first blockchain ledger.
In a fourth aspect, a computer-readable storage medium is presented, the computer-readable storage medium storing one or more programs that, when executed by an electronic device that includes a plurality of application programs, cause the electronic device to:
acquiring hash information of a plurality of storage records in a block of a first block chain account book; performing at least one layer of confusion encryption processing on the plurality of hash information to obtain at least one target hash information; storing the at least one target hash information into a second blockchain ledger, wherein the target user has permission to access the second blockchain ledger and does not have permission to access the first blockchain ledger.
As can be seen from the technical solutions provided in the embodiments of the present application, the embodiments of the present application have at least one of the following technical effects:
drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a flowchart of a hash information processing method for storing records in a block of a blockchain according to an embodiment of the present application.
Fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Fig. 3 is a block chain system according to an embodiment of the present application.
Detailed Description
The embodiment of the application provides a hash information processing method, a hash information processing system and electronic equipment for storage records in a block of a block chain.
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a flowchart of a hash information processing method for storing records in a block of a blockchain according to an embodiment of the present application. The method of fig. 1 may include:
s110, hash information of a plurality of storage records in a block of the first blockchain directory is obtained.
It should be understood that in different blockchain application scenarios, the storage records in the blockchain may store different content. For example, in a system involving blockchain transactions, one stored record is a transaction record for the blockchain.
It should be understood that, in the embodiment of the present application, when hash information of a plurality of storage records in a block of a first blockchain ledger is acquired, the hash information of the plurality of storage records may be acquired through a transaction tree of the block.
It should be understood that in the blockchain system of blockchain 1.0, such as bitcoin, there is only one merkel (Merkle) tree, which may also be referred to as a transaction tree to some extent; in the blockchain system of the blockchain 2.0 of the ether house, there are three Merkle trees, a transaction (Transactions) tree, a receipt (Receipts) tree and a status (State) tree.
Alternatively, as an embodiment, the step S110 may be implemented as: and acquiring the hash information of a plurality of storage records in the blocks of the first block chain account one by one so as to perform confusion encryption processing until the latest block of the block chain is read.
For this embodiment, the information of the history blocks of the block chain may be subjected to the obfuscated encryption processing according to the scheme of this embodiment.
Or, optionally, as another embodiment, the step S110 may be implemented as: and responding to a storage event of the latest block of the first blockchain account book, and acquiring hash information of a plurality of storage records in the latest block.
For this embodiment, the scheme of this embodiment needs to be executed when the blockchain to which the first blockchain account belongs is started, so as to ensure that the hashed information after the confusion of the storage records of all blocks of the first blockchain account can be queried in the second blockchain account. Of course, if the hash information after confusion of the storage records of all the blocks of the first blockchain account book does not need to be queried, the execution time of the method in the embodiment of the present application may not be limited.
And S120, performing at least one layer of confusion encryption processing on the plurality of hash information to obtain at least one target hash information.
In the embodiment of the application, the confusion encryption processing is performed on the hash information of the storage record of the block, so that the transaction amount information of the block in the block chain can be prevented from being disclosed.
In particular, the number of the at least one target hash information is not equal to the number of the plurality of hash information.
S130, storing the at least one target hash information into a second blockchain ledger, wherein the target user has an authority to access the second blockchain ledger and does not have an authority to access the first blockchain ledger.
In the embodiment of the application, hash information of the storage record of the block in the first blockchain account book is subjected to confusion encryption processing and is stored in the second blockchain account book which can be accessed by a target user, so that the divulgence of information such as transaction scale and transaction magnitude caused by the direct access of the first blockchain account book by the target user can be avoided, and the information security of the blockchain system to which the first blockchain account book belongs is ensured.
It should be understood that the target user has the right to access the second blockchain ledger and does not have the right to access the first blockchain ledger, and there are various implementation ways:
for example, the block chain where the first block chain account book is located is a private chain; and the block chain where the second block chain account book is located. At this time, other nodes than the account node of the block chain in which the first blockchain account book is located do not have the access authority of the first blockchain account book, but can access the second blockchain account book.
For another example, the blockchain in which the first blockchain account book is located and the blockchain in which the second blockchain account book is located are both private chains, and the target account is configured with the access authority of the second blockchain account book, but is not configured with the access authority of the first blockchain account book.
It should be understood that in the embodiments of the present application, the obfuscated encryption process for the hash information may include a variety of ways.
Optionally, in an implementation manner, the content composed of a plurality of pieces of hash information may be hashed to obtain one piece of hash information.
For example, assuming that Hash information corresponding to 4 storage records in a block of the block chain is HashA, HashB, HashC, and HashD, respectively, the Hash information HashABCD after the encryption process is Hash (HashA + HashB + HashC + HashD), where the function Hash () represents a Hash calculation function, such as MD5, SHA-1, SHA-256, SHA-384, and SHA-512, and so on. In the bitcoin system, the hash algorithm used is SHA-256.
Optionally, in another implementation manner, any one of the hash information may be divided into a plurality of portions of content, and then hash calculation may be performed respectively to obtain a plurality of hash information corresponding to the plurality of portions of content.
For example, assuming that Hash information corresponding to one storage record in a certain block of the block chain is HashA, the HashA may be split into HashA1 and HashA2, and then Hash processing is performed on the HashA1 and the HashA2, respectively, so as to obtain HashA1 ═ Hash (HashA1) and HashA2 ═ Hash (HashA2), where the HashA1 'and the HashA 2' are Hash information obtained by performing obfuscation and encryption processing on the HashA. Of course, the HashA can be split into 3 parts, 4 parts or even more, and the specific split number of parts, how split, is configurable.
Optionally, in another implementation manner, the content composed of the plurality of pieces of hash information may be subdivided into a plurality of portions of content, and hash calculation may be performed on each portion of content, so as to obtain a plurality of pieces of hash information corresponding to the plurality of portions of content.
For example, suppose that hash information corresponding to 4 storage records in a certain block of the block chain is HashA, HashB, HashC, and HashD, respectively, and the content HashABCD of the hash information is (HashA + HashB + HashC + HashD); the HashABCD may be divided into HashABCD1 and HashABCD2, and Hash calculation is performed on HashABCD1 and HashABCD2 to obtain Hash (HashABCD1) and Hash (HashABCD2), where the Hash (HashABCD1) and the Hash (HashABCD2) are multiple Hash information corresponding to the multiple portions of content.
Of course, the foregoing is merely exemplary, and other processing approaches are specifically possible and not limiting.
In addition, it should be understood that the obfuscation scheme according to the embodiment of the present application may further perform multiple layers of obfuscation encryption processing, that is, perform one or more layers of obfuscation encryption processing on hash information after one layer of obfuscation encryption processing. The algorithms for obfuscating the encryption process at different layers may be the same or different.
For example, assuming that Hash information corresponding to 4 storage records in a certain block of the block chain is HashA, HashB, HashC, and HashD, respectively, the Hash information HashABCD after the first layer obfuscation encryption process is Hash (HashA + HashB + HashC + HashD); the second layer obfuscates the encrypted Hash information into Hash (HashABCD1) and Hash (HashABCD2), wherein HashABCD is HashABCD1+ HashABCD 2.
Optionally, as an embodiment, the at least one target hash information is M roots of a transaction tree of the block. The method refers to the generation mode of the Merkle tree, hashes the storage records in the blocks to obtain hash information, and hashes the hash information two by two to obtain new hash information until a hash value is obtained.
Optionally, as an embodiment, the step S130 may be specifically implemented as:
storing the unique identification of the block and the at least one target hash information into the second blockchain ledger.
In an embodiment of the application, the unique identifier of the block and the generated at least one piece of target hash information are stored together in the second blockchain ledger, so that a target user can determine which block the at least one piece of target hash information belongs to based on the unique identifier of the block.
Further, in a specific implementation manner of the embodiment of the present application, the unique identifier of the block and the at least one piece of target hash information may be stored as a storage record in the second blockchain ledger.
In the embodiment of the present application, all obfuscated hash information of one block is stored as one storage record.
Or, further, in another specific implementation manner of the embodiment of the present application, the unique identifier of the block and one piece of target hash information may be stored as a storage record in the second blockchain ledger.
In the embodiment of the application, the obfuscated hash information of one block is stored as a storage record.
Or, further, in another specific implementation manner of the embodiment of the present application, the unique identifier of the block and no more than a predetermined number of pieces of target hash information may be stored as a storage record in the second blockchain ledger.
Of course, it should be understood that in the above implementation manner of the embodiment of the present application, at least one information in the block header of the block, such as hash information of the parent block, timestamp information of the block, and the like, may also be carried in the storage record.
Optionally, as an embodiment, the method further includes:
and storing the code of an obfuscation algorithm in a third blockchain account book, wherein the obfuscation algorithm is used for carrying out at least one layer of obfuscation encryption processing on the plurality of pieces of hash information to obtain at least one piece of target hash information.
Optionally, as an embodiment, the method is implemented by calling an intelligent contract of a blockchain in which the first blockchain ledger is located.
Of course, it should be understood that the method may be implemented by a third party device other than the blockchain where the first blockchain account book is located, and this is not limited in this embodiment of the application.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present application. Referring to fig. 2, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 2, but this does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads a corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form a block chain system on a logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
acquiring hash information of a plurality of storage records in a block of a first block chain account book;
performing at least one layer of confusion encryption processing on the plurality of hash information to obtain at least one target hash information;
storing the at least one target hash information into a second blockchain ledger, wherein the target user has permission to access the second blockchain ledger and does not have permission to access the first blockchain ledger.
The method performed by the blockchain system disclosed in the embodiment of fig. 1 of the present application may be applied to or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The electronic device may also execute the method of fig. 1 and implement the functions of the block chain system in the embodiment shown in fig. 1, which are not described herein again in this embodiment of the present application.
Of course, besides the software implementation, the electronic device of the present application does not exclude other implementations, such as a logic device or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
Embodiments of the present application also provide a computer-readable storage medium storing one or more programs, where the one or more programs include instructions, which when executed by a portable electronic device including a plurality of application programs, enable the portable electronic device to perform the method of the embodiment shown in fig. 1, and are specifically configured to:
acquiring hash information of a plurality of storage records in a block of a first block chain account book;
performing at least one layer of confusion encryption processing on the plurality of hash information to obtain at least one target hash information;
storing the at least one target hash information into a second blockchain ledger, wherein the target user has permission to access the second blockchain ledger and does not have permission to access the first blockchain ledger.
Fig. 3 is a block chain system 300 according to an embodiment of the present application. Referring to fig. 3, in one software implementation, a block chain system 300 may include:
the obtaining module 310 obtains hash information of a plurality of storage records in a block of the first block chain ledger book;
the obfuscation encryption processing module 320 is configured to perform at least one layer of obfuscation encryption processing on the plurality of hash information to obtain at least one target hash information;
the storage module 330 stores the at least one piece of target hash information into the second blockchain ledger, where the target user has an authority to access the second blockchain ledger and does not have an authority to access the first blockchain ledger.
In the embodiment of the application, hash information of the storage record of the block in the first blockchain account book is subjected to confusion encryption processing and is stored in the second blockchain account book which can be accessed by a target user, so that the divulgence of information such as transaction scale and transaction magnitude caused by the direct access of the first blockchain account book by the target user can be avoided, and the information security of the blockchain system to which the first blockchain account book belongs is ensured.
Optionally, the obtaining module 310 may be specifically configured to:
and responding to a storage event of the latest block of the first blockchain account book, and acquiring hash information of a plurality of storage records in the latest block.
Optionally, the block chain where the first block chain account book is located is a private chain, and the block chain where the second block chain account book is located is a public chain.
Or, optionally, the block chain where the first block chain account book is located is a private chain, and the block chain where the second block chain account book is located is a private chain.
Optionally, one layer of the obfuscated encryption process includes one of:
performing hash calculation on the content consisting of the plurality of hash information to obtain one hash information;
dividing any one piece of hash information into a plurality of parts of contents, and respectively carrying out hash calculation to obtain a plurality of pieces of hash information corresponding to the plurality of parts of contents;
and subdividing the content consisting of the plurality of pieces of hash information into a plurality of parts of content, and performing hash calculation on each part of content to obtain a plurality of pieces of hash information corresponding to the plurality of parts of content.
Optionally, the at least one target hash is the M root of the transaction tree of the block.
Optionally, as an embodiment, the storage module 330 is specifically configured to:
storing the at least one target hash information into a second blockchain ledger, including:
storing the unique identification of the block and the at least one target hash information into the second blockchain ledger.
Further, in an implementation manner of this embodiment, the storage module 330 is specifically configured to:
and storing the unique identification of the block and the at least one piece of target hash information into the second block chain account book as a storage record.
Or, further, in another implementation manner of this embodiment, the storage module 330 is specifically configured to:
and storing the unique identification of the block and one piece of target hash information as a storage record in the second block chain account book.
Or, further, in yet another implementation manner of this embodiment, the storage module 330 is specifically configured to:
and storing the unique identification of the block and the target hash information which is not more than the preset number into the second block chain account book as storage records.
Further, in the above specific implementation, the storage record may further carry at least one information of a block header of the block.
Optionally, the storage module 330 may further be configured to:
and storing the code of an obfuscation algorithm in a third blockchain account book, wherein the obfuscation algorithm is used for carrying out at least one layer of obfuscation encryption processing on the plurality of pieces of hash information to obtain at least one piece of target hash information.
Optionally, the number of the at least one target hash information is not equal to the number of the plurality of hash information.
The block chain system 300 may also perform the method of the embodiment shown in fig. 1, and the specific implementation may refer to the embodiment shown in fig. 1, which is not described again.
In short, the above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.

Claims (14)

1. A hash information processing method for storing records in a block of a block chain comprises the following steps:
the method comprises the steps of obtaining hash information of a plurality of storage records in a block of a first block chain account book, wherein the hash information of the plurality of storage records is hash information in the transaction of the block;
performing at least one layer of confusion encryption processing on the plurality of hash information to obtain at least one target hash information, wherein the number of the at least one target hash information is not equal to the number of the plurality of hash information;
storing the unique identification of the block and the at least one target hash information into a second blockchain ledger, wherein the target user has permission to access the second blockchain ledger and does not have permission to access the first blockchain ledger.
2. The method of claim 1, wherein the first and second light sources are selected from the group consisting of a red light source, a green light source, and a blue light source,
the block chain where the first block chain account book is located is a private chain, and the block chain where the second block chain account book is located is a public chain; or
The block chain where the first block chain account book is located and the block chain where the second block chain account book is located are both private chains.
3. The method of claim 1, one layer of the obfuscated encryption process comprising one of:
performing hash calculation on the content consisting of the plurality of hash information to obtain one hash information;
dividing any one piece of hash information into a plurality of parts of contents, and respectively carrying out hash calculation to obtain a plurality of pieces of hash information corresponding to the plurality of parts of contents;
and subdividing the content consisting of the plurality of pieces of hash information into a plurality of parts of content, and performing hash calculation on each part of content to obtain a plurality of pieces of hash information corresponding to the plurality of parts of content.
4. The method of claim 1, wherein the first and second light sources are selected from the group consisting of a red light source, a green light source, and a blue light source,
the at least one target hash is the M root of the transaction tree of the block.
5. The method of claim 1, wherein the first and second light sources are selected from the group consisting of a red light source, a green light source, and a blue light source,
storing the unique identifier of the block and the at least one piece of target hash information into the second block chain ledger, including:
and storing the unique identification of the block and the at least one piece of target hash information into the second block chain account book as a storage record.
6. The method of claim 1, wherein the first and second light sources are selected from the group consisting of a red light source, a green light source, and a blue light source,
storing the unique identifier of the block and the at least one piece of target hash information into the second block chain ledger, including:
and storing the unique identification of the block and one piece of target hash information as a storage record in the second block chain account book.
7. The method of claim 1, wherein the first and second light sources are selected from the group consisting of a red light source, a green light source, and a blue light source,
storing the unique identifier of the block and the at least one piece of target hash information into the second block chain ledger, including:
and storing the unique identification of the block and the target hash information which is not more than the preset number into the second block chain account book as storage records.
8. The method of any of claims 5-7, further carrying at least one of information in a block header of the block in the storage record.
9. The method of claim 1, further comprising:
and storing the code of an obfuscation algorithm in a third blockchain account book, wherein the obfuscation algorithm is used for carrying out at least one layer of obfuscation encryption processing on the plurality of pieces of hash information to obtain at least one piece of target hash information.
10. The method of claim 1, implemented by invoking an intelligent contract for a blockchain in which the first blockchain ledger resides.
11. The method of claim 1, wherein the first and second light sources are selected from the group consisting of a red light source, a green light source, and a blue light source,
the method for acquiring the hash information of a plurality of storage records in the block of the first block chain account book comprises the following steps:
and responding to a storage event of the latest block of the first blockchain account book, and acquiring hash information of a plurality of storage records in the latest block.
12. A blockchain system, comprising:
the acquisition module is used for acquiring hash information of a plurality of storage records in a block of a first block chain account book, wherein the hash information of the plurality of storage records is hash information in the transaction of the block;
the obfuscation encryption processing module is used for carrying out at least one layer of obfuscation encryption processing on the plurality of hash information to obtain at least one target hash information, wherein the number of the at least one target hash information is not equal to the number of the plurality of hash information;
and the storage module is used for storing the unique identification of the block and the at least one piece of target hash information into a second blockchain account book, wherein a target user has the authority of accessing the second blockchain account book and does not have the authority of accessing the first blockchain account book.
13. An electronic device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
the method comprises the steps of obtaining hash information of a plurality of storage records in a block of a first block chain account book, wherein the hash information of the plurality of storage records is hash information in the transaction of the block;
performing at least one layer of confusion encryption processing on the plurality of hash information to obtain at least one target hash information, wherein the number of the at least one target hash information is not equal to the number of the plurality of hash information;
storing the unique identification of the block and the at least one target hash information into a second blockchain ledger, wherein the target user has permission to access the second blockchain ledger and does not have permission to access the first blockchain ledger.
14. A computer-readable storage medium storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to:
the method comprises the steps of obtaining hash information of a plurality of storage records in a block of a first block chain account book, wherein the hash information of the plurality of storage records is hash information in the transaction of the block;
performing at least one layer of confusion encryption processing on the plurality of hash information to obtain at least one target hash information, wherein the number of the at least one target hash information is not equal to the number of the plurality of hash information;
storing the unique identification of the block and the at least one target hash information into a second blockchain ledger, wherein the target user has permission to access the second blockchain ledger and does not have permission to access the first blockchain ledger.
CN201811605349.2A 2018-12-26 2018-12-26 Hash information processing method and system for storage record in block of block chain Active CN110020544B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201811605349.2A CN110020544B (en) 2018-12-26 2018-12-26 Hash information processing method and system for storage record in block of block chain
TW108137037A TW202024951A (en) 2018-12-26 2019-10-15 Hash information processing method and system for storing records in block of block chain
PCT/CN2019/122552 WO2020134898A1 (en) 2018-12-26 2019-12-03 Hash information processing method and system for storage records in block of blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811605349.2A CN110020544B (en) 2018-12-26 2018-12-26 Hash information processing method and system for storage record in block of block chain

Publications (2)

Publication Number Publication Date
CN110020544A CN110020544A (en) 2019-07-16
CN110020544B true CN110020544B (en) 2021-08-24

Family

ID=67188705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811605349.2A Active CN110020544B (en) 2018-12-26 2018-12-26 Hash information processing method and system for storage record in block of block chain

Country Status (3)

Country Link
CN (1) CN110020544B (en)
TW (1) TW202024951A (en)
WO (1) WO2020134898A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110020544B (en) * 2018-12-26 2021-08-24 创新先进技术有限公司 Hash information processing method and system for storage record in block of block chain
CN111125020A (en) * 2019-12-20 2020-05-08 西安翻译学院 Block chain-based information security management method, system and server
CN112131307B (en) * 2020-07-15 2021-05-25 北京天德科技有限公司 Novel multi-block chain and multi-intelligent contract interaction architecture
CN111984614B (en) * 2020-08-04 2023-05-26 中国人民银行数字货币研究所 Method, device and system for sharing files
TWI776203B (en) * 2020-08-11 2022-09-01 大陸商昆山吉崴微電子科技有限公司 Blockchain authorizing system for silicon intellectual property and method thereof
CN112468577B (en) * 2020-11-25 2021-11-02 上海欧冶金融信息服务股份有限公司 Data controllable sharing method and system based on data mapping relation
GB2616433A (en) * 2022-03-08 2023-09-13 Nchain Licensing Ag Translucent blockchain database

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN108768663A (en) * 2018-05-31 2018-11-06 中国地质大学(武汉) A kind of block chain access control method and its processing system
CN109493221A (en) * 2018-10-26 2019-03-19 全链通有限公司 Transaction record time slot scrambling, equipment, network and storage medium in block chain

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659531A (en) * 2016-07-25 2018-02-02 蓝树荣 A kind of method for facilitating block chain to carry out decentralization and high in the clouds encrypted authentication
CN106372533B (en) * 2016-09-14 2020-04-21 中国银联股份有限公司 Content storage method based on block chain technology
CN111724150B (en) * 2017-03-28 2023-11-24 创新先进技术有限公司 Service request processing method and device
CN107154850A (en) * 2017-05-17 2017-09-12 北京汇通金财信息科技有限公司 A kind of processing method and processing device of block chain data
CN108710658B (en) * 2018-05-11 2021-12-03 创新先进技术有限公司 Data record storage method and device
CN109063169A (en) * 2018-08-17 2018-12-21 福建省农村信用社联合社 A kind of customer data management system based on block chain
CN110020544B (en) * 2018-12-26 2021-08-24 创新先进技术有限公司 Hash information processing method and system for storage record in block of block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN108768663A (en) * 2018-05-31 2018-11-06 中国地质大学(武汉) A kind of block chain access control method and its processing system
CN109493221A (en) * 2018-10-26 2019-03-19 全链通有限公司 Transaction record time slot scrambling, equipment, network and storage medium in block chain

Also Published As

Publication number Publication date
TW202024951A (en) 2020-07-01
CN110020544A (en) 2019-07-16
WO2020134898A1 (en) 2020-07-02

Similar Documents

Publication Publication Date Title
CN110020544B (en) Hash information processing method and system for storage record in block of block chain
CN111614656B (en) Credible management method and device for cross-link data and electronic equipment
CN110032880B (en) Screen recording evidence obtaining method and system based on block chain and electronic equipment
US10999060B2 (en) Data processing method and apparatus
CN110033261B (en) Block chain data processing method, device and system
CN113079200A (en) Data processing method, device and system
CN112235278B (en) Method and device for monitoring address information of trader and electronic equipment
CN107402821B (en) Access control method, device and equipment for shared resources
CN111415158B (en) Wind control method and system based on block chain
CN113840012A (en) Screen recording evidence obtaining method and system based on block chain and electronic equipment
CN115129716A (en) Data management method, equipment and storage medium for industrial big data
CN110474775B (en) User creating method, device and equipment in block chain type account book
CN113205416A (en) Service processing method and system based on block chain prediction machine
CN111310137B (en) Block chain associated data evidence storing method and device and electronic equipment
TW202022669A (en) Method, device and electronic equipment for preventing misuse of identity data
CN109345081B (en) Data acquisition method and device and electronic equipment
CN108920326B (en) Method and device for determining time-consuming abnormity of system and electronic equipment
CN113886418A (en) Data processing method and device, electronic equipment and machine-readable storage medium
CN110851207B (en) State transition management method and device, electronic equipment and storage medium
CN112182509A (en) Method, device and equipment for detecting abnormity of compliance data
CN111600882A (en) Block chain-based account password management method and device and electronic equipment
CN111464312B (en) Method and device for processing account addresses in blockchain and electronic equipment
CN111461728B (en) Risk identification method, device and system
CN112487497A (en) Method and device for managing off-link files based on intelligent contracts and electronic equipment
CN113673844A (en) Information feedback method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant