CN110601815A - Block chain data processing method and equipment - Google Patents

Block chain data processing method and equipment Download PDF

Info

Publication number
CN110601815A
CN110601815A CN201910878085.6A CN201910878085A CN110601815A CN 110601815 A CN110601815 A CN 110601815A CN 201910878085 A CN201910878085 A CN 201910878085A CN 110601815 A CN110601815 A CN 110601815A
Authority
CN
China
Prior art keywords
user
information
dna
target user
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910878085.6A
Other languages
Chinese (zh)
Other versions
CN110601815B (en
Inventor
潘成锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910878085.6A priority Critical patent/CN110601815B/en
Publication of CN110601815A publication Critical patent/CN110601815A/en
Application granted granted Critical
Publication of CN110601815B publication Critical patent/CN110601815B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Abstract

The embodiment of the application discloses a block chain data processing method and equipment, wherein the method comprises the following steps: acquiring sign materials of a target user, and acquiring DNA (deoxyribonucleic acid) information of the target user according to the sign materials; generating DNA characteristic data of a target user according to the DNA information; converting the DNA characteristic data into a hash value by adopting a hash algorithm, and taking the hash value as a private key of the target user; and encrypting the DNA information and the target user by adopting the private key of the target user to obtain a ciphertext, sending the ciphertext to a block chain node to enable the block chain node to generate a block corresponding to the ciphertext, and adding the block to a block chain. By the method and the device, the risk of information leakage can be reduced, and the data safety is improved.

Description

Block chain data processing method and equipment
Technical Field
The present application relates to the field of electronic technologies, and in particular, to a method and an apparatus for processing block chain data.
Background
With the rapid development of the internet, people enjoy the convenience of the internet, and meanwhile, the security problem of the internet is more and more emphasized. Particularly, the actions of hackers on the network of pretending to be legal users to receive or send data, and information receivers falsifying and tampering data occur occasionally, which brings huge hidden dangers to the lives of people. Through the blockchain technology, the security of data receiving or sending between users can be guaranteed, data falsification is prevented, but at present, private keys of users in a blockchain system are all randomly generated character strings, meanwhile, the private keys need to be stored by means of mnemonics and the like, the risk of information leakage still exists, and the security and privacy of user data cannot be guaranteed to be not threatened.
Disclosure of Invention
The embodiment of the application provides a block chain data processing method and device, which can reduce the risk of information leakage and improve the data security.
An aspect of the present application provides a method for processing block chain data, which may include:
acquiring sign materials of a target user, and acquiring DNA (deoxyribonucleic acid) information of the target user according to the sign materials;
generating DNA characteristic data of a target user according to the DNA information;
converting the DNA characteristic data into a hash value by adopting a hash algorithm, and taking the hash value as a private key of the target user;
and encrypting the DNA information and the target user by adopting the private key of the target user to obtain a ciphertext, sending the ciphertext to a block chain node to enable the block chain node to generate a block corresponding to the ciphertext, and adding the block to a block chain.
The acquiring of the physical sign material of the target user and the acquiring of the DNA information of the target user according to the physical sign material includes:
acquiring physical sign materials of a target user, wherein the physical sign materials comprise blood, hair and living cells;
and extracting chromosome information in the physical sign material, and acquiring DNA information of a target user according to the chromosome information.
Wherein the generating of the DNA feature data of the target user according to the DNA information comprises:
acquiring all base pairs in the DNA information of the target user;
generating DNA characteristic data according to the arrangement sequence of the base pairs and the coding information corresponding to the base pairs; the coding information of the base pairs is preset, and the coding information corresponds to the base pairs one by one.
The converting the DNA feature data into a hash value by using a hash algorithm, and using the hash value as a private key of the target user includes:
filling information into the DNA characteristic data to generate preprocessed information, and processing the preprocessed information by adopting a logic function corresponding to the hash algorithm to generate a hash value;
and taking the hash value as a private key of the first user.
The encrypting the DNA information and the target user by adopting the private key of the target user to obtain a ciphertext, and sending the ciphertext to the block chain node comprises the following steps:
encrypting the private key of the target user by adopting an asymmetric encryption algorithm to generate a public key of the target user;
and encrypting the DNA information and the target user by adopting the public key of the target user to generate a ciphertext, and sending the ciphertext to the block chain node.
Wherein, still include:
acquiring a first block corresponding to a first user from a block chain node, and acquiring a first ciphertext obtained by encrypting DNA information of the first user from the first block;
acquiring a second block corresponding to a second user from the block chain node, and acquiring a second ciphertext obtained by encrypting the DNA information of the second user from the second block;
and determining the matching degree between the DNA information of the first user and the DNA information of the second user according to the first ciphertext and the second ciphertext.
Wherein, the determining the matching degree between the DNA information of the first user and the DNA information of the second user according to the first ciphertext and the second ciphertext comprises:
decrypting the first ciphertext by using the private key of the first user to obtain DNA information of the first user; the private key of the first user is generated by adopting DNA characteristic data of the first user;
decrypting the second ciphertext by using the private key of the second user to obtain DNA information of the second user; the private key of the second user is generated by adopting DNA characteristic data of the second user;
acquiring a first base pair arrangement sequence in the DNA information of the first user and a second base pair arrangement sequence in the DNA information of the second user, and determining the similarity between the first base pair arrangement sequence and the second base pair arrangement sequence as the matching degree between the DNA information of the first user and the DNA information of the second user.
An aspect of an embodiment of the present application provides a data processing apparatus, which may include:
the information acquisition unit is used for acquiring physical sign materials of a target user and acquiring DNA information of the target user according to the physical sign materials;
the characteristic generating unit is used for generating DNA characteristic data of a target user according to the DNA information;
the hash conversion unit is used for converting the DNA characteristic data into a hash value by adopting a hash algorithm, and taking the hash value as a private key of the target user;
and the information encryption unit is used for encrypting the DNA information and the target user by adopting a private key of the target user to obtain a ciphertext, sending the ciphertext to a block chain node to enable the block chain node to generate a block corresponding to the ciphertext, and adding the block to the block chain.
The information acquisition unit is specifically configured to:
acquiring physical sign materials of a target user, wherein the physical sign materials comprise blood, hair and living cells;
and extracting chromosome information in the physical sign material, and acquiring DNA information of a target user according to the chromosome information.
Wherein the feature generation unit is specifically configured to:
acquiring all base pairs in the DNA information of the target user;
generating DNA characteristic data according to the arrangement sequence of the base pairs and the coding information corresponding to the base pairs; the coding information of the base pairs is preset, and the coding information corresponds to the base pairs one by one.
Wherein the hash conversion unit is specifically configured to:
filling information into the DNA characteristic data to generate preprocessed information, and processing the preprocessed information by adopting a logic function corresponding to the hash algorithm to generate a hash value;
and taking the hash value as a private key of the first user.
Wherein the information encryption unit is specifically configured to:
encrypting the private key of the target user by adopting an asymmetric encryption algorithm to generate a public key of the target user;
and encrypting the DNA information and the target user by adopting the public key of the target user to generate a ciphertext, and sending the ciphertext to the block chain node.
Wherein, still include:
the first ciphertext obtaining unit is used for obtaining a first block corresponding to a first user from block link points and obtaining a first ciphertext obtained by encrypting DNA information of the first user from the first block;
the second ciphertext obtaining unit is used for obtaining a second block corresponding to a second user from the block link points and obtaining a second ciphertext obtained by encrypting the DNA information of the second user from the second block;
and the matching unit is used for determining the matching degree between the DNA information of the first user and the DNA information of the second user according to the first ciphertext and the second ciphertext.
Wherein the matching unit is specifically configured to:
decrypting the first ciphertext by using the private key of the first user to obtain DNA information of the first user; the private key of the first user is generated by adopting DNA characteristic data of the first user;
decrypting the second ciphertext by using the private key of the second user to obtain DNA information of the second user; the private key of the second user is generated by adopting DNA characteristic data of the second user;
acquiring a first base pair arrangement sequence in the DNA information of the first user and a second base pair arrangement sequence in the DNA information of the second user, and determining the similarity between the first base pair arrangement sequence and the second base pair arrangement sequence as the matching degree between the DNA information of the first user and the DNA information of the second user.
An aspect of the embodiments of the present application provides a computer storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform the above-mentioned method steps.
An aspect of the embodiments of the present application provides a computer device, including a memory and a processor, where the memory stores a computer program, and the computer program, when executed by the processor, causes the processor to execute the above method steps.
In the embodiment of the application, by obtaining the physical sign material of the target user, the DNA information of the target user is obtained according to the physical sign material; generating DNA characteristic data of a target user according to the DNA information; converting the DNA characteristic data into a hash value by adopting a hash algorithm, and taking the hash value as a private key of the target user; and encrypting the DNA information and the target user by adopting the private key of the target user to obtain a ciphertext, sending the ciphertext to a block chain node to enable the block chain node to generate a block corresponding to the ciphertext, and adding the block to a block chain. The DNA information of the user is generated into the private key of the user, and the biological characteristic information of the user is associated with the private key, so that the risk of information leakage is reduced, and the safety of user data is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1a is a system architecture diagram of a data processing system according to an embodiment of the present application;
fig. 1b is a schematic view of a distributed system provided in an embodiment of the present application;
fig. 1c is a schematic structural diagram of a block structure according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a data processing method according to an embodiment of the present application;
fig. 3a is a schematic flowchart of a data processing method according to an embodiment of the present application;
fig. 3b is a schematic view of a data processing method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1a is a block diagram of a data processing system according to an embodiment of the present invention. The block chain network 10h establishes a connection with a user terminal cluster through a communication bus 10d, and the user terminal cluster may include: user terminal 10a, user terminal 10 b. The block chain network 10h is connected with the service server 10e, the user terminal cluster and the service server 10e can synchronize data to the block chain network 10h, the block chain network 10h comprises block chain nodes 10f, 10. The method comprises the steps that a user terminal obtains physical sign materials of a target user, wherein the physical sign materials can be blood, hair and living cells of the target user, DNA information of the target user is obtained according to the physical sign materials, and DNA characteristic data of the target user is generated according to the DNA information; the user terminal adopts a Hash algorithm to convert the DNA characteristic data into a Hash value, the Hash value is used as a private key of the target user, DNA information of different users is different, the Hash value generated according to the DNA information is also different, therefore, the Hash value used as the private key of the target user is unique, the user terminal adopts the private key of the target user to encrypt the DNA information and the target user to obtain a ciphertext, the ciphertext is sent to a block chain node to enable the block chain node to generate a block corresponding to the ciphertext, the block is added into a block chain, the target user can also check the DNA information of the target user through the user terminal, specifically, the user terminal can obtain a first block corresponding to the user from the block chain node, obtain a first ciphertext obtained by encrypting the DNA information of the target user from the first block, and decrypt the first ciphertext by adopting the private key of the target user, and obtaining the DNA information of the target user.
The user terminal related to the embodiment of the application comprises: terminal equipment such as panel computer, smart mobile phone, notebook computer, palm computer.
The block chain related in the embodiment of the application is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
The platform product service layer provides basic capability and an implementation framework of typical application, and developers can complete block chain implementation of business logic based on the basic capability and the characteristics of the superposed business. The application service layer provides the application service based on the block chain scheme for the business participants to use.
The following description will be made with reference to fig. 1b and fig. 1c for a specific implementation scenario provided in the embodiments of the present application. The blockchain network related to the embodiment of the present invention may be a distributed system formed by connecting clients, a plurality of nodes (any form of computing devices in an access network, such as servers and user terminals) through a network communication form.
Taking a distributed system as an example of a blockchain system, referring to fig. 1b, fig. 1b is an optional structural schematic diagram of a blockchain system to which the distributed system 100 provided by the embodiment of the present invention is applied, where the blockchain system is formed by a plurality of nodes (computing devices in any form in an access network, such as servers and user terminals) and clients, and a Peer-to-Peer (P2P, Peerto Peer) network is formed between the nodes, and a P2P protocol is an application layer protocol operating on a Transmission Control Protocol (TCP). In a distributed system, any machine, such as a server or a terminal, can join to become a node, and the node comprises a hardware layer, a middle layer, an operating system layer and an application layer.
Referring to the functions of each node in the blockchain system shown in fig. 1b, the functions involved include:
1) routing, a basic function that a node has, is used to support communication between nodes.
Besides the routing function, the node may also have the following functions:
2) the application is used for being deployed in a block chain, realizing specific services according to actual service requirements, recording data related to the realization functions to form recording data, carrying a digital signature in the recording data to represent a source of task data, and sending the recording data to other nodes in the block chain system, so that the other nodes add the recording data to a temporary block when the source and integrity of the recording data are verified successfully.
For example, the services implemented by the application include:
2.1) wallet, for providing the function of transaction of electronic money, including initiating transaction (i.e. sending the transaction record of current transaction to other nodes in the blockchain system, after the other nodes are successfully verified, storing the record data of transaction in the temporary blocks of the blockchain as the response of confirming the transaction is valid; of course, the wallet also supports the querying of the remaining electronic money in the electronic money address;
and 2.2) sharing the account book, wherein the shared account book is used for providing functions of operations such as storage, query and modification of account data, record data of the operations on the account data are sent to other nodes in the block chain system, and after the other nodes verify the validity, the record data are stored in a temporary block as a response for acknowledging that the account data are valid, and confirmation can be sent to the node initiating the operations.
2.3) Intelligent contracts, computerized agreements, which can enforce the terms of a contract, implemented by codes deployed on a shared ledger for execution when certain conditions are met, for completing automated transactions according to actual business requirement codes, such as querying the logistics status of goods purchased by a buyer, transferring the buyer's electronic money to the merchant's address after the buyer signs for the goods; of course, smart contracts are not limited to executing contracts for trading, but may also execute contracts that process received information.
3) And the block chain comprises a series of blocks which are mutually connected according to the generated time sequence, the new blocks cannot be removed once being added into the block chain, and the blocks record the record data submitted by the nodes in the block chain system.
Referring to fig. 1c, fig. 1c is an optional schematic diagram of a Block Structure (Block Structure) according to an embodiment of the present invention, where each Block includes a hash value of a transaction record (hash value of the Block) stored in the Block and a hash value of a previous Block, and the blocks are connected by the hash value to form a Block chain. The block may include information such as a time stamp at the time of block generation. The blockchain is essentially a decentralized database, which is a string of data blocks associated by cryptographic methods, each data block containing relevant information for verifying the validity of the information (anti-counterfeiting) and generating the next block.
Referring to fig. 2, a flow chart of a data processing method according to an embodiment of the present application is schematically shown. As shown in fig. 2, the method of the embodiment of the present application may include the following steps S101 to S104.
S101, obtaining physical sign materials of a target user, and obtaining DNA information of the target user according to the physical sign materials;
specifically, the data processing device obtains a physical sign material of a target user, and obtains DNA information of the target user according to the physical sign material, it can be understood that the data processing device may be the user terminal in fig. 1a, the physical sign material is a substance including genetic information of the target user, and specifically may be blood, hair, and living cells of the target user, the data processing device obtains the DNA information of the target user according to the physical sign material, the DNA information is genetic information including the target user, and specifically, may extract chromosome information in the physical sign material, the chromosome information includes the DNA information, and obtains the DNA information of the target user according to the chromosome information.
S102, generating DNA characteristic data of a target user according to the DNA information;
specifically, the data processing device generates DNA feature data of the target user based on the DNA information, and it is understood that the DNA molecular structure is a double helix structure formed by two polydeoxynucleotide chains coiled around a common central axis. The deoxyribose-phosphate chains are arranged outside the spiral structure, the bases face to the inside, the two polydeoxyribonucleotide chains are in reverse complementation and are connected through base pairing formed by hydrogen bonds among the bases, the data processing equipment acquires the arrangement sequence of all the base pairs in the DNA information of the target user, and generates DNA characteristic data of the target user according to the arrangement sequence of the base pairs according to coding information corresponding to the base pairs, the coding information of the base pairs is preset, and the coding information corresponds to the base pairs one by one.
S103, converting the DNA characteristic data into a hash value by adopting a hash algorithm, and taking the hash value as a private key of the target user;
specifically, the data processing device adopts a hash algorithm to convert the DNA characteristic data into a hash value, and the hash value is used as a private key of the target user, it will be appreciated that the hashing algorithm is a process of converting an input of arbitrary length, through a hashing algorithm, into an output of fixed length, that is a hash value, a message digest function for compressing a message with any length to a fixed length, wherein the hash algorithm is an irreversible algorithm and comprises SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512, the data processing device generates a hash value with a fixed length from the DNA characteristic data through the hash algorithm, and using the hash value as the private key of the first user, wherein the DNA information of different users is different, the hash value generated from the DNA information is also different and therefore unique as the first user's private key.
S104, encrypting the DNA information and the target user by adopting the private key of the target user to obtain a ciphertext, sending the ciphertext to a block chain node to enable the block chain node to generate a block corresponding to the ciphertext, and adding the block to a block chain.
Specifically, the data processing device encrypts the DNA information and the target user by using the private key of the target user to obtain a ciphertext, and sends the ciphertext to a block chain node, so that the block chain node generates a block corresponding to the ciphertext, and adds the block to the block chain, it can be understood that the data processing device generates a public key of a first user by using an asymmetric encryption algorithm according to the private key of the first user, the public key is calculated by the private key, the public key cannot be calculated out by the public key, the public key of the first user is stored in a block network for full-network broadcasting, other users can obtain the public key of the first user, the data processing device encrypts the DNA information and the target user by using the public key of the first user to generate the ciphertext, and sends the ciphertext to the block chain node, and the encryption algorithm for encryption is an asymmetric encryption algorithm, the encryption algorithm comprises the following steps: and the block chain nodes generate blocks corresponding to the ciphertext according to the intelligent contract, and the blocks are added into the block chain.
In the embodiment of the application, by obtaining the physical sign material of the target user, the DNA information of the target user is obtained according to the physical sign material; generating DNA characteristic data of a target user according to the DNA information; converting the DNA characteristic data into a hash value by adopting a hash algorithm, and taking the hash value as a private key of the target user; and encrypting the DNA information and the target user by adopting the private key of the target user to obtain a ciphertext, sending the ciphertext to a block chain node to enable the block chain node to generate a block corresponding to the ciphertext, and adding the block to a block chain. The DNA information of the user is generated into the private key of the user, and the biological characteristic information of the user is associated with the private key, so that the risk of information leakage is reduced, and the safety of user data is improved.
Referring to fig. 3a, a schematic flow chart of a data processing method according to an embodiment of the present application is provided. As shown in fig. 3a, the method of the embodiment of the present application may include the following steps S201 to S207.
S201, obtaining physical sign materials of a target user, wherein the physical sign materials comprise blood, hair and living cells; and extracting chromosome information in the physical sign material, and acquiring DNA information of a target user according to the chromosome information.
Specifically, the data processing device acquires physical sign materials of a target user, wherein the physical sign materials comprise blood, hair and living cells; extracting chromosome information in the physical sign material, and acquiring DNA information of a target user according to the chromosome information, wherein the physical sign material is a substance containing genetic information of the target user, specifically blood, hair and living cells of the target user, the data processing device extracts the chromosome information in the physical sign material according to the physical sign material, the chromosome information comprises DNA information, the DNA information comprises the genetic information of the target user, and the DNA information of the target user is acquired according to the chromosome information.
S202, acquiring all base pairs in the DNA information of the target user; generating DNA characteristic data according to the arrangement sequence of the base pairs and the coding information corresponding to the base pairs; the coding information of the base pairs is preset, and the coding information corresponds to the base pairs one by one;
specifically, the data processing device acquires all base pairs in the DNA information of the target user; generating DNA characteristic data according to the arrangement sequence of the base pairs and the coding information corresponding to the base pairs; the encoding information of the base pairs is preset, the encoding information corresponds to the base pairs one to one, it can be understood that the data processing device acquires information of all the base pairs in the DNA information of the target user and an arrangement sequence in the DNA molecules of the base pairs, and generates DNA characteristic data of the target user according to the arrangement sequence of the base pairs according to the encoding information corresponding to the base pairs, the encoding information of the base pairs is preset, the encoding information corresponds to the base pairs one to one, the encoding information can be binary information corresponding to the base pairs, and specifically, different base pairs can be generated into corresponding binary sequences according to the preset encoding information.
S203, filling information into the DNA characteristic data to generate preprocessing information, and processing the preprocessing information by adopting a logic function corresponding to the hash algorithm to generate a hash value; and taking the hash value as a private key of the first user.
Specifically, the data processing device performs information filling on the DNA characteristic data to generate preprocessing information, and the preprocessing information is processed by adopting a logic function corresponding to the hash algorithm to generate a hash value; taking the hash value as the private key of the first user, it can be understood that, according to the packet length information corresponding to the hash algorithm, the data processing device performs information filling on the DNA characteristic data to an integer multiple corresponding to the packet length information to generate preprocessed information, performs grouping on the preprocessed information by using the packet length information, processes the grouped preprocessed information by using a logic function corresponding to the hash algorithm to generate a character string, connects the character strings generated by each grouped preprocessing to generate a hash value corresponding to the DNA characteristic data, and takes the hash value as the private key of the first user, where different hash algorithms may correspond to different packet length information, for example, the packet length information of SHA-256 is 512 bits.
S204, encrypting the private key of the target user by adopting an asymmetric encryption algorithm to generate a public key of the target user; and encrypting the DNA information and the target user by adopting the public key of the target user to generate a ciphertext, and sending the ciphertext to the block chain node.
Specifically, the data processing device encrypts the private key of the target user by adopting an asymmetric encryption algorithm to generate a public key of the target user; the public key of the target user is adopted to encrypt the DNA information and the target user to generate a ciphertext, and the ciphertext is sent to the blockchain node, it can be understood that the data processing device adopts an asymmetric encryption algorithm to generate the public key of the first user according to the private key of the first user, and the asymmetric encryption algorithm includes: the data processing device comprises an RSA encryption algorithm, an elliptic curve encryption algorithm and the like, wherein the asymmetric encryption algorithm is one-way irreversible, a public key is derived through the private key, the public key cannot be derived, the public key of a first user is stored in a block network for full-network broadcasting, other users can obtain the public key of the first user, the public key of the first user is adopted for data processing to encrypt DNA characteristic data to generate a ciphertext, the ciphertext is sent to a block chain node, the encryption algorithm for encryption processing is an asymmetric encryption algorithm, and the ciphertext can be decrypted through the private key of the first user to generate DNA characteristic data.
S205, acquiring a first block corresponding to a first user from a block chain node, and acquiring a first ciphertext obtained by encrypting DNA information of the first user from the first block;
specifically, the data processing apparatus obtains a first block corresponding to a first user from a block link point, and obtains a first ciphertext obtained by encrypting DNA information of the first user from the first block, where it can be understood that the block link point includes information of a plurality of blocks, the data processing apparatus obtains the block corresponding to the first user from the block link node, the first user is any user performing data uplink in a block link network, the block link node may include a plurality of blocks corresponding to the first user, and the block includes the DNA information of the first user and the ciphertext obtained by encrypting the first user.
S206, acquiring a second block corresponding to a second user from the block chain node, and acquiring a second ciphertext obtained by encrypting the DNA information of the second user from the second block;
specifically, the data processing apparatus obtains a second block corresponding to a second user from a block link point, and obtains a second ciphertext obtained by encrypting DNA information of the second user from the second block, where it can be understood that the block link point includes information of a plurality of blocks, the data processing apparatus obtains the block corresponding to the second user from the block link node, the second user is an arbitrary user performing data uplink in a block link network, the second user is different from the first user, the block link node may include a plurality of blocks corresponding to the second user, and the block includes the DNA information of the second user and the ciphertext obtained by encrypting the second user.
S207, determining the matching degree between the DNA information of the first user and the DNA information of the second user according to the first ciphertext and the second ciphertext.
Specifically, the data processing device determines the matching degree between the DNA information of the first user and the DNA information of the second user according to the first ciphertext and the second ciphertext, and it can be understood that the data processing device decrypts the first ciphertext and the second ciphertext respectively to generate corresponding DNA information, and determines the matching degree between the DNA information corresponding to the ciphertexts.
Determining the degree of matching between the DNA information may include the following steps S2071 to S2073.
S2071, decrypting the first ciphertext by using the private key of the first user to obtain the DNA information of the first user; the private key of the first user is generated by adopting DNA characteristic data of the first user;
s2072, decrypting the second ciphertext by using the private key of the second user to obtain the DNA information of the second user; the private key of the second user is generated by adopting DNA characteristic data of the second user;
s2073, obtaining a first base pair arrangement order in the DNA information of the first user and a second base pair arrangement order in the DNA information of the second user, and determining a similarity between the first base pair arrangement order and the second base pair arrangement order as a matching degree between the DNA information of the first user and the DNA information of the second user.
Specifically, the data processing apparatus obtains a first base pair arrangement order in the DNA information of the first user and a second base pair arrangement order in the DNA information of the second user, and determines a similarity between the first base pair arrangement order and the second base pair arrangement order as a matching degree between the DNA information of the first user and the DNA information of the second user, it is understood that the data processing apparatus calculates a base pair number in which both the arrangement order and the base pair type of the base pairs between the first base pair and the second base pair are the same, determines a similarity between the first base pair and the second base pair according to a ratio of the base pair number in a total base pair, and determines a matching degree between the DNA information of the first user and the DNA information of the second user, specifically, referring to fig. 3b, a scene diagram of a data processing method is provided for the present embodiment, as shown in fig. 3b, DNA information of a first user is extracted to generate DNA feature data, a private key and a public key of the first user are generated according to the DNA feature data, the public key of the first user is used to encrypt the DNA information of the first user to generate a ciphertext, the ciphertext is sent to a block chain node to be stored, the DNA information of a second user is stored in the block chain node in the same manner, a data processing device obtains the first ciphertext from the block chain node, decrypts the DNA of the first user according to the private key of the first user to obtain the DNA of the first user, obtains the second ciphertext from the block chain node, decrypts the DNA of the second user according to the private key of the second user to obtain the DNA of the second user, and the matching degree between the DNA information of the first user and the DNA information of the second user is determined. The matching degree can be used for detecting the relationship between the first user and the second user, and the DNA information of the user can be obtained only through the private key corresponding to the user, so that the safety of the private information of the user is ensured.
In the embodiment of the application, by obtaining the physical sign material of the target user, the DNA information of the target user is obtained according to the physical sign material; generating DNA characteristic data of a target user according to the DNA information; converting the DNA characteristic data into a hash value by adopting a hash algorithm, and taking the hash value as a private key of the target user; and encrypting the DNA information and the target user by adopting the private key of the target user to obtain a ciphertext, sending the ciphertext to a block chain node to enable the block chain node to generate a block corresponding to the ciphertext, and adding the block to a block chain. The DNA information of the user is generated into the private key of the user, and the biological characteristic information of the user is associated with the private key, so that the risk of information leakage is reduced, and the safety of user data is improved.
Referring to fig. 4, a schematic structural diagram of a data processing apparatus is provided in an embodiment of the present application. As shown in fig. 4, the block chain data processing apparatus 1 according to the embodiment of the present application may include: the device comprises an information acquisition unit 11, a feature generation unit 12, a hash conversion unit 13, an information encryption unit 14, a first ciphertext acquisition unit 15, a second ciphertext acquisition unit 16 and a matching unit 17.
The information acquisition unit 11 is configured to acquire a physical sign material of a target user, and acquire DNA information of the target user according to the physical sign material;
specifically, the information obtaining unit 11 obtains a physical sign material of a target user, and obtains DNA information of the target user according to the physical sign material, it can be understood that the physical sign material is a substance containing genetic information of the target user, specifically, blood, hair, and living cells of the target user, the data processing device obtains the DNA information of the target user according to the physical sign material, the DNA information is genetic information containing the target user, specifically, chromosome information in the physical sign material can be extracted, the chromosome information includes the DNA information, and the DNA information of the target user is obtained according to the chromosome information.
A feature generation unit 12, configured to generate DNA feature data of a target user according to the DNA information;
specifically, the feature generating unit 12 generates DNA feature data of the target user based on the DNA information, and it is understood that the DNA molecular structure is a double helix structure formed by two polydeoxynucleotide chains that are coiled around a common central axis. The deoxyribose-phosphate chains are arranged outside the spiral structure, the bases face to the inside, the two polydeoxyribonucleotide chains are in reverse complementation and are connected through base pairing formed by hydrogen bonds among the bases, the data processing equipment acquires the arrangement sequence of all the base pairs in the DNA information of the target user, and generates DNA characteristic data of the target user according to the arrangement sequence of the base pairs according to coding information corresponding to the base pairs, the coding information of the base pairs is preset, and the coding information corresponds to the base pairs one by one.
A hash conversion unit 13, configured to convert the DNA feature data into a hash value by using a hash algorithm, where the hash value is used as a private key of the target user;
specifically, the hash conversion unit 13 converts the DNA feature data into a hash value by using a hash algorithm, and uses the hash value as the private key of the target user, it will be appreciated that the hashing algorithm is a process of converting an input of arbitrary length, through a hashing algorithm, into an output of fixed length, that is a hash value, a message digest function for compressing a message with any length to a fixed length, wherein the hash algorithm is an irreversible algorithm and comprises SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512, the data processing device generates a hash value with a fixed length from the DNA characteristic data through the hash algorithm, and using the hash value as the private key of the first user, wherein the DNA information of different users is different, the hash value generated from the DNA information is also different and therefore unique as the first user's private key.
And the information encryption unit 14 is configured to encrypt the DNA information and the target user with the private key of the target user to obtain a ciphertext, send the ciphertext to a block chain node, so that the block chain node generates a block corresponding to the ciphertext, and add the block to the block chain.
Specifically, the information encryption unit 14 encrypts the DNA information and the target user by using the private key of the target user to obtain a ciphertext, and sends the ciphertext to a block chain node, so that the block chain node generates a block corresponding to the ciphertext, and adds the block to the block chain, it is understood that the information encryption unit 14 generates a public key of the first user by using an asymmetric encryption algorithm according to the private key of the first user, the public key is derived from the private key, the public key cannot be derived from the private key, the public key of the first user is stored in a block network for broadcast over the whole network, other users can obtain the public key of the first user, the data processing device encrypts the DNA information and the target user by using the public key of the first user to generate the ciphertext, and sends the ciphertext to the block chain node, and the encryption algorithm for encryption processing is an asymmetric encryption algorithm, the encryption algorithm comprises the following steps: and the block chain nodes generate blocks corresponding to the ciphertext according to the intelligent contract, and the blocks are added into the block chain.
A first ciphertext obtaining unit 15, configured to obtain a first block corresponding to a first user from block link points, and obtain a first ciphertext obtained by encrypting DNA information of the first user from the first block;
specifically, the first ciphertext obtaining unit 15 obtains a first block corresponding to a first user from a block chain node, and obtains a first ciphertext obtained by encrypting DNA information of the first user from the first block, where it is understood that the block chain node includes information of a plurality of blocks, the data processing apparatus obtains the block corresponding to the first user from the block chain node, the first user is an arbitrary user performing data uplink in a block chain network, the block chain node may include a plurality of blocks corresponding to the first user, and the block includes the DNA information of the first user and the ciphertext obtained by encrypting the first user.
A second ciphertext obtaining unit 16, configured to obtain a second block corresponding to the second user from the block chain node, and obtain a second ciphertext obtained by encrypting the DNA information of the second user from the second block;
specifically, the second ciphertext obtaining unit 16 obtains a second block corresponding to a second user from a block chain node, and obtains a second ciphertext obtained by encrypting DNA information of the second user from the second block, where it is understood that the block chain node includes information of a plurality of blocks, the data processing apparatus obtains the block corresponding to the second user from the block chain node, the second user is an arbitrary user performing data uplink in a block chain network, the second user is different from the first user, the block chain node may include a plurality of blocks corresponding to the second user, and the block includes the DNA information of the second user and the ciphertext obtained by encrypting the second user.
And the matching unit 17 is configured to determine, according to the first ciphertext and the second ciphertext, a matching degree between the DNA information of the first user and the DNA information of the second user.
Specifically, the matching unit 17 determines the matching degree between the DNA information of the first user and the DNA information of the second user according to the first ciphertext and the second ciphertext, and it can be understood that the data processing device decrypts the first ciphertext and the second ciphertext respectively to generate corresponding DNA information, and determines the matching degree between the DNA information corresponding to the ciphertexts.
In the embodiment of the application, by obtaining the physical sign material of the target user, the DNA information of the target user is obtained according to the physical sign material; generating DNA characteristic data of a target user according to the DNA information; converting the DNA characteristic data into a hash value by adopting a hash algorithm, and taking the hash value as a private key of the target user; and encrypting the DNA information and the target user by adopting the private key of the target user to obtain a ciphertext, sending the ciphertext to a block chain node to enable the block chain node to generate a block corresponding to the ciphertext, and adding the block to a block chain. The DNA information of the user is generated into the private key of the user, and the biological characteristic information of the user is associated with the private key, so that the risk of information leakage is reduced, and the safety of user data is improved.
Referring to fig. 5, a schematic structural diagram of a computer device is provided in an embodiment of the present application. As shown in fig. 5, the apparatus 1000 may include: at least one processor 1001, such as a CPU, at least one network interface 1004, a user interface 1003, memory 1005, at least one communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), and the optional user interface 1003 may also include a standard wired interface or a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1005 may optionally be at least one memory device located remotely from the processor 1001. As shown in fig. 5, the memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a data processing application program.
In the device 1000 shown in fig. 5, the network interface 1004 may provide a network communication function, and the user interface 1003 is mainly used as an interface for providing input for a user; the processor 1001 may be configured to call a data processing application stored in the memory 1005, so as to implement the description of the data processing method in the embodiment corresponding to any one of fig. 1a to fig. 3b, which is not described herein again.
It should be understood that the data processing apparatus 1000 described in this embodiment of the application may perform the description of the data processing method in the embodiment corresponding to any one of fig. 1a to fig. 3b, and may also perform the description of the apparatus in the embodiment corresponding to fig. 4, which is not described herein again. In addition, the beneficial effects of the same method are not described in detail.
Further, here, it is to be noted that: an embodiment of the present application further provides a computer-readable storage medium, where a computer program executed by the aforementioned device is stored in the computer-readable storage medium, and the computer program includes program instructions, and when the processor executes the program instructions, the method in any one of the embodiments corresponding to fig. 1a to fig. 3b can be executed, so that details are not repeated here. In addition, the beneficial effects of the same method are not described in detail. For technical details not disclosed in embodiments of the computer-readable storage medium referred to in the present application, reference is made to the description of embodiments of the method of the present application.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present application and is not to be construed as limiting the scope of the present application, so that the present application is not limited thereto, and all equivalent variations and modifications can be made to the present application.

Claims (10)

1. A method for processing blockchain data, comprising:
acquiring sign materials of a target user, and acquiring DNA (deoxyribonucleic acid) information of the target user according to the sign materials;
generating DNA characteristic data of a target user according to the DNA information;
converting the DNA characteristic data into a hash value by adopting a hash algorithm, and taking the hash value as a private key of the target user;
and encrypting the DNA information and the target user by adopting the private key of the target user to obtain a ciphertext, sending the ciphertext to a block chain node to enable the block chain node to generate a block corresponding to the ciphertext, and adding the block to a block chain.
2. The method according to claim 1, wherein the obtaining of the physical sign material of the target user and the obtaining of the DNA information of the target user according to the physical sign material comprise:
acquiring physical sign materials of a target user, wherein the physical sign materials comprise blood, hair and living cells;
and extracting chromosome information in the physical sign material, and acquiring DNA information of a target user according to the chromosome information.
3. The method of claim 1, wherein generating DNA characteristic data of a target user from the DNA information comprises:
acquiring all base pairs in the DNA information of the target user;
generating DNA characteristic data according to the arrangement sequence of the base pairs and the coding information corresponding to the base pairs; the coding information of the base pairs is preset, and the coding information corresponds to the base pairs one by one.
4. The method according to claim 1, wherein the converting the DNA feature data into a hash value by using a hash algorithm, and using the hash value as a private key of the target user comprises:
filling information into the DNA characteristic data to generate preprocessed information, and processing the preprocessed information by adopting a logic function corresponding to the hash algorithm to generate a hash value;
and taking the hash value as a private key of the first user.
5. The method of claim 1, wherein the encrypting the DNA information and the target user with the private key of the target user to obtain a ciphertext, and sending the ciphertext to a blockchain node comprises:
encrypting the private key of the target user by adopting an asymmetric encryption algorithm to generate a public key of the target user;
and encrypting the DNA information and the target user by adopting the public key of the target user to generate a ciphertext, and sending the ciphertext to the block chain node.
6. The method of claim 1, further comprising:
acquiring a first block corresponding to a first user from a block chain node, and acquiring a first ciphertext obtained by encrypting DNA information of the first user from the first block;
acquiring a second block corresponding to a second user from the block chain node, and acquiring a second ciphertext obtained by encrypting the DNA information of the second user from the second block;
and determining the matching degree between the DNA information of the first user and the DNA information of the second user according to the first ciphertext and the second ciphertext.
7. The method of claim 6, wherein determining the degree of match between the DNA information of the first user and the DNA information of the second user based on the first ciphertext and the second ciphertext comprises:
decrypting the first ciphertext by using the private key of the first user to obtain DNA information of the first user; the private key of the first user is generated by adopting DNA characteristic data of the first user;
decrypting the second ciphertext by using the private key of the second user to obtain DNA information of the second user; the private key of the second user is generated by adopting DNA characteristic data of the second user;
acquiring a first base pair arrangement sequence in the DNA information of the first user and a second base pair arrangement sequence in the DNA information of the second user, and determining the similarity between the first base pair arrangement sequence and the second base pair arrangement sequence as the matching degree between the DNA information of the first user and the DNA information of the second user.
8. A method for processing blockchain data, comprising:
the information acquisition unit is used for acquiring physical sign materials of a target user and acquiring DNA information of the target user according to the physical sign materials;
the characteristic generating unit is used for generating DNA characteristic data of a target user according to the DNA information;
the hash conversion unit is used for converting the DNA characteristic data into a hash value by adopting a hash algorithm, and taking the hash value as a private key of the target user;
and the information encryption unit is used for encrypting the DNA information and the target user by adopting a private key of the target user to obtain a ciphertext, sending the ciphertext to a block chain node to enable the block chain node to generate a block corresponding to the ciphertext, and adding the block to the block chain.
9. A computer storage medium, characterized in that the computer storage medium stores a computer program comprising program instructions which, when executed by a processor, perform the method according to any one of claims 1-7.
10. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method according to any one of claims 1 to 7.
CN201910878085.6A 2019-09-17 2019-09-17 Block chain data processing method and equipment Active CN110601815B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910878085.6A CN110601815B (en) 2019-09-17 2019-09-17 Block chain data processing method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910878085.6A CN110601815B (en) 2019-09-17 2019-09-17 Block chain data processing method and equipment

Publications (2)

Publication Number Publication Date
CN110601815A true CN110601815A (en) 2019-12-20
CN110601815B CN110601815B (en) 2021-09-10

Family

ID=68860388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910878085.6A Active CN110601815B (en) 2019-09-17 2019-09-17 Block chain data processing method and equipment

Country Status (1)

Country Link
CN (1) CN110601815B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112039893A (en) * 2020-08-31 2020-12-04 成都质数斯达克科技有限公司 Private transaction processing method and device, electronic equipment and readable storage medium
CN112202555A (en) * 2020-09-29 2021-01-08 平安科技(深圳)有限公司 Information processing method, device and equipment for generating random number based on attribute of information
CN112307500A (en) * 2020-11-02 2021-02-02 杭州甘道智能科技有限公司 Block chain-based vaccine circulation data encryption device and method
CN112398818A (en) * 2020-11-02 2021-02-23 深圳数联天下智能科技有限公司 Software activation method and related device thereof
CN113160888A (en) * 2020-01-07 2021-07-23 中芯未来(北京)科技有限公司 DNA synthetic sequence supervision method based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN108737501A (en) * 2018-04-23 2018-11-02 北京海华鑫安生物信息技术有限责任公司 A kind of DNA date storage methods, equipment and system based on block chain
CN108830617A (en) * 2018-06-12 2018-11-16 黑启栋 Super code anti-counterfeiting method and system based on block chain
US20190058593A1 (en) * 2017-08-21 2019-02-21 Andrew J. Polcha Fuzzy Dataset Processing and Biometric Identity Technology Leveraging Blockchain Ledger Technology
CN109559136A (en) * 2018-11-28 2019-04-02 中国医学科学院药用植物研究所 Information management system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
US20190058593A1 (en) * 2017-08-21 2019-02-21 Andrew J. Polcha Fuzzy Dataset Processing and Biometric Identity Technology Leveraging Blockchain Ledger Technology
CN108737501A (en) * 2018-04-23 2018-11-02 北京海华鑫安生物信息技术有限责任公司 A kind of DNA date storage methods, equipment and system based on block chain
CN108830617A (en) * 2018-06-12 2018-11-16 黑启栋 Super code anti-counterfeiting method and system based on block chain
CN109559136A (en) * 2018-11-28 2019-04-02 中国医学科学院药用植物研究所 Information management system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张仕斌: "《应用密码学》", 31 January 2017 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113160888A (en) * 2020-01-07 2021-07-23 中芯未来(北京)科技有限公司 DNA synthetic sequence supervision method based on block chain
CN113160888B (en) * 2020-01-07 2024-01-19 中芯未来(北京)科技有限公司 DNA synthesis sequence supervision method based on block chain
CN112039893A (en) * 2020-08-31 2020-12-04 成都质数斯达克科技有限公司 Private transaction processing method and device, electronic equipment and readable storage medium
CN112202555A (en) * 2020-09-29 2021-01-08 平安科技(深圳)有限公司 Information processing method, device and equipment for generating random number based on attribute of information
CN112202555B (en) * 2020-09-29 2023-07-18 平安科技(深圳)有限公司 Information processing method, device and equipment for generating random number based on information attribute
CN112307500A (en) * 2020-11-02 2021-02-02 杭州甘道智能科技有限公司 Block chain-based vaccine circulation data encryption device and method
CN112398818A (en) * 2020-11-02 2021-02-23 深圳数联天下智能科技有限公司 Software activation method and related device thereof
CN112398818B (en) * 2020-11-02 2023-03-07 深圳数联天下智能科技有限公司 Software activation method and related device thereof

Also Published As

Publication number Publication date
CN110601815B (en) 2021-09-10

Similar Documents

Publication Publication Date Title
CN110601853B (en) Block chain private key generation method and equipment
CN112214780B (en) Data processing method and device, intelligent equipment and storage medium
CN110601815B (en) Block chain data processing method and equipment
CN110519297B (en) Data processing method and device based on block chain private key
US11283797B2 (en) Authenticating a user device associated with a user to communicate via a wireless network in a secure web-based environment
CN111914027B (en) Block chain transaction keyword searchable encryption method and system
CN106357396B (en) Digital signature method and system and quantum key card
CN112926982B (en) Transaction data processing method, device, equipment and storage medium
CN111080295B (en) Electronic contract processing method and device based on blockchain
KR101977109B1 (en) Large simultaneous digital signature service system based on hash function and method thereof
CN111314067B (en) Block storage method and device, computer equipment and storage medium
CN113691597A (en) Block chain contract deployment method, device, equipment and storage medium
CN111464518A (en) Method and device for sending and verifying cross-link communication data
CN109889497A (en) A kind of data integrity verification method for going to trust
US11367065B1 (en) Distributed ledger system for electronic transactions
CN101216915B (en) A secured mobile payment method
CN110597836B (en) Information inquiry request response method and device based on block chain network
CN111125781B (en) File signature method and device and file signature verification method and device
CN111435913A (en) Identity authentication method and device for terminal of Internet of things and storage medium
CN111815321A (en) Transaction proposal processing method, device, system, storage medium and electronic device
CN104125230B (en) A kind of short message certification service system and authentication method
CN109962777A (en) The key in block catenary system is permitted to generate, obtain the method and apparatus of key
CN111523142A (en) Data processing method, device, electronic equipment and medium
CN110570197B (en) Data processing method and device based on block chain
CN104868994B (en) A kind of method, apparatus and system cooperateing with key management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant