CN110033261A - Block chain data processing method, apparatus and system - Google Patents

Block chain data processing method, apparatus and system Download PDF

Info

Publication number
CN110033261A
CN110033261A CN201811605307.9A CN201811605307A CN110033261A CN 110033261 A CN110033261 A CN 110033261A CN 201811605307 A CN201811605307 A CN 201811605307A CN 110033261 A CN110033261 A CN 110033261A
Authority
CN
China
Prior art keywords
block chain
hash
fragment
target hash
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811605307.9A
Other languages
Chinese (zh)
Other versions
CN110033261B (en
Inventor
栗志果
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811605307.9A priority Critical patent/CN110033261B/en
Priority to CN202110949513.7A priority patent/CN113689213A/en
Publication of CN110033261A publication Critical patent/CN110033261A/en
Priority to TW108137259A priority patent/TWI724579B/en
Priority to PCT/CN2019/119312 priority patent/WO2020134712A1/en
Application granted granted Critical
Publication of CN110033261B publication Critical patent/CN110033261B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

This specification one or more embodiment discloses a kind of block chain data processing method, apparatus and system, to realize the purpose for ensuring the safety of data while using block chain technology.The described method includes: obtaining multiple hash corresponding to multiple business datums of block record in the first block chain;Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, at least one target hash after being obscured;Fragment processing is carried out at least one described target hash;Target hash after fragment is stored respectively into the second block chain.

Description

Block chain data processing method, apparatus and system
Technical field
This specification is related to technical field of data processing more particularly to a kind of block chain data processing method, device and is System.
Background technique
Have true transparent, unsuppressible-suppression characteristic using the data that block chain stores, though to being encrypted in plain text or Using the mode of Hash cochain, the public still can obtain the truthful data on block chain by parsing block chain, such as pass through The magnitude of Hash deduces the true calling magnitude of block chain, to obtain truthful data.As it can be seen that existing block chain stores number According to mode safety is not high for a user, especially using block chain store transaction data scene in, transaction data Transparence a degree of risk can be brought to user.
Summary of the invention
The purpose of this specification one or more embodiment is to provide a kind of block chain data processing method, device and is System, to realize the purpose for ensuring the safety of data while using block chain technology.
In order to solve the above technical problems, this specification one or more embodiment is achieved in that
On the one hand, this specification one or more embodiment provides a kind of block chain data processing method, comprising:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, is obscured At least one target hash afterwards;
Fragment processing is carried out at least one described target hash;
Target hash after fragment is stored respectively into the second block chain.
In one embodiment, described to obscure encryption mode according to preset the multiple hash is mixed Confuse encryption, at least one target hash after being obscured, comprising:
Hash calculation at least once is carried out to each hash respectively, obtains at least one described target Hash number According to.
In one embodiment, the fragment handles target hash included in corresponding each fragment and is not more than Predetermined number.
In one embodiment, the target hash by after fragment is stored respectively into the second block chain, comprising:
It stores target hash included in each fragment as a business record to described second In block chain.
In one embodiment, multiple Kazakhstan corresponding to multiple business datums of block record in obtaining the first block chain Before uncommon data, further includes:
Determine that the data of the first block chain check that permission is only visible to the first designated user group;And described in determining The data of second block chain check that permission is visible to all users.
In one embodiment, the method also includes:
Obscure encryption mode by described and store into third block chain;And determine the data of the third block chain Check that permission is only visible to the second designated user group.
On the other hand, this specification one or more embodiment provides a kind of block chain data processing equipment, comprising:
Module is obtained, for obtaining multiple Hash numbers corresponding to multiple business datums that block records in the first block chain According to;
Module is obscured, for obscuring encryption mode according to preset and carrying out obscuring encryption to the multiple hash Processing, at least one target hash after being obscured;
Fragment module, for carrying out fragment processing at least one described target hash;
First memory module, for being stored the target hash after fragment respectively into the second block chain.
In another aspect, this specification one or more embodiment provides a kind of block chain data processing system, including first Block chain, data processing node and the second block chain;Wherein:
The first block chain, for recording multiple hash corresponding to multiple business datums;
The data processing node, for obtaining the multiple hash that block records in the first block chain;
The data processing node, be also used to according to it is preset obscure encryption mode to the multiple hash into Row obscures encryption, at least one target hash after being obscured;To at least one described target hash into The processing of row fragment;Target hash after fragment is stored respectively into the second block chain;
The second block chain, for storing the target hash after the fragment.
In another aspect, this specification one or more embodiment provides a kind of block chain data processing equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed Manage device:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, is obscured At least one target hash afterwards;
Fragment processing is carried out at least one described target hash;
Target hash after fragment is stored respectively into the second block chain.
In another aspect, the embodiment of the present application provides a kind of storage medium, for storing computer executable instructions, it is described can It executes instruction and realizes following below scheme when executed:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, is obscured At least one target hash afterwards;
Fragment processing is carried out at least one described target hash;
Target hash after fragment is stored respectively into the second block chain.
Using the technical solution of this specification one or more embodiment, by obtaining block record in the first block chain Multiple hash corresponding to multiple business datums, and according to it is preset obscure encryption mode to multiple hash into Row obscures encryption, at least one target hash after being obscured, and at least one target hash Fragment processing is carried out, and then the target hash after fragment is stored respectively into the second block chain.As it can be seen that the technical solution By obscuring multiple hash corresponding to multiple business datums, the target hash finally stored is used by outside Family access, but external user is difficult to analyze it to know the information such as transaction size, transaction magnitude.Therefore block is being ensured While data are really transparent in chain, additionally it is possible to the safety of data is ensured, to be conducive to user's energy when using block chain It is enough preferably to protect own service.
Detailed description of the invention
In order to illustrate more clearly of this specification one or more embodiment or technical solution in the prior art, below will A brief introduction will be made to the drawings that need to be used in the embodiment or the description of the prior art, it should be apparent that, it is described below Attached drawing is only some embodiments recorded in this specification one or more embodiment, and those of ordinary skill in the art are come It says, without any creative labor, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the schematic flow chart according to a kind of block chain data processing method of one embodiment of this specification;
Fig. 2 is the schematic block diagram according to a kind of block chain data processing equipment of one embodiment of this specification;
Fig. 3 is the schematic block diagram according to a kind of block chain data processing system of one embodiment of this specification
Fig. 4 is the schematic block diagram according to a kind of block chain data processing equipment of one embodiment of this specification.
Specific embodiment
This specification one or more embodiment provides a kind of block chain data processing method, apparatus and system, to reality The purpose for ensuring the safety of data while block chain technology is used now.
In order to make those skilled in the art more fully understand the technical solution in this specification one or more embodiment, Below in conjunction with the attached drawing in this specification one or more embodiment, to the technology in this specification one or more embodiment Scheme is clearly and completely described, it is clear that and described embodiment is only this specification a part of the embodiment, rather than Whole embodiments.Based on this specification one or more embodiment, those of ordinary skill in the art are not making creativeness The model of this specification one or more embodiment protection all should belong in every other embodiment obtained under the premise of labour It encloses.
Fig. 1 is according to a kind of schematic flow chart of block chain data processing method of one embodiment of this specification, such as Fig. 1 It is shown, this method comprises:
S102 obtains multiple hash corresponding to multiple business datums of block record in the first block chain.
S104 obscures encryption mode and carries out obscuring encryption to multiple hash, mixed according to preset At least one target hash after confusing.
S106 carries out fragment processing at least one target hash.
S108 stores the target hash after fragment respectively into the second block chain.
In one embodiment, multiple hash corresponding to multiple business datums that block records in the first block chain Account book for the transaction recorded in the first block chain, which, which can be, only may have access to the node in the first block chain.It should Account book is stored after obscuring encryption to the second block chain, and the encrypted account book of obscuring stored in the second block chain can be with It is that may have access to external user.The external user such as public is made to may have access to the account book, on the one hand as a result, to ensure that data are true Transparent, on the other hand, what is obtained due to external user is account book after obscuring encryption, is difficult to obscuring encrypted account This is parsed to obtain the relevant information of true sale amount, has also ensured the safety of Transaction Information.
Above-mentioned technical proposal is by obscuring multiple hash corresponding to multiple business datums as a result, so that finally depositing The target hash of storage can be accessed by external user, but external user is difficult to analyze it to know transaction size, hand over The information such as easy magnitude.Therefore while data are really transparent in ensureing block chain, additionally it is possible to ensure the safety of data, thus Own service can preferably be protected when using block chain by being conducive to user.
It should be understood that in the embodiment of the present application, the encryption of obscuring to hash may include various ways.
Optionally, in one implementation, the content that multiple hash form can be subjected to Hash calculation and obtains one A hash.
For example, it is assumed that 4 in some block of block chain storages record corresponding hash be respectively HashA, HashB, HashC and HashD, then the hash HashABCD=Hash (HashA+HashB+HashC after obscuring encryption + HashD), wherein function Hash () indicates Hash calculation function, such as MD5, SHA-1, SHA-256, SHA-384 and SHA- 512, etc..In bit coin system, the hash algorithm used is SHA-256.
Optionally, in another implementation, the content that any one hash can be divided into multiple portions is distinguished again Hash calculation is carried out, the corresponding multiple hash of content of the multiple part are obtained.
For example, it is assumed that it is HashA that a storage in some block of block chain, which records corresponding hash, can incite somebody to action HashA splits into HashA1 and HashA2, then carries out Hash respectively and handles to get HashA1 '=Hash (HashA1) is arrived, HashA2 '=Hash (HashA2), HashA1 ' and HashA2 ' at this time, which obscure to HashA, to be obtained after encryption Hash.Certainly, HashA can also be split into 3 parts, 4 parts or even more parts, specifically split into how many a portions Point, how to split, is configurable.
Optionally, in another implementation, the content that multiple hash form can be separated into multiple portions Content, and Hash calculation is carried out respectively to the content of each part, obtain the corresponding multiple Hash of content of the multiple part Data.
For example, it is assumed that 4 in some block of block chain storages record corresponding hash be respectively HashA, HashB, HashC and HashD, the content HashABCD=(HashA+HashB+HashC+HashD) of composition;It can incite somebody to action HashABCD is divided into HashABCD1 and HashABCD2, then carries out Hash calculation respectively to HashABCD1 and HashABCD2 and obtain Hash (HashABCD1) and Hash (HashABCD2), Hash (HashABCD1) and Hash (HashABCD2) are multiple portion The corresponding multiple hash of content divided.
Furthermore, it is to be understood that the obfuscation schemes of the embodiment of the present application, can also carry out multilayer and obscure encryption, i.e., by one layer Obscure the hash after encryption, then carry out one or more layers obscure encryption.Different layers obscure encryption Algorithm, may be the same or different.
For example, it is assumed that 4 in some block of block chain storages record corresponding hash be respectively HashA, HashB, HashC and HashD, then first layer obscures the Hash information HashABCD=Hash (HashA+HashB after encryption +HashC+HashD);It is Hash (HashABCD1) and Hash that the second layer, which obscures the hash after encryption, (HashABCD2), wherein HashABCD=HashABCD1+HashABCD2.
Optionally, in another implementation, one or many fragment processing can be carried out to hash and/or is breathed out It is uncommon to calculate.Specifically, fragment processing only can be carried out to obtain target hash to hash, by fragment processing and can also breathe out The uncommon mode calculated, which combines, obscure encryption to hash to obtain target hash.
It is exemplified below and a kind of detailed obscures encryption mode.
Firstly, carrying out fragment processing to hash according to specified fragment rule, multiple first data slots are obtained.
Wherein, specifying fragment rule includes: that the rule of fragment is carried out according to specified data length;For example, specified data are long Degree is 64KB, then carries out fragment to hash according to the rule that each data slot size is 64KB;Alternatively, according to it is specified when The long rule for carrying out fragment;For example, it is 1 second a length of when specified, then fragment is carried out according to the hash of interior storage per second, it is such as current The hash stored in 1 second is a data slot, and the hash stored in lower 1 second is then next data slot.
Secondly, carrying out Hash calculation to each first data slot respectively, multiple second data slots are obtained.
Finally, obscuring encrypted target hash according to the determination of multiple second data slots.Specifically, can directly really Fixed second data slot is target hash, can also carry out one or many fragments to the second data slot again and handle And/or Hash calculation, finally obtain target hash.
In the present embodiment, lists and fragment processing is carried out, then to the data slice obtained after fragment to hash first Duan Jinhang Hash calculation obscures encryption mode.Clearly as obscuring the diversity of encryption mode, add by obscuring Close treated that target hash is difficult to be known by external user, it is thus ensured that the safety of target hash.
Certainly, except it is above-mentioned enumerate obscure encryption mode in addition to, other also can be used and a variety of obscures encryption side Formula carries out hash to obscure encryption, handles the mode combined with multiple Hash calculation including multiple fragment, and more The sequence of secondary fragment processing and multiple Hash calculation is not limited.The number of fragment processing and/or Hash calculation is more, that is, obscures Encryption mode is more complicated, and the safety of obtained target hash is also higher.
In one embodiment, before hash corresponding to the business datum recorded in obtaining the first block chain, It can first determine that the data of the first block chain check that permission is only to first designated user's group as it can be seen that as only in the first block chain Each node is visible;And determine that the data of the second block chain check that permission is to all users as it can be seen that as the external user such as public is equal It may have access to the data.
Wherein, first designated user's group can be a user or multiple users.
In the present embodiment, since the first block chain is only to first designated user's group as it can be seen that other external users are invisible, because Multiple hash corresponding to multiple business datums of block storage are difficult to be known by external user in this first block chain, from And ensure the safety of multiple hash corresponding to multiple business datums;Further, since the second block chain is to all users As it can be seen that i.e. all users can know the encrypted target hash of obscuring stored in the second block chain, therefore ensure The transparent authenticity of data in block chain, and even if external user to have known obscuring of storing in the second block chain encrypted Target hash obscures encryption mode due to not knowing that target hash is corresponding, can not also know business The truthful data of data, so that it is guaranteed that the safety of business datum, being conducive to user can preferably be protected when using block chain Protect own service.
In one embodiment, at least one encrypted target hash will be obscured to store into the second block chain When, fragment processing first can be carried out to obscuring encrypted at least one target hash, and then by the target Hash after fragment Data are stored respectively into the second block chain.
In the present embodiment, target hash included in the corresponding each fragment of fragment processing not more than predetermined Number, wherein the total length of predetermined number target hash should be no more than the maximum of block record data in the second block chain Length.It therefore, can be according in each fragment when to encrypted at least one target hash progress fragment processing is obscured Mode comprising fixed quantity target hash carries out fragment, wherein fixed quantity should be not more than predetermined number.
In the present embodiment, after obscuring encrypted at least one target hash progress fragment processing, obtain multiple Fragment.It therefore, can will be included in each fragment when the target hash after fragment is stored respectively into the second block chain Target hash is respectively as a business record storage into the second block chain.
In one embodiment, it can will obscure encryption mode to store into third block chain, and determine third block The data of chain check that permission is only visible to the second designated user group.
Wherein, second designated user's group can be a user or multiple users.Second designated user's group can refer to first It is identical or different to determine user group (i.e. for the first visible user group of block chain).Second designated user's group can be and the firstth area The relevant staff of data stored in block chain/second block chain, such as the maintenance personnel of block chain, being somebody's turn to do (a little) user can be right The hash stored in first block chain/second block chain is managed, such as storage, update operation;Alternatively, being somebody's turn to do (a little) User can also be managed the encryption mode of obscuring stored in third block chain, such as storage, modification operation.
It in the present embodiment, is individually stored by the way that encryption mode will be obscured into third block chain, so that second is specified User group, which is conveniently known, obscures encryption mode, to obscure encryption mode by acquisition to obtain the true of business datum Real data.Also, it is external since third block chain is only to second designated user's group as it can be seen that other external users are invisible User is difficult to know that is stored in third block chain obscures encryption mode, to be difficult to know the true number of business datum According to, it is ensured that the safety of business datum.
In one embodiment, can also will obscure encryption mode to store into the first block chain, due to the first block Chain is only to first designated user's group as it can be seen that other external users are invisible, therefore what is stored in the first block chain obscures at encryption Reason mode is difficult to be known by external user, so that external user be made to be difficult to know the truthful data of business datum, it is ensured that business The safety of data.
In the present embodiment, encryption mode hash corresponding with business datum will be obscured and be collectively stored in the firstth area In the chain of domain, the safety of business datum not only can ensure that, moreover it is possible to which saving obscures encryption mode to the occupancy of block chain.
To sum up, the specific embodiment of this theme is described.Other embodiments are in the appended claims In range.In some cases, the movement recorded in detail in the claims can execute and still in a different order Desired result may be implemented.In addition, process depicted in the drawing not necessarily requires the particular order shown or continuous suitable Sequence, to realize desired result.In some embodiments, multitasking and parallel processing can be advantageous.
The above are the block chain data processing methods that this specification one or more embodiment provides, and are thought based on same Road, this specification one or more embodiment also provide a kind of block chain data processing equipment.
Fig. 2 is according to a kind of schematic block diagram of block chain data processing equipment of one embodiment of this specification, such as Fig. 2 institute Show, block chain data processing equipment 200 includes:
Module 210 is obtained, for obtaining multiple Kazakhstan corresponding to multiple business datums that block records in the first block chain Uncommon data;
Module 220 is obscured, for obscuring encryption mode according to preset and carrying out obscuring encryption to multiple hash Processing, at least one target hash after being obscured;
Fragment module 230, for carrying out fragment processing at least one described target hash;
First memory module 240, for being stored the target hash after fragment respectively into the second block chain.
In one embodiment, obscuring module 220 includes:
Computing unit obtains at least one target for carrying out Hash calculation at least once to each hash respectively Hash.
In one embodiment, it is not more than predetermined to handle target hash included in corresponding each fragment for fragment Number.
In one embodiment, the first memory module 240 includes:
Storage unit, for being arrived target hash included in each fragment as a business record storage In second block chain.
In one embodiment, device 200 further include:
First determining module, for multiple corresponding to multiple business datums of block record in obtaining the first block chain Before hash, determine that the data of the first block chain check that permission is only visible to the first designated user group;And determine second The data of block chain check that permission is visible to all users.
In one embodiment, device 200 further include:
Storage and determining module, store for that will obscure encryption mode into third block chain;And determine third area The data of block chain check that permission is only visible to the second designated user group.
Using the device of this specification one or more embodiment, recorded by block in the first block chain of acquisition multiple Multiple hash corresponding to business datum, and obscure encryption mode according to preset multiple hash are mixed Confuse encryption, at least one target hash after being obscured, and at least one target hash is carried out Fragment processing, and then the target hash after fragment is stored respectively into the second block chain.As it can be seen that the technical solution passes through Obscure multiple hash corresponding to multiple business datums, the target hash finally stored is visited by external user It asks, but external user is difficult to analyze it to know the information such as transaction size, transaction magnitude.Therefore in ensureing block chain While data are really transparent, additionally it is possible to the safety of data is ensured, so that being conducive to user can be more when using block chain Protect own service well.
It should be understood that above-mentioned block chain data processing equipment can be previously described for realizing Block chain data processing method, datail description therein should be described with method part above it is similar, it is cumbersome to avoid, it is not another herein It repeats.
Based on same thinking, this specification one or more embodiment also provides a kind of block chain data processing system.
Fig. 3 is according to a kind of schematic block diagram of block chain data processing system of one embodiment of this specification, such as Fig. 3 institute Show, block chain data processing system 300 includes the first block chain 310, data processing node 320 and the second block chain 330;Its In:
First block chain 310, for recording multiple hash corresponding to multiple business datums;
Data processing node 320, for obtaining multiple hash that block records in the first block chain 310;
Data processing node 320 is also used to obscure encryption mode according to preset and mix multiple hash Confuse encryption, at least one target hash after being obscured;At least one target hash is carried out at fragment Reason;Target hash after fragment is stored respectively into the second block chain 330;
Second block chain 330, for storing the target hash after fragment.
In one embodiment, data processing node 320 is also used to:
Hash calculation at least once is carried out to each hash respectively, obtains at least one target hash.
In one embodiment, it is not more than predetermined to handle target hash included in corresponding each fragment for fragment Number.
In one embodiment, data processing node 320 is also used to:
It stores target hash included in each fragment as a business record to described second In block chain.
In one embodiment, data processing node 320 is also used to:
Determine that the data of the first block chain check that permission is only visible to the first designated user group;And determine the second block The data of chain check that permission is visible to all users.
In one embodiment, system 300 further include:
Third block chain obscures encryption mode for storing;
Correspondingly, data processing node 320, is also used to determine that third block chain data check that permission is only specified to second User group is visible.
Using the system of this specification one or more embodiment, recorded by block in the first block chain of acquisition multiple Multiple hash corresponding to business datum, and obscure encryption mode according to preset multiple hash are mixed Confuse encryption, at least one target hash after being obscured, and at least one target hash is carried out Fragment processing, and then the target hash after fragment is stored respectively into the second block chain.As it can be seen that the technical solution passes through Obscure multiple hash corresponding to multiple business datums, the target hash finally stored is visited by external user It asks, but external user is difficult to analyze it to know the information such as transaction size, transaction magnitude.Therefore in ensureing block chain While data are really transparent, additionally it is possible to the safety of data is ensured, so that being conducive to user can be more when using block chain Protect own service well.
It should be understood that above-mentioned block chain data processing system can be previously described for realizing Block chain data processing method, datail description therein should be described with method part above it is similar, it is cumbersome to avoid, it is not another herein It repeats.
Based on same thinking, this specification one or more embodiment also provides a kind of block chain data processing equipment, As shown in Figure 4.Block chain data processing equipment can generate bigger difference because configuration or performance are different, may include one Or more than one processor 401 and memory 402, it can store one or more storage applications in memory 402 Program or data.Wherein, memory 402 can be of short duration storage or persistent storage.The application program for being stored in memory 402 can To include one or more modules (diagram is not shown), each module may include in block chain data processing equipment Series of computation machine executable instruction.Further, processor 401 can be set to communicate with memory 402, in block chain The series of computation machine executable instruction in memory 402 is executed on data processing equipment.Block chain data processing equipment may be used also To include one or more power supplys 403, one or more wired or wireless network interfaces 404, one or one with Upper input/output interface 405, one or more keyboards 406.
Specifically in the present embodiment, block chain data processing equipment includes memory and one or more Program, perhaps more than one program is stored in memory and one or more than one program may include one for one of them A or more than one module, and each module may include executable to the series of computation machine in block chain data processing equipment Instruction, and be configured to execute this or more than one program by one or more than one processor to include for carrying out Following computer executable instructions:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, is obscured At least one target hash afterwards;
Fragment processing is carried out at least one described target hash;
Target hash after the fragment is stored respectively into the second block chain.
Optionally, computer executable instructions when executed, can also make the processor:
Hash calculation at least once is carried out to each hash respectively, obtains at least one described target Hash number According to.
Optionally, the fragment handles target hash included in corresponding each fragment not more than predetermined Number.Optionally, computer executable instructions when executed, can also make the processor:
It stores target hash included in each fragment as a business record to described second In block chain.
Optionally, computer executable instructions when executed, can also make the processor:
In obtaining the first block chain before multiple hash corresponding to multiple business datums of block record, determine The data of the first block chain check that permission is only visible to the first designated user group;And determine the second block chain Data check that permission is visible to all users.
Optionally, computer executable instructions when executed, can also make the processor:
Obscure encryption mode by described and store into third block chain;And determine the data of the third block chain Check that permission is only visible to the second designated user group.
This specification one or more embodiment also proposed a kind of computer readable storage medium, this is computer-readable to deposit Storage media stores one or more programs, which includes instruction, and it is included multiple application programs which, which works as, Electronic equipment when executing, the electronic equipment can be made to execute above-mentioned block chain data processing method, and be specifically used for executing:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, is obscured At least one target hash afterwards;
Fragment module, for carrying out fragment processing at least one described target hash;
Target hash after the fragment is stored respectively into the second block chain.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when specification one or more embodiment.
It should be understood by those skilled in the art that, this specification one or more embodiment can provide for method, system or Computer program product.Therefore, complete hardware embodiment can be used in this specification one or more embodiment, complete software is implemented The form of example or embodiment combining software and hardware aspects.Moreover, this specification one or more embodiment can be used one It is a or it is multiple wherein include computer usable program code computer-usable storage medium (including but not limited to disk storage Device, CD-ROM, optical memory etc.) on the form of computer program product implemented.
This specification one or more embodiment is referring to according to the method for the embodiment of the present application, equipment (system) and meter The flowchart and/or the block diagram of calculation machine program product describes.It should be understood that can be realized by computer program instructions flow chart and/ Or the combination of the process and/or box in each flow and/or block and flowchart and/or the block diagram in block diagram.It can These computer program instructions are provided at general purpose computer, special purpose computer, Embedded Processor or other programmable datas The processor of equipment is managed to generate a machine, so that holding by the processor of computer or other programmable data processing devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
This specification one or more embodiment can computer executable instructions it is general on It hereinafter describes, such as program module.Generally, program module includes executing particular task or realization particular abstract data type Routine, programs, objects, component, data structure etc..The application can also be practiced in a distributed computing environment, at these In distributed computing environment, by executing task by the connected remote processing devices of communication network.In distributed computing In environment, program module can be located in the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The foregoing is merely this specification one or more embodiments, are not limited to this specification.For this For the technical staff of field, this specification one or more embodiment can have various modifications and variations.It is all in this specification one Any modification, equivalent replacement, improvement and so within the spirit and principle of a or multiple embodiments, should be included in this explanation Within the scope of the claims of book one or more embodiment.

Claims (10)

1. a kind of block chain data processing method, comprising:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, after being obscured At least one target hash;
Fragment processing is carried out at least one described target hash;
Target hash after fragment is stored respectively into the second block chain.
2. according to the method described in claim 1, described obscure encryption mode to the multiple Hash number according to preset According to carrying out obscuring encryption, at least one target hash after being obscured, comprising:
Hash calculation at least once is carried out to each hash respectively, obtains at least one described target hash.
3. according to the method described in claim 2, the fragment handles target Hash number included in corresponding each fragment According to not more than predetermined number.
4. according to the method described in claim 3, the target hash by after fragment is stored respectively to the second block chain In, comprising:
It stores target hash included in each fragment as a business record to second block In chain.
5. according to the method described in claim 1, in obtaining the first block chain corresponding to multiple business datums of block record Multiple hash before, further includes:
Determine that the data of the first block chain check that permission is only visible to the first designated user group;And determine described second The data of block chain check that permission is visible to all users.
6. according to the method described in claim 1, further include:
Obscure encryption mode by described and store into third block chain;And determine that the data of the third block chain are checked Permission is only visible to the second designated user group.
7. a kind of block chain data processing equipment, comprising:
Module is obtained, for obtaining multiple hash corresponding to multiple business datums that block records in the first block chain;
Module is obscured, for obscuring encryption mode according to preset and obscure at encryption to the multiple hash Reason, at least one target hash after being obscured;
Fragment module, for carrying out fragment processing at least one described target hash;
First memory module, for being stored the target hash after fragment respectively into the second block chain.
8. a kind of block chain data processing system, including the first block chain, data processing node and the second block chain;Wherein:
The first block chain, for recording multiple hash corresponding to multiple business datums;
The data processing node, for obtaining the multiple hash that block records in the first block chain;
The data processing node is also used to obscure encryption mode according to preset and mix the multiple hash Confuse encryption, at least one target hash after being obscured;At least one described target hash is divided Piece processing;Target hash after fragment is stored respectively into the second block chain;
The second block chain, for storing the target hash after the fragment.
9. a kind of block chain data processing equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processing when executed Device:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, after being obscured At least one target hash;
Fragment processing is carried out at least one described target hash;
Target hash after fragment is stored respectively into the second block chain.
10. a kind of storage medium, for storing computer executable instructions, the executable instruction is realized following when executed Process:
Obtain multiple hash corresponding to multiple business datums that block records in the first block chain;
Obscure encryption mode according to preset the multiple hash is carried out to obscure encryption, after being obscured At least one target hash;
Fragment processing is carried out at least one described target hash;
Target hash after fragment is stored respectively into the second block chain.
CN201811605307.9A 2018-12-26 2018-12-26 Block chain data processing method, device and system Active CN110033261B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201811605307.9A CN110033261B (en) 2018-12-26 2018-12-26 Block chain data processing method, device and system
CN202110949513.7A CN113689213A (en) 2018-12-26 2018-12-26 Block chain data processing method, device and system
TW108137259A TWI724579B (en) 2018-12-26 2019-10-16 Block chain data processing method, device, system, processing equipment and storage medium
PCT/CN2019/119312 WO2020134712A1 (en) 2018-12-26 2019-11-19 Blockchain data processing method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811605307.9A CN110033261B (en) 2018-12-26 2018-12-26 Block chain data processing method, device and system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202110949513.7A Division CN113689213A (en) 2018-12-26 2018-12-26 Block chain data processing method, device and system

Publications (2)

Publication Number Publication Date
CN110033261A true CN110033261A (en) 2019-07-19
CN110033261B CN110033261B (en) 2021-07-13

Family

ID=67235444

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202110949513.7A Pending CN113689213A (en) 2018-12-26 2018-12-26 Block chain data processing method, device and system
CN201811605307.9A Active CN110033261B (en) 2018-12-26 2018-12-26 Block chain data processing method, device and system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202110949513.7A Pending CN113689213A (en) 2018-12-26 2018-12-26 Block chain data processing method, device and system

Country Status (3)

Country Link
CN (2) CN113689213A (en)
TW (1) TWI724579B (en)
WO (1) WO2020134712A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111064579A (en) * 2019-12-11 2020-04-24 北京金汤科技有限公司 Block chain-based secure multi-party computing method, system and storage medium
WO2020134712A1 (en) * 2018-12-26 2020-07-02 阿里巴巴集团控股有限公司 Blockchain data processing method, device and system
CN112468577A (en) * 2020-11-25 2021-03-09 上海欧冶金融信息服务股份有限公司 Data controllable sharing method and system based on data mapping relation
CN114153836A (en) * 2021-07-15 2022-03-08 北京天德科技有限公司 Encryption fragment reorganization data storage method and system based on block chain
CN117216158A (en) * 2023-08-22 2023-12-12 天云融创数据科技(北京)有限公司 Data management method and device

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112685767B (en) * 2020-12-25 2024-03-26 联想(北京)有限公司 Data processing method and system based on block chain
CN112685775A (en) * 2020-12-29 2021-04-20 北京八分量信息科技有限公司 Method and device for monitoring data leakage prevention in block chain system and related products
CN113570144B (en) * 2021-07-30 2024-01-23 华北电力科学研究院有限责任公司 Power consumption information processing method and device
CN116933331B (en) * 2023-07-28 2024-02-06 三峡高科信息技术有限责任公司 Multithreaded file hash method based on wasm and web worker

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090089012A1 (en) * 2007-09-28 2009-04-02 Atienza Genevieve R FTIR and EDX spectrum library of contaminants found on a HDD and their potential sources
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN108664223A (en) * 2018-05-18 2018-10-16 百度在线网络技术(北京)有限公司 A kind of distributed storage method, device, computer equipment and storage medium
CN108768663A (en) * 2018-05-31 2018-11-06 中国地质大学(武汉) A kind of block chain access control method and its processing system
CN109063169A (en) * 2018-08-17 2018-12-21 福建省农村信用社联合社 A kind of customer data management system based on block chain

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201317823A (en) * 2011-10-31 2013-05-01 Chunghwa Telecom Co Ltd Cloud secured storage system
US20140281515A1 (en) * 2013-03-12 2014-09-18 Commvault Systems, Inc. Encrypted file presentation
US20160342989A1 (en) * 2015-05-21 2016-11-24 Mastercard International Incorporated Method and system for processing blockchain-based transactions on existing payment networks
US10157295B2 (en) * 2016-10-07 2018-12-18 Acronis International Gmbh System and method for file authenticity certification using blockchain network
CN106991334B (en) * 2016-11-24 2021-03-02 创新先进技术有限公司 Data access method, system and device
DE102016224533A1 (en) * 2016-12-08 2018-06-14 Bundesdruckerei Gmbh Bidirectionally linked blockchain structure
CN106941487B (en) * 2017-02-24 2021-01-05 创新先进技术有限公司 Data sending method and device
CN107332657A (en) * 2017-07-21 2017-11-07 广州智慧城市发展研究院 A kind of encryption method and system based on block chain digital signature
CN108737068B (en) * 2018-04-13 2020-08-07 中国地质大学(武汉) Cryptocurrency transaction privacy protection method and system based on block chain
CN108648084B (en) * 2018-05-18 2022-01-04 百度在线网络技术(北京)有限公司 Data processing method, device and equipment of block chain network and storage medium
CN108681943B (en) * 2018-05-18 2022-07-12 百度在线网络技术(北京)有限公司 Data processing method, device and equipment of block chain network and storage medium
CN109034800A (en) * 2018-07-31 2018-12-18 杭州复杂美科技有限公司 A kind of privacy method of commerce, system and equipment
CN113689213A (en) * 2018-12-26 2021-11-23 创新先进技术有限公司 Block chain data processing method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090089012A1 (en) * 2007-09-28 2009-04-02 Atienza Genevieve R FTIR and EDX spectrum library of contaminants found on a HDD and their potential sources
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN108664223A (en) * 2018-05-18 2018-10-16 百度在线网络技术(北京)有限公司 A kind of distributed storage method, device, computer equipment and storage medium
CN108768663A (en) * 2018-05-31 2018-11-06 中国地质大学(武汉) A kind of block chain access control method and its processing system
CN109063169A (en) * 2018-08-17 2018-12-21 福建省农村信用社联合社 A kind of customer data management system based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
曹宁编写: "《实现Windows 2000 Professional和Server》", 31 March 2003, 北京希望电子出版社 *
鲍伶俐著: "《资本逻辑与经济空间生成及扩张机制》", 30 April 2017, 上海人民出版社 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020134712A1 (en) * 2018-12-26 2020-07-02 阿里巴巴集团控股有限公司 Blockchain data processing method, device and system
CN111064579A (en) * 2019-12-11 2020-04-24 北京金汤科技有限公司 Block chain-based secure multi-party computing method, system and storage medium
CN112468577A (en) * 2020-11-25 2021-03-09 上海欧冶金融信息服务股份有限公司 Data controllable sharing method and system based on data mapping relation
CN112468577B (en) * 2020-11-25 2021-11-02 上海欧冶金融信息服务股份有限公司 Data controllable sharing method and system based on data mapping relation
CN114153836A (en) * 2021-07-15 2022-03-08 北京天德科技有限公司 Encryption fragment reorganization data storage method and system based on block chain
CN117216158A (en) * 2023-08-22 2023-12-12 天云融创数据科技(北京)有限公司 Data management method and device

Also Published As

Publication number Publication date
CN113689213A (en) 2021-11-23
TWI724579B (en) 2021-04-11
WO2020134712A1 (en) 2020-07-02
TW202025032A (en) 2020-07-01
CN110033261B (en) 2021-07-13

Similar Documents

Publication Publication Date Title
CN110033261A (en) Block chain data processing method, apparatus and system
CN104205115B (en) Wipe algorithm using different safety and wipe the chunk from the association of different level of securitys from file
CN107196989B (en) A kind of processing method and processing device of service request
CN107392040A (en) A kind of method and device for checking of knowing together
CN109426732A (en) A kind of data processing method and device
CN110020544A (en) The Hash information processing method and system of record are stored in the block of block chain
CN108628611A (en) A kind of data calling method and data call device
CN109062582A (en) A kind of encryption method and device of application installation package
CN104298687B (en) A kind of hash partition management method and device
CN106033461A (en) Sensitive information query method and apparatus
CN110022315A (en) Weight management method, device and equipment in a kind of piece of chain type account book
CN110008743A (en) Data attribute identification method, device and equipment in a kind of piece of chain type account book
CN110175916A (en) Cash flow checking method and device
CN112100643B (en) Data processing method and device based on privacy protection and server
CN109934712A (en) Account checking method, account checking apparatus and electronic equipment applied to distributed system
CN110266494A (en) Time service authentication method, device and equipment in a kind of piece of chain type account book
CN109145625A (en) Processing method, device and the block chain data-storage system of policy information
CN105988911B (en) Trust chain is established in system log
CN109800582A (en) Multiparty data processing method, device and the equipment that can be traced to the source
CN106844288A (en) A kind of random string generation method and device
CN105224541B (en) Uniqueness control method, information storage means and the device of data
CN112597525B (en) Data processing method and device based on privacy protection and server
CN107122663A (en) A kind of detection method for injection attack and device
CN105204782B (en) A kind of method and device for realizing data storage
CN110347745A (en) Time service authentication method, device and the equipment of a kind of piece of chain type account book

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant