CN110929276B - Voting decision-based block chain data shielding method - Google Patents

Voting decision-based block chain data shielding method Download PDF

Info

Publication number
CN110929276B
CN110929276B CN201911110111.7A CN201911110111A CN110929276B CN 110929276 B CN110929276 B CN 110929276B CN 201911110111 A CN201911110111 A CN 201911110111A CN 110929276 B CN110929276 B CN 110929276B
Authority
CN
China
Prior art keywords
module
data
arbitration
block chain
arbitrator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911110111.7A
Other languages
Chinese (zh)
Other versions
CN110929276A (en
Inventor
时超
汪昕
陈力
赵博
金伟达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Golden Bridge Info Tech Co ltd
Original Assignee
Shanghai Golden Bridge Info Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Golden Bridge Info Tech Co ltd filed Critical Shanghai Golden Bridge Info Tech Co ltd
Priority to CN201911110111.7A priority Critical patent/CN110929276B/en
Publication of CN110929276A publication Critical patent/CN110929276A/en
Application granted granted Critical
Publication of CN110929276B publication Critical patent/CN110929276B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a block chain data shielding method based on voting arbitration, which comprises the following steps of firstly, erecting an arbitration block chain data shielding system; step two, submitting the deposit certificate; step three, data encryption shielding; step four, data acquisition and decryption; step five, submitting and obtaining an arbitration result; in the first step, an arbitration block chain data shielding system is set and erected according to arbitration rules agreed by participants and arbitration parties, the submitted data is encrypted firstly in the arbitration processing process, the encrypted data is shielded and hidden to form a secret key, and when the arbitration party receives the data in the later period, the secret key is acquired firstly, the shielded and hidden encrypted data is acquired, and then the data is decrypted.

Description

Voting decision-based block chain data shielding method
Technical Field
The invention relates to the technical field of information security, in particular to a block chain data shielding method based on voting arbitration.
Background
With the development of the information era and the development of a block chain technology, more and more tasks can be issued on a block chain network and are received and finished by miners node users, such as online examination, knowledge competition and the like, in order to keep justice, an arbitrator is generally set to receive and verify the result value of the task, the data is not well encrypted in the data transmission process of the existing block chain arbitration system, the hidden danger of data leakage exists, and in recent years, the worry about data privacy is increased along with the trend of transferring the service to a third party and a cloud; the data shielding can inhibit the exposure of sensitive data in an untrusted environment and solve the legal problems related to cross-border mobile data, but the data in the existing block chain arbitration system is not applied to a shielding technology and cannot well solve the problem of data leakage, so that a block chain data shielding method based on voting arbitration is necessary.
Disclosure of Invention
The present invention is directed to a block chain data masking method based on voting arbitration, so as to solve the problems mentioned in the background art.
In order to solve the technical problems, the invention provides the following technical scheme: a block chain data shielding method based on voting arbitration comprises the following steps of firstly, erecting an arbitration block chain data shielding system; step two, submitting the deposit certificate; step three, data encryption shielding; step four, data acquisition and decryption; step five, submitting and obtaining an arbitration result;
in the first step, an arbitration block chain data shielding system is set and erected according to arbitration rules agreed by a participant and an arbitrator, and comprises a first participant terminal, a second participant terminal, an arbitrator service system, a PLC (programmable logic controller), a user registration login module, an identity card submission module, a facial photo submission module, a certificate submission module, a data encryption module, a data shielding module, a key generation module, a WIFI transmission module, an arbitration result acquisition module, an identity recognition authentication module, a key acquisition module, a shielding data acquisition module, a data decryption module, a certificate storage verification module and an arbitration result submission module, wherein the inner walls of the bottom ends of the first participant terminal, the second participant terminal and the arbitrator service system are respectively provided with the PLC, the user registration login module, the identity card submission module and the identity recognition authentication module, and the certificate storage submission module, the data encryption module, the data shielding module, the key generation module and the arbitration result acquisition module are respectively distributed and installed on the inner walls of the bottom ends of the first participant terminal and the second participant terminal;
in the second step, after the arbitration block chain data shielding system is erected, after participants register, authenticate and log in through users on participant terminals, all participants form evidence storing data by the participant terminals, and the evidence storing data is submitted through an evidence storing submitting module, wherein the evidence storing data is formed by the evidence information data required by arbitration and the explanation information data of own viewpoint;
after the certificate storing data are submitted, the certificate storing data are encrypted through a data encryption module in the participant terminal, the encrypted certificate storing data are shielded and hidden through a data shielding module, meanwhile, a secret key is generated through a secret key generating module according to the shielded and hidden data, and the secret key is transmitted to the service system of the arbitrator through a WIFI transmission module;
in the fourth step, after the arbitrator registers and authenticates the user on the arbitrator service system, the key is obtained through the key obtaining module, the shielded and hidden encrypted certificate-storing data is obtained through the shielded data obtaining module after the key is obtained, and the encrypted certificate-storing data is decrypted through the data decrypting module to obtain the certificate-storing data;
in the fifth step, after the arbitrator service system obtains the evidence storage data, the arbitrator conducts arbitration verification on each obtained evidence storage data through the evidence storage verification module to obtain an arbitration result, the arbitration result is submitted and transmitted to the participant terminal through the arbitration result submitting module, and the participant conducts arbitration result obtaining through the arbitration result obtaining module of the participant terminal to complete arbitration processing.
According to the technical scheme, WIFI transmission modules are fixedly mounted on the inner walls of the bottom ends of the first participant terminal, the second participant terminal and the arbitrator service system in the arbitration block chain data shielding system.
According to the technical scheme, the inner walls of the bottom ends of the first participant terminal, the second participant terminal and the arbitrator service system are fixedly provided with facial photo submission modules.
According to the technical scheme, in the user registration process of the participants and the arbitrator in the second step, the arbitrator user account is registered through the user registration login modules in the participant terminal and the arbitrator service system, and the identity card information is submitted through the identity card submitting module in the registration process so that the user account information can be bound conveniently.
According to the technical scheme, in the second step, the third step and the fourth step, the participant and the arbitrator log in through the user registration login module in the authentication login process, the facial picture submitting module is required to submit the facial image of the user in the login process, and the identity identification authentication module is used for verifying the login information of the user.
According to the technical scheme, the encryption mode of the data encryption module comprises the type, operation times and sequence of the Hash algorithm.
According to the technical scheme, the arbitrator used by the arbitrator service system can be composed of teams, and arbitration can be performed through voting in the later period.
Compared with the prior art, the invention has the following beneficial effects: according to the invention, a traditional arbitration block chain data system is perfected, wherein in the arbitration processing process, submitted data is encrypted firstly, the encrypted data is shielded and hidden and a secret key is formed, and when an arbitrator receives data at the later stage, the arbitrator needs to acquire the secret key firstly, then acquire the shielded and hidden encrypted data and then decrypt the data.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic overall perspective view of the present invention;
FIG. 2 is a schematic view of the overall internal structure of the present invention;
FIG. 3 is a flow chart of the arbitration blockchain data masking system of the present invention;
FIG. 4 is a flow chart of the method of the present invention;
in the figure: 1. a first participant terminal; 2. a second participant terminal; 3. an arbitrator service system; 4. a PLC controller; 5. a user registration login module; 6. an identity card submission module; 7. a facial photograph submission module; 8. a deposit and certificate submitting module; 9. a data encryption module; 10. a data shielding module; 11. a key generation module; 12. a WIFI transmission module; 13. an arbitration result acquisition module; 14. an identity recognition and authentication module; 15. a key acquisition module; 16. a shielded data acquisition module; 17. a data decryption module; 18. a storage verification module; 19. and an arbitration result submitting module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-4, the present invention provides a technical solution: a block chain data shielding method based on voting arbitration comprises the following steps of firstly, erecting an arbitration block chain data shielding system; step two, submitting the deposit certificate; step three, data encryption shielding; step four, data acquisition and decryption; step five, submitting and obtaining an arbitration result;
in the first step, an arbitration block chain data shielding system is set and erected according to arbitration rules agreed by participants and arbiters, the arbitration block chain data shielding system comprises a first participant terminal 1, a second participant terminal 2, an arbiter service system 3, a PLC controller 4, a user registration login module 5, an identity card submission module 6, a facial photograph submission module 7, a certificate submission module 8, a data encryption module 9, a shielding data module 10, a key generation module 11, a WIFI transmission module 12, an arbitration result acquisition module 13, an identity identification authentication module 14, a key acquisition module 15, a shielding data acquisition module 16, a data decryption module 17, a certificate verification module 18 and an arbitration result submission module 19, the inner walls of the bottom ends of the first participant terminal 1, the second participant terminal 2 and the arbiter service system 3 are all distributed and provided with the PLC controller 4, the user registration module 5, the identity card submission module 6 and the identity identification module 14, the inner walls of the bottom ends of the first participant terminal 1 and the second participant terminal 2 are distributed and provided with the certificate service module 8, the shielding module 9, the authentication module 10, the key acquisition module 18, the arbitration block chain data acquisition module 16 and the arbitration result acquisition module 17 are distributed and the arbitration result acquisition module 16; in the first step, WIFI transmission modules 12 are fixedly installed on the inner walls of the bottom ends of a first participant terminal 1, a second participant terminal 2 and an arbitrator service system 3 in an arbitration block chain data shielding system, and the transmission of later-stage data is realized through the WIFI transmission modules 12; the inner walls of the bottom ends of the first participant terminal 1, the second participant terminal 2 and the arbitrator service system 3 are fixedly provided with face photo submission modules 7, face recognition of user account login in the later period is carried out through the face photo submission modules 7, the encryption mode of the data encryption module 9 comprises Hash Hash algorithm types, operation times and sequence, an arbitrator used by the arbitrator service system 3 can be composed of teams, and arbitration can be carried out through voting in the later period;
in the second step, after the arbitration block chain data shielding system is erected, after participants register, authenticate and log in through users on participant terminals, each participant forms evidence storing data by the participant terminal from evidence information data required by arbitration and explanation information data of own viewpoint, and the evidence storing data is submitted through an evidence storing submitting module 8;
in the third step, after the certificate storing data is submitted, the certificate storing data is encrypted through the data encryption module 9 in the participant terminal, the encrypted certificate storing data is shielded and hidden through the work of the shielding data module 10, meanwhile, a secret key is generated through the secret key generation module 11 according to the shielded and hidden data, and the secret key is transmitted to the arbitrator service system 3 through the WIFI transmission module 12;
in the fourth step, after the arbitrator registers and authenticates the user on the arbitrator service system 3, the key is obtained through the key obtaining module 15, the shielded and hidden encrypted certificate-storing data is obtained through the shielded data obtaining module 16 after the key is obtained, and the encrypted certificate-storing data is decrypted through the data decrypting module 17 to obtain the certificate-storing data; in the second step, the third step and the fourth step, in the user registration process of the participant and the arbitrator, the registration of the arbitrator user account is carried out through the participant terminal and the user registration login module 5 in the arbitrator service system 3, the submission of the identity card information is carried out through the identity card submission module 6 in the registration process so as to facilitate the binding of the user account information, in the authentication login process of the participant and the arbitrator in the second step, the login of the user account is carried out through the user registration login module 5 in the third step and the fourth step, in the login process, the submission of the user face image is carried out through the face photo submission module 7, and the login information of the user is verified through the identity identification authentication module 14;
in the fifth step, after the arbitrator service system 3 obtains the evidence storage data, the arbitrator performs arbitration verification on each obtained evidence storage data through the evidence storage verification module 18 to obtain an arbitration result, then submits the arbitration result to the participant terminal through the arbitration result submission module 19, and the participant performs arbitration result acquisition through the arbitration result acquisition module 13 of the participant terminal to complete arbitration processing.
It should be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described above, or equivalents may be substituted for elements thereof. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (7)

1. A block chain data shielding method based on voting arbitration comprises the following steps of firstly, erecting an arbitration block chain data shielding system; step two, submitting the deposit certificate; step three, data encryption shielding; step four, data acquisition and decryption; step five, submitting and obtaining an arbitration result; the method is characterized in that:
in the first step, an arbitration block chain data shielding system is set and erected according to arbitration rules agreed by participants and arbitration parties, the arbitration block chain data shielding system comprises a first participant terminal (1), a second participant terminal (2), an arbitration party service system (3), a PLC controller (4), a user registration login module (5), an identity card submission module (6), a facial photo submission module (7), a storage card submission module (8), a data encryption module (9), a shielding data module (10), a key generation module (11), a WIFI transmission module (12), an arbitration result acquisition module (13), an identity identification authentication module (14), a key acquisition module (15), a shielding data acquisition module (16), a data decryption module (17), a storage card verification module (18) and an arbitration result submission module (19), the inner walls of the first participant terminal (1), the second participant terminal (2) and the arbitration party service system (3) are respectively provided with the PLC controller (4), the user registration module (5), the identity card submission module (6) and the authentication module (14), and the inner walls of the second participant terminal (9), and the encryption module (9), and the bottom end data distribution modules of the participant terminal (9), and the encryption modules, the arbitration system comprises a shielding data module (10), a key generation module (11) and an arbitration result acquisition module (13), wherein the key acquisition module (15), the shielding data acquisition module (16), a data decryption module (17), a storage and verification module (18) and an arbitration result submission module (19) are distributed and installed on the inner wall of the bottom end of the arbiter service system (3);
in the second step, after the arbitration block chain data shielding system is erected, participants register, authenticate and log in through users on participant terminals, and each participant forms evidence storing data by the participant terminals, wherein the evidence storing data is formed by the evidence information data required by arbitration and the explanation information data of own viewpoint and is submitted through an evidence storing submitting module (8);
in the third step, after the certificate storing data are submitted, the certificate storing data are encrypted through a data encryption module (9) in the participant terminal, the encrypted certificate storing data are shielded and hidden through a data shielding module (10), meanwhile, a secret key is generated through a secret key generation module (11) according to the shielded and hidden data, and the secret key is transmitted to the arbitrator service system (3) through a WIFI transmission module (12);
in the fourth step, after the arbitrator registers and logs in the user registration authentication on the arbitrator service system (3), the key is obtained through the key obtaining module (15), the shielded and hidden encrypted evidence-storing data is obtained through the shielded data obtaining module (16) after the key is obtained, and the encrypted evidence-storing data is decrypted through the data decrypting module (17) to obtain the evidence-storing data;
in the fifth step, after the arbitrator service system (3) obtains the evidence storage data, the arbitrator conducts arbitration verification on each obtained evidence storage data through the evidence storage verification module (18) to obtain an arbitration result, the arbitration result is submitted and transmitted to the participant terminal through the arbitration result submitting module (19), and the participant conducts arbitration result obtaining through the arbitration result obtaining module (13) of the participant terminal to complete arbitration processing.
2. A voting arbitration-based block chain data masking method according to claim 1, wherein: and in the first step, WIFI transmission modules (12) are fixedly mounted on the inner walls of the bottom ends of the first participant terminal (1), the second participant terminal (2) and the arbitrator service system (3) in the arbitrator block chain data shielding system.
3. A voting-adjudication-based block chain data masking method as claimed in claim 1, wherein: facial photo submission modules (7) are fixedly mounted on the inner walls of the bottom ends of the first participant terminal (1), the second participant terminal (2) and the arbitrator service system (3).
4. A voting arbitration-based block chain data masking method according to claim 1, wherein: in the second step, the third step and the fourth step, in the user registration process of the participants and the arbitrator, the user registration login module (5) in the participant terminal and the arbitrator service system (3) is used for registering the arbitrator user account, and in the registration process, the identity card submitting module (6) is used for submitting the identity card information so as to facilitate the binding of the user account information.
5. A voting arbitration-based block chain data masking method according to claim 1, wherein: in the second step, the third step and the fourth step, the participants and the arbitrator log in the user account through the user registration login module (5), and in the login process, the facial picture submission module (7) is required to submit the facial image of the user, and the login information of the user is verified through the identity recognition authentication module (14).
6. A voting arbitration-based block chain data masking method according to claim 1, wherein: the encryption mode of the data encryption module (9) comprises the type, operation times and sequence of a Hash Hash algorithm.
7. A voting-adjudication-based block chain data masking method as claimed in claim 1, wherein: the arbitrator used by the arbitrator service system (3) may consist of teams, which can arbitrate later by voting.
CN201911110111.7A 2019-11-14 2019-11-14 Voting decision-based block chain data shielding method Active CN110929276B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911110111.7A CN110929276B (en) 2019-11-14 2019-11-14 Voting decision-based block chain data shielding method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911110111.7A CN110929276B (en) 2019-11-14 2019-11-14 Voting decision-based block chain data shielding method

Publications (2)

Publication Number Publication Date
CN110929276A CN110929276A (en) 2020-03-27
CN110929276B true CN110929276B (en) 2023-03-24

Family

ID=69853038

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911110111.7A Active CN110929276B (en) 2019-11-14 2019-11-14 Voting decision-based block chain data shielding method

Country Status (1)

Country Link
CN (1) CN110929276B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112053261B (en) * 2020-08-07 2024-06-04 深圳区块大陆科技有限公司 Method for realizing free arbitration on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109685503A (en) * 2018-12-07 2019-04-26 思力科(深圳)电子科技有限公司 Referee method based on block chain data safety
CN109791594A (en) * 2016-08-12 2019-05-21 Altr解决方案公司 Data are segmented in order to persistently be stored in multiple immutable data structures
US10382205B1 (en) * 2018-06-10 2019-08-13 Hajoon Ko Security system and method for using a blockchain service through privacy-aware blockchain arbitration server

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170250796A1 (en) * 2016-02-18 2017-08-31 Gideon Samid Trans Vernam Cryptography: Round One
US20190158275A1 (en) * 2017-11-22 2019-05-23 Michael Beck Digital containers for smart contracts

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109791594A (en) * 2016-08-12 2019-05-21 Altr解决方案公司 Data are segmented in order to persistently be stored in multiple immutable data structures
US10382205B1 (en) * 2018-06-10 2019-08-13 Hajoon Ko Security system and method for using a blockchain service through privacy-aware blockchain arbitration server
CN109685503A (en) * 2018-12-07 2019-04-26 思力科(深圳)电子科技有限公司 Referee method based on block chain data safety

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
分散式区块链技术与加密安全法的兴起;亚伦.赖特等;《民商法论丛》;20191031(第02期);全文 *
可仲裁多重认证码系统的信息论特征;杜庆灵等;《通信技术》;20010630(第06期);全文 *

Also Published As

Publication number Publication date
CN110929276A (en) 2020-03-27

Similar Documents

Publication Publication Date Title
CN109544331B (en) Supply chain financial application method and device based on block chain, terminal equipment and storage medium
CN111046352B (en) Identity information security authorization system and method based on block chain
CN107079034B (en) Identity authentication method, terminal equipment, authentication server and electronic equipment
US20160162897A1 (en) System and method for user authentication using crypto-currency transactions as access tokens
US11128604B2 (en) Anonymous communication system and method for subscribing to said communication system
CN112311735A (en) Credible authentication method, network equipment, system and storage medium
CN108243182B (en) Block chain management authorization method, sub-management end, root management end and storage medium
JP2002032344A (en) Method and device for providing contents
CN108830502A (en) A kind of seal system
CN115021958B (en) Mist calculation and blockchain fusion intelligent home identity authentication method and system
CN112839046A (en) Traceable anonymous crowdsourcing method and system based on block chain
EP3485600B1 (en) Method for providing secure digital signatures
CN107196943B (en) A kind of security display implementation method of private data in third-party platform
KR102157695B1 (en) Method for Establishing Anonymous Digital Identity
CN112989380A (en) Resource exchange processing method, device, equipment and storage medium
CN114567447A (en) Data sharing management method and device based on cloud server
CN114519206A (en) Method for anonymously signing electronic contract and signature system
CN110929276B (en) Voting decision-based block chain data shielding method
JP2018133739A (en) Secret key copying system, terminal, and secret key copying method
CN115860037B (en) Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones
CN109600338B (en) Trusted identity management service method and system
CN109743322A (en) Identity identifying method, identity authorization system
CN108322311A (en) The generation method and device of digital certificate
EP3937037A1 (en) A system and method for digital identity authentication based on biometric data
CN111062833A (en) Signature authentication method of contract data and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant