CN110995408A - Distributed computing method and system based on data encryption - Google Patents

Distributed computing method and system based on data encryption Download PDF

Info

Publication number
CN110995408A
CN110995408A CN201911323932.9A CN201911323932A CN110995408A CN 110995408 A CN110995408 A CN 110995408A CN 201911323932 A CN201911323932 A CN 201911323932A CN 110995408 A CN110995408 A CN 110995408A
Authority
CN
China
Prior art keywords
computing
task
terminal
calculation
management module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911323932.9A
Other languages
Chinese (zh)
Other versions
CN110995408B (en
Inventor
郑坤
杨忠勋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianshu Technology Co ltd
Original Assignee
Shenzhen Coos Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Coos Co ltd filed Critical Shenzhen Coos Co ltd
Priority to CN201911323932.9A priority Critical patent/CN110995408B/en
Publication of CN110995408A publication Critical patent/CN110995408A/en
Application granted granted Critical
Publication of CN110995408B publication Critical patent/CN110995408B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a distributed computing method and a distributed computing system based on data encryption. The method comprises the steps that a demand terminal encrypts an original data sample, a computing terminal provides computing service based on the encrypted original data sample, the information security of the demand terminal is guaranteed, a task management module completes service cost transfer transaction of a computing task by calling a block chain intelligent contract, the openness, transparency and traceability of full-flow information are guaranteed, and all links have good security. By adopting the working modes of the standard computing model and the input and output format, the computing terminal can install and register the computing model according to the self system configuration condition, has good functional universality and can be suitable for distributed computing of various computing tasks.

Description

Distributed computing method and system based on data encryption
Technical Field
The invention relates to the technical field of computers, in particular to a distributed computing method and system based on data encryption.
Background
With the popularization of various computing terminals and the continuous improvement of hardware computing power, terminal hardware gradually has quite strong computing power, and a computing task of an original data sample is completed cooperatively by utilizing scattered computing terminals, so that the method has important practical significance on the development of big data.
In the calculation process, because the original data is a private resource of a calculation task initiator and may relate to sensitive information such as privacy and the like, when a calculation task is carried out, a calculation terminal needs to be prevented from obtaining the original data, and differences may exist in the aspects of hardware capability, software capability, online rate and the like of different calculation terminals, and a task management module of a distributed calculation system needs to reasonably distribute the calculation task among different calculation terminals, a safe distributed calculation system is needed to complete data processing on the premise of not revealing the original data and processing result information, and a desired result is provided for a demand terminal.
Disclosure of Invention
The invention provides a distributed computing method and system based on data encryption, aiming at matching a computing terminal according to the characteristics of task types and calling a block chain intelligent contract to finish transaction transfer of computing services on the basis of not revealing original data of a demand terminal.
In order to achieve the above object, the distributed computing method based on data encryption provided by the present invention comprises the following steps:
step S1: the task management module defines a standard calculation model set, defines data input and output formats supported by each standard calculation model in the set, and simultaneously creates a block chain intelligent contract on a block chain; the computing terminal installs a standard computing model adapted to the computing terminal and registers the standard computing model to the task management module;
step S2: the demand terminal initiates a calculation task request, defines the number of data samples of the calculation task, and performs calculation on each data sample djSequentially carrying out secondary encryption to respectively obtain initial encrypted data samples d ″jAnd first transit encrypted data samples D ″j
Step S3: the task management module acquires the calculation task request information of the demand terminal, adds the calculation task request information into a task queue, and decrypts the first transfer encryption data sample D ″jObtaining initial encrypted data sample d ″j
Step S4: the computing terminal checks the standard computing model installed therein, selects one or more computing tasks which can be satisfied from the task queue, reports the computing tasks and the d 'to the task management module, and the task management module carries out the computing tasks and the d' according to a preset distribution principlejAfter encryption, distributing the encrypted data to a matched computing terminal;
step S5: the computing terminal decrypts the d' encrypted in the step S4jAnd after the verification is successful, d' is obtainedjProcessing d' according to standard calculation model required in calculation taskjObtaining the processing result rjAnd processing the result r ″jFeeding back to the task management module according to the data input and output format requirement;
step S6: the task management module informs the requirement terminal to confirm the processing result r ″jAfter the confirmation information is acquired, transferring the service cost of the calculation task from the address of the block chain of the demand terminal to the block chain address of the calculation terminal to complete the calculation task;
step S7: and packaging the related information of the calculation task and storing the related information in the intelligent contract of the block chain.
Preferably, in the step S1,
the task management module creates a block chain intelligent contract on a block chain, and main functional functions of the intelligent contract comprise a functional function for executing calculation of task service cost payment and a functional function for calculating task information uplink;
the function of calculating the payment of the task service fee is as follows:
Payment(addrreq,addrsrv,amount)
wherein:
addrreqthe block chain address of the demand terminal;
addrsrvcalculating the block chain address of the terminal;
amount is the service cost of the calculation task;
the information uplink function of the calculation task is:
Record(srvInfo)
the srvInfo comprises calculation task requirement information, block chain address information, requirement terminal confirmation signature information and block chain transaction information.
Preferably, in step S1, the task management module assigns a random identification id to each computing terminal, and each computing terminal sends the installed standard computing model installation information to the task management module for registration, where the registration content includes: the method comprises the steps of identifying id by a computing terminal, calculating a block chain address of the computing terminal and calculating a standard computing model set installed by the computing terminal.
Preferably, in the step S1,
the task management module defines a standard calculation model set as m(1),m(2),…,m(K)And the number collection set of data input and output formats supported by the standard calculation model is { n }(1),n(2),…,n(K)}。
Wherein, K is the number of standard calculation models supported by the task management module, and the kth standard calculation model is m(k)The number of the data input and output formats of the model is n(k),k=1,2,…,K。
Preferably, in step S2, the process of the requirement terminal initiating a calculation task request to the task management module includes:
s21: selecting a standard computing model for use in a computing task request
mreq=m(k)
S22: selecting the data input/output format adopted by the standard calculation model in step S21
freq=i
Wherein, the value of i can be 1, 2, …, n(k)
S23: determining the number N of data samples needing to be processed by the calculation task and the highest service unit price PriceLimit, and according to the number N of the data samples and the highest service unit price PriceLimit, the highest transfer amount of the demand terminal authorization task management module when the calculation service cost is paid is as follows: n + PriceLimit;
s24: selecting a homomorphic encryption function to each data sample d according to the operation characteristics and the calculated amount of the calculation taskjCarrying out homomorphic encryption to obtain initial encrypted data sample d ″j
d`j=HE(dj)
Wherein:
j=1,2,…,N;
HE () is a homomorphic encryption function;
s25: computing initial encrypted data samples d ″jThe digest H, and the signature Sig,
H=digest(d`j)
Sig=f(H,PrivKeyreq)
wherein:
digest () is a digest calculation function;
f () is an asymmetric cryptographic function;
PrivKeyreqa private key for asymmetric encryption of the demand terminal;
s26: utilizing public key of task management module to make original data sample d ″jAsymmetric encryption to obtain a first transit encrypted data sample D ″j
D`j=f`(d`j,PubKeytaskmgt)
Wherein:
f' is an asymmetric cryptographic function;
PubKeytaskmgtasymmetrically encrypting a public key for the task management module;
s27: m is to bereq、freq、N、PriceLimit、D`jAnd the Sig and H calculation task request information are all sent to the task management module.
Preferably, in step S3, the task management module uses its private key PrivKeytaskmgtDecrypting D' systemjTo obtain d-jAnd calculating d ″)jThe abstract H' of (1) is obtained by Sig and a public key PubKey of a required terminalreqTo obtain d-jThe abstract of (1) is H;
if H ═ H, the data verification passes, d ″jAnd the data can be transmitted to the computing terminal, otherwise, the data verification fails.
Preferably, in the steps S4 and S5,
the task management module performs task allocation according to the principle of service price priority and application time priority; aiming at the same computing task, if the service price quotation and the application time of a plurality of computing terminals are the same, the task management module selects the computing terminal with high service online rate and system configuration to execute the computing task;
the specific way for the computing terminal to execute the computing task is as follows:
s51: the task management module uses the selected public key of the computing terminal to transmit the d ″)jEncrypting and calculating d ″)jThe corresponding abstract H is signed with a signature Sig' and then is sent to the selected computing terminal; the selected computing terminal uses its private key to decrypt and obtain d ″, againjAnd calculating d ″)jThe abstract H ' of (a) is solved to d ' through Sig ' and the public key of the task management modulejIf H ″ ═ H, the data verification passes, otherwise the data verification fails, i.e., d ″, the digest of (1) passesjA delivery failure;
s52: the computing terminal obtains the d ″)jComputing the function m according to a standard computing model required in the computing taskreqProcessing N initial encrypted data samples d' in a computational taskjObtaining the processing result rj
r`j=mreq(d`j)
Wherein: j is 1, 2, 3, …, N;
s53: r' is required to be converted according to the data input and output format supported by the standard calculation modeljFeeding back to the task management module, and informing the required terminal of the processing result r ″jAnd (4) confirmation:
s54: the demand terminal decrypts r' by using homomorphic decryption functionjObtaining the original processing result rj
rj=HE-1(r`j)
S55: demand terminalConfirmation of the original processing result rjAfter completion, the processing result r' is calculatedjThe digest and the signature are carried out to obtain signature (r')j) Signature (r' is signedj) And sending the data to a task management module.
The invention also provides a distributed computing system based on data encryption, which comprises:
a demand terminal: the task management module is used for initiating a calculation task request to the task management module;
a task management module: the system comprises a demand terminal, a computing terminal and a block chain intelligent contract, wherein the demand terminal is used for receiving a computing task request of the demand terminal, distributing and managing the computing task request, distributing the computing task to the computing terminal, and calling the block chain intelligent contract to complete transaction transfer of computing service cost and information uplink of computing service after the computing terminal completes the computing task;
a computing terminal: the system is used for applying for and executing the calculation task and obtaining the final payment cost of the calculation task;
block chains: and creating a block chain intelligent contract in the block chain by the task management module, wherein the block chain intelligent contract is used for calculating the cost actually paid to the computing terminal and calculating the uplink of the task information.
Preferably, the demand terminal is configured to encrypt the data sample in the computing task for the second time and send the encrypted data sample to the task management module, the task management module is configured to receive the computing task, decrypt the encrypted data sample for the second time to obtain an initial encrypted file, and after the initial encrypted file is successfully verified, encrypt the computing task and the initial encrypted file again according to information reported by the computing terminal and distribute the encrypted data sample and the initial encrypted file to the matched computing terminal, and after the computing terminal decrypts the encrypted data sample again to obtain the initial encrypted file, and the verification is successful, execute the computing task.
Compared with the prior art, the invention has the beneficial effects that: the invention utilizes homomorphic encryption technology to encrypt the original data sample, and the computing terminal provides computing service based on homomorphic encrypted data, so that the computing terminal can not obtain the actual information of the original data and the processing result, and the information security of the required terminal is ensured.
After the computing terminal completes data processing, the task management module completes account transfer transaction of service cost by calling the intelligent block chain contract, and the intelligent block chain contract has transparency and safety.
By adopting the working modes of the standard computing model and the input and output format, the computing terminal can install and register the model according to the conditions of the system configuration and the like of the computing terminal, and meanwhile, the task management module can update the model in time and keep synchronization with other functional modules.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the structures shown in the drawings without creative efforts.
FIG. 1 is a flow chart of a distributed computing method of the present invention;
FIG. 2 is a diagram of the functional architecture of a distributed computing system of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
The invention provides a distributed computing method based on data encryption, which comprises the following steps:
step S1: the task management module defines a standard calculation model set, defines data input and output formats supported by each standard calculation model in the set and creates a block chain intelligent contract; and the computing terminal installs the standard computing model adapted to the computing terminal and registers the standard computing model with the task management module.
Step S2: the demand terminal initiates a calculation task requestDefining the number of data samples of the calculation task, and for each data sample djSequentially carrying out secondary encryption to respectively obtain initial encrypted data samples d ″jAnd first transit encrypted data samples D ″j
Step S3: the task management module acquires the calculation task request information of the demand terminal, adds the calculation task request information into a task queue, and decrypts the first transfer encryption data sample D ″jObtaining initial encrypted data sample d ″j
Step S4: the computing terminal checks the standard computing model installed therein, selects one or more computing tasks which can be satisfied from the task queue, reports the computing tasks and the d 'to the task management module, and the task management module carries out the computing tasks and the d' according to a preset distribution principlejAnd distributing the encrypted data to the matched computing terminal.
Step S5: the computing terminal decrypts the d' encrypted in the step S4jAnd after the verification is successful, d' is obtainedjProcessing d' according to standard calculation model required in calculation taskjObtaining the processing result rjAnd processing the result r ″jAnd feeding back to the task management module according to the data input and output format requirement.
Step S6: the task management module informs the requirement terminal to confirm the processing result r ″jAnd after the confirmation information is acquired, transferring the service cost of the calculation task from the address of the block chain of the demand terminal to the block chain address of the calculation terminal, and completing the calculation task.
Step S7: and packaging the related information of the calculation task and storing the related information in the intelligent contract of the block chain.
Specifically, in step S1, the task management module initializes and defines a standard calculation model set as { m }(1),m(2),…,m(K)And the number collection set of data input and output formats supported by the standard calculation model is { n }(1),n(2),…,n(K)}。
Wherein, K is the number of standard calculation models supported by the task management module, and the kth standard calculation model is m(k)The number of the data input and output formats of the model is n(k),k=1,2,…,K。
In this embodiment, taking an image target recognition calculation task as an example, the task management module defines two standard calculation models, namely a deep learning standard calculation model and a support vector machine standard calculation model, which are respectively denoted as m(1)、m(2)That is, the standard calculation model set defined by the task management module is denoted as { m(1),m(2)}。
The input and output formats of the image data of the two standard calculation models are respectively recorded as f(1)、f(2)Each standard calculation model supports 2 image data input and output formats, namely, the number set of data input and output formats supported by the standard calculation model is {2, 2}, specifically, the data input and output formats of the two models are distributed as shown in table 1,
TABLE 1
Figure BDA0002326552150000071
In table 1:
fi1 (1)=fi1 (2)=1920*1080,fi2 (1)=fi2 (2)=1280*960;
fo1 (1)、fo2 (1)、fo1 (2)、fo2 (2)are all in the form of { typeNum, obj1,confidence1…, typeNum is the number of identified types, obj1As the type name of the first object, confidence1The confidence coefficient of the first type of object is between 0 and 1, and the higher the value is, the higher the existence probability of the object is.
Meanwhile, the task management module creates a block chain intelligent contract on the block chain, and the main function of the block chain intelligent contract comprises a service charge payment function for executing the calculation task and a calculation task information uplink function;
the service charge payment function of the calculation task is as follows:
Payment(addrreq,addrsrv,amount)
wherein:
addrreqthe block chain address of the demand terminal;
addrsrvcalculating the block chain address of the terminal;
amount is the service cost of the calculation task;
the information uplink function of the calculation task is:
Record(srvInfo)
the srvInfo comprises calculation task requirement information, block chain address information, requirement terminal confirmation signature information and block chain transaction information.
Then, the task management module allocates a random identification id to each computing terminal, in this embodiment, 3 computing terminals and 1 demand terminal are selected, the ids of the 3 computing terminals are respectively recorded as id1, id2 and id3, and the block chain addresses of the 3 computing terminals are respectively recorded as addr1 srv、addr2 srv、addr3 srvThe block chain address of the demand terminal is noted as addrreq
Each computing terminal is initialized, and a standard computing model set { m } is obtained from the task management module(1),m(2)And sending the installation information of the standard calculation model to a task management module for registration, wherein the registration content comprises the following steps: the computing terminal identifies the id, the block chain address of the computing terminal and a standard computing model set installed on the computing terminal, and reports the block chain address of the computing terminal to the task management module; initializing a demand terminal, and acquiring a standard calculation model set { m ] from a task management module(1),m(2)And the information of the data input and output format reports the block chain address of the demand terminal to the task management module.
And the registered contents of the computing terminal are counted in a computing terminal service capability table, the specific contents are shown in table 2,
TABLE 2
Calculating terminal serial number Computing terminal id Calculating terminal block chain address Service capability srvCap
1 aIMH…GlsklP 0x1a35….2a {m(1),m(2)}
2 vFn%...sdsaax 0xd723…e3 {m(1),m(2)}
3 Kye…ncttlslpq 0x8567…7c {m(1),m(2)}
After the task management module, the demand terminal and the computing terminal are initialized, the demand terminal initiates a computing task request.
In step S2, the process of the demand terminal initiating a calculation task request to the task management module is as follows:
s21: and selecting a standard calculation model adopted by the calculation task request, and selecting a deep learning model as the calculation task request model in the embodiment. Namely:
mreq=m(1)
s22: the data input and output format adopted by the deep learning model is selected as follows:
freq=1
specifically, the data input format adopted by the deep learning model is selected to be fi1 (1)1920 × 1080, data output format fo1 (1)={typeNum,obj1,confidence1,…}。
S23: determining that the number N of data samples needing to be processed by the calculation task is 1000 and the highest service unit price PriceLimit is 10, and according to the number N of the data samples and the highest service unit price PriceLimit, the highest transfer amount of the demand terminal authorization task management module when the calculation service cost is paid is as follows: n × prince limit 1000 × 10 ═ 10000;
s24: selecting a homomorphic encryption function to each data sample d according to the operation characteristics and the calculated amount of the calculation taskjCarrying out homomorphic encryption to obtain initial encrypted data sample d ″j
d`j=HE(dj)
Wherein:
j=1,2,…,N;
HE () is a homomorphic encryption Fan-Vercauteren algorithm function;
s25: computing initial encrypted data samples d ″jThe digest H, and the signature Sig,
H=digest(d`j)
Sig=f(H,PrivKeyreq)
wherein:
digest () is MD5() digest calculation function;
f () is an ECC () elliptic curve asymmetric cryptographic function;
PrivKeyreqa private key for asymmetric encryption of the demand terminal;
s26: utilizing public key of task management module to make original data sample d ″jAsymmetric encryption to obtain a first transit encrypted data sample D ″j
D`j=f`(d`j,PubKeytaskmgt)
Wherein:
f' () is an ECC () elliptic curve asymmetric encryption function;
PubKeytaskmgtasymmetrically encrypting a public key for the task management module;
s27: m is to bereq、freq、N、PriceLimit、D`jAnd the Sig and H calculation task request information are all sent to the task management module. Wherein, the initial encrypted data sample d' is processedjAsymmetric encryption is performed, and the digest signature is calculated, so that the initial encrypted data sample d' can be ensuredjAnd the data transmission process is not tampered by a third party.
Task management module utilizes its private key PrivKeytaskmgtDecrypting D' systemjTo obtain d-jAnd calculating d ″)jThe abstract H' of (1) is obtained by Sig and a public key PubKey of a required terminalreqTo obtain d-jThe abstract of (1) is H;
if H ═ H, the data verification passes, d ″jCan be transmitted to the computing terminal, otherwise the data verification fails, i.e. d ″jThe transfer fails.
The task management module adds the calculation task request information of the demand terminal to a task queue, and all the calculation terminals can access the queue to obtain the calculation task information so as to apply and bear the calculation tasks therein to obtain the calculation service cost.
The calculation task of the task queue of the task management module to the current demand terminal is described as follows:
Figure BDA0002326552150000101
the computing terminal checks the installed standard computing model, selects one or more computing tasks which can be met from the task queue, and reports computing service quotations which can be accepted by the computing terminal to the task management module based on the highest unit price information PriceLimit of the demand terminal.
Assuming that 3 computing terminals all meet the service capability requirement of the computing task TaskSeq1, and respectively give computing service cost quotations as follows:
Figure BDA0002326552150000102
Figure BDA0002326552150000111
therefore, the service quotation of the demand terminal TaskSeq1 by the computing terminal with the id of aIMH … GlsklPd is lowest, and the quotation time is earliest.
For a computing terminal which meets the service capability and initiates a computing task to carry out application, a task management module performs task allocation according to the principle of service price priority and application time priority; aiming at the same computing task, if the service price quotation and the application time of a plurality of computing terminals are the same, the task management module selects the computing terminal with high service online rate and system configuration to execute the computing task. According to the application results of the 3 computing terminals, the task management module selects the computing terminal with the id of aIMH … GlsklP as a service terminal, the quotation of the computing service is recorded as srvPrice ═ 6, and the block chain address of the computing terminal is addr1 srv
The task management module selects a computing terminal with id aIMH … GlsklP to execute a computing task, and the specific execution mode is as follows:
s51: the task management module uses the selected public key of the computing terminal to transmit the d ″)jEncrypting to obtain a second intermediate transfer encrypted data sample D ″j
D``j=f``(d`j,PubKeycal)
Wherein:
f' is an ECC () elliptic curve asymmetric encryption function;
PubKeycalasymmetrically encrypting and decrypting a public key for a computing terminal;
computing initial encrypted data samples d ″jThe digest H, and the signature Sig',
H=digest(d`j)
Sig`=f(H,PrivKeytaskmgt)
wherein:
digest () is MD5() digest calculation function;
f () is an ECC () elliptic curve asymmetric cryptographic function;
PrivKeytaskmgtan asymmetric encryption private key for the task management module;
the task management module encrypts the second transfer encrypted data sample D ″jInitial encrypted data samples d ″jAnd sending the signed abstract Sig' to the computing terminal.
Computing terminal PrivKey utilizing private key thereofcalDecrypting DjObtaining initial encrypted data sample d ″jAnd calculating d ″)jThe abstract H 'of (1) is used for passing through Sig' and a public key PubKey of a task management moduletaskmgtTo obtain d-jIf H ″ ═ H, the data verification passes, otherwise the data verification fails, i.e., d ″, the digest of (1) passesjThe transfer fails.
S52: the computing terminal obtains the d ″)jThen, the function m is calculated according to the standard calculation model required in the calculation taskreqProcessing N initial encrypted data samples d' in a computational taskjObtaining the processing result rj
r`j=mreq(d`j)
Wherein: j is 1, 2, 3, …, N;
s53: r' is required to be converted according to the data input and output format supported by the standard calculation modeljAnd feeding the data back to the task management module, and informing the required terminal to confirm the processing result by the task management module:
s54: the demand terminal obtains an original processing result r by using a homomorphic decryption functionj
rj=HE-1(r`j)
S55: requiring the terminal to confirm the original processing result rjAfter completion, the processing result r' is calculatedjThe digest and the signature are carried out to obtain signature (r')j) Signature (r' is signedj) And sending the transaction data to a task management module to execute the transaction transfer of the calculated service charge.
The task management module receives the processing result r' of the required terminaljConfirmation of (2)Signature (r ″)j) And then, completing the service fee payment from the demand terminal to the computing terminal, and linking the computing task information to the intelligent block chain contract.
The specific service fee payment method comprises the following steps:
firstly, the task management module calls a Payment function of the intelligent contract to complete the addr from the demand terminal addressreqTo the computing terminal address addrsrvTransfer of (2):
Payment(addrreq,addrsrv,amount)
wherein the content of the first and second substances,
and calculating the actual service cost price of the terminal to be 6000.
Then, after the transaction is successfully transferred, the transaction hash value hash and the block height of the transaction are obtained.
The specific mode of calculating the task information uplink is as follows:
first, the task management module packages the uplink information of the current calculation task to obtain srvInfo, whose main contents are shown in table 3.
TABLE 3
Figure BDA0002326552150000131
Then, the task management module calls Record function of the intelligent contract and stores the related information of the computing service in the block chain intelligent contract:
Record(srvInfo)
the invention adopts the working modes of the standard computing model and the input and output format, the computing terminal can install and register the standard computing model according to the conditions of the system configuration and the like, and meanwhile, the task management module is connected with the block chain, so that the standard computing model can be updated in time and kept synchronous with other functional modules.
The invention also provides a distributed computing system based on data encryption, which comprises a demand terminal, a task management module, a computing terminal and a block chain intelligent contract, as shown in fig. 2.
A demand terminal: the task management module is used for initiating a calculation task request to the task management module;
a task management module: the system comprises a demand terminal, a computing terminal and a block chain intelligent contract, wherein the demand terminal is used for receiving a computing task request of the demand terminal, distributing and managing the computing task request, distributing the computing task to the computing terminal, and calling the block chain intelligent contract to complete transaction transfer of computing service cost and information uplink of computing service after the computing terminal completes the computing task;
a computing terminal: the system is used for applying for and executing the calculation task and obtaining the final payment cost of the calculation task;
block chains: and creating a block chain intelligent contract in the block chain by the task management module, wherein the block chain intelligent contract is used for calculating the cost actually paid to the computing terminal and calculating the uplink of the task information.
When the system runs, the demand terminal, the task management module and the computing terminal are respectively initialized.
Specifically, the task management module initializes and defines a standard calculation model set as { m }(1),m(2),…,m(K)The number collection of data input and output formats supported by the standard computing model is {1, 2, …, n }(K)}。
Wherein, K is the number of standard calculation models supported by the task management module, and the kth standard calculation model is m(k)The number of the data input and output formats of the model is n(k),k=1,2,…,K。
In this embodiment, taking an image target recognition calculation task as an example, the task management module defines two standard calculation models, namely a deep learning standard calculation model and a support vector machine standard calculation model, which are respectively denoted as m(1)、m(2)That is, the standard calculation model set defined by the task management module is denoted as { m(1),m(2)}。
The input and output formats of the image data of the two standard calculation models are respectively recorded as f(1)、f(2)Each standard calculation model supports 2 image data input and output formats, namely the number of the data input and output formats supported by the standard calculation modelThe collection is {2, 2}, and specifically, the data input and output formats of the two models are distributed as shown in table 1.
In table 1:
fi1 (1)=fi1 (2)=1920*1080,fi2 (1)=fi2 (2)=1280*960;
fo1 (1)、fo2 (1)、fo1 (2)、fo2 (2)are all in the form of { typeNum, obj1,confidence1…, typeNum is the number of identified types, obj1As the type name of the first object, confidence1The confidence coefficient of the first type of object is between 0 and 1, and the higher the value is, the higher the existence probability of the object is.
Meanwhile, the task management module creates a block chain intelligent contract on the block chain, and main function functions of the block chain intelligent contract comprise a service charge payment function for executing a calculation task and an information uplink function for executing the calculation task;
the service charge payment function of the calculation task is as follows:
Payment(addrreq,addrsrv,amount)
wherein:
addrreqthe block chain address of the demand terminal;
addrsrvcalculating the block chain address of the terminal;
amount is the service cost of the calculation task;
the information uplink function of the calculation task is:
Record(srvInfo)
the srvInfo comprises calculation task requirement information, block chain address information, requirement terminal confirmation signature information and block chain transaction information.
Then, the task management module allocates a random identification id to each computing terminal, taking the example of selecting 3 computing terminals and 1 demand terminal, the ids of the 3 computing terminals are respectively marked as id1, id2 and id3, and the 3 computing terminalsThe block chain addresses are respectively marked as addr1 srv、addr2 srv、addr3 srvThe block chain address of the demand terminal is noted as addrreq
Each computing terminal is initialized, and a standard computing model set { m } is obtained from the task management module(1),m(2)And sending the installation information of the standard calculation model to a task management module for registration, wherein the registration content comprises the following steps: the computing terminal identifies id, the computing terminal block chain address and a standard computing model set installed by the computing terminal, and reports the computing terminal block chain address addr to the task management module1 srv、addr2 srv、addr3 srv. And counting the registered contents of the computing terminal in a computing terminal service capability table, wherein the specific contents are shown in table 2.
Initializing a demand terminal, and acquiring a standard calculation model set { m ] from a task management module(1),m(2)And reporting the required terminal block chain address addr to the task management modulereq
The demand terminal is used for encrypting the data samples in the calculation tasks for the second time and then sending the data samples to the task management module, the task management module is used for receiving the calculation tasks, decrypting the data samples after the second encryption to obtain an initial encryption file and successfully verifying the initial encryption file, distributing the calculation tasks and the initial encryption file to the matched calculation terminals after encrypting the calculation tasks and the initial encryption file again according to the information reported by the calculation terminals, and executing the calculation tasks after decrypting the calculation terminals again to obtain the initial encryption file and successfully verifying the initial encryption file.
Specifically, the manner of cooperation among the demand terminal, the task management module, the computing terminal, and the block chain is as follows.
The demand terminal firstly initiates a calculation task request to the task management module, and the request process is as follows:
the standard calculation model used for the calculation task request is selected first.
For example, a deep learning model is used as the calculation task request model. Namely:
mreq=m(1)
and then selecting a data input and output format adopted by the deep learning model as follows:
freq=1
specifically, the data input format adopted by the deep learning model is selected to be fi1 (1)1920 × 1080, data output format fo1 (1)={typeNum,obj1,confidence1,…}。
Determining that the number N of data samples needing to be processed by the calculation task is 1000 and the highest service unit price PriceLimit is 10, and according to the number N of the data samples and the highest service unit price PriceLimit, the highest transfer amount of the demand terminal authorization task management module when the calculation service cost is paid is as follows: n × prince limit 1000 × 10 ═ 10000;
then selecting a homomorphic encryption function to each data sample d according to the operation characteristics and the calculated amount of the calculation taskjCarrying out homomorphic encryption to obtain initial encrypted data sample d ″j
d`j=HE(dj)
Wherein:
j=1,2,…,N;
HE () is a homomorphic encryption Fan-Vercauteren algorithm function;
computing initial encrypted data samples d ″jThe digest H, and the signature Sig,
H=digest(d`j)
Sig=f(H,PrivKeyreq)
wherein:
digest () is MD5() digest calculation function;
f () is an ECC () elliptic curve asymmetric cryptographic function;
PrivKeyreqa private key for asymmetric encryption of the demand terminal;
and using the public key of the task management module to match the original data sample d ″jAsymmetric encryption to obtain a first transit encrypted data sample D ″j
D`j=f`(d`j,PubKeytaskmgt)
Wherein:
f' () is an ECC () elliptic curve asymmetric encryption function;
PubKeytaskmgtasymmetrically encrypting and decrypting a public key for the task management module;
finally, m is putreq、freq、N、PriceLimit、D`jAnd the Sig and H calculation task request information are all sent to the task management module. Wherein, the initial encrypted data sample d' is processedjAsymmetric encryption is performed, and the digest signature is calculated, so that the initial encrypted data sample d' can be ensuredjAnd the data transmission process is not tampered by a third party.
Task management module utilizes its private key PrivKeytaskmgtDecrypting D' systemjTo obtain d-jAnd calculating d ″)jThe abstract H' of (1) is obtained by Sig and a public key PubKey of a required terminalreqTo obtain d-jThe abstract of (1) is H;
if H ═ H, the data verification passes, d ″jCan be transmitted to the computing terminal, otherwise the data verification fails, i.e. d ″jThe transfer fails.
The task management module adds the calculation task request information of the demand terminal to a task queue, and all the calculation terminals can access the queue to obtain the calculation task information so as to apply and bear the calculation tasks therein to obtain the calculation service cost.
The calculation task of the task queue of the task management module to the current demand terminal is described as follows:
Figure BDA0002326552150000171
the computing terminal checks the installed standard computing model, selects one or more computing tasks which can be met from the task queue, and reports computing service quotations which can be accepted by the computing terminal to the task management module based on the highest unit price information PriceLimit of the demand terminal.
Assuming that 3 computing terminals all meet the service capability requirement of the computing task TaskSeq1, and respectively give computing service cost quotations as follows:
Figure BDA0002326552150000172
therefore, the service quotation of the demand terminal TaskSeq1 by the computing terminal with the id of aIMH … GlsklPd is lowest, and the quotation time is earliest.
For a computing terminal which meets the service capability and initiates a computing task to carry out application, a task management module performs task allocation according to the principle of service price priority and application time priority; aiming at the same computing task, if the service price quotation and the application time of a plurality of computing terminals are the same, the task management module selects the computing terminal with high service online rate and system configuration to execute the computing task. According to the application results of the 3 computing terminals, the task management module selects the computing terminal with the id of aIMH … GlsklP as a service terminal, the quotation of the computing service is recorded as srvPrice ═ 6, and the block chain address of the computing terminal is addr1 srv
The task management module selects a computing terminal with id aIMH … GlsklP to execute a computing task, and the specific execution mode is as follows:
the task management module firstly uses the selected public key of the computing terminal to transmit the d ″jEncrypting to obtain a second intermediate transfer encrypted data sample D ″j
D``j=f``(d`j,PubKeycal)
Wherein:
f' is an ECC () elliptic curve asymmetric encryption function;
PubKeycalasymmetrically encrypting a public key for the computing terminal;
computing initial encrypted data samples d ″jThe digest H, and the signature Sig',
H=digest(d`j)
Sig`=f(H,PrivKeytaskmgt)
wherein:
digest () is MD5() digest calculation function;
f () is an ECC () elliptic curve asymmetric cryptographic function;
PrivKeytaskmgtan asymmetric encryption private key for the task management module;
the task management module encrypts a second transit encrypted data sample D' obtained by encryptionjInitial encrypted data samples d ″jAnd sending the signed abstract Sig' to the computing terminal.
Computing terminal PrivKey utilizing private key thereofcalDecrypting DjObtaining initial encrypted data sample d ″jAnd calculating d ″)jThe abstract H 'of (1) is used for passing through Sig' and a public key PubKey of a task management moduletaskmgtTo obtain d-jIf H ″ ═ H, the data verification passes, otherwise the data verification fails, i.e., d ″, the digest of (1) passesjThe transfer fails.
Then, the computing terminal obtains the d ″jThen, the function m is calculated according to the standard calculation model required in the calculation taskreqProcessing N initial encrypted data samples d' in a computational taskjObtaining the processing result rj
r`j=mreq(d`j)
Wherein: j is 1, 2, 3, …, N;
then r' is processed according to the data input and output format requirement supported by the standard calculation modeljFeeding back to the task management module, and informing the required terminal of the processing result r ″jAnd (4) confirmation:
the demand terminal decrypts r' by using homomorphic decryption functionjObtaining the original processing result rj
rj=HE-1(r`j)
Finally, the terminal is required to confirm the original processing result rjAfter completion, the processing result r' is calculatedjThe digest and the signature are carried out to obtain signature (r')j) Signature (r' is signedj) And sending the transaction data to a task management module to execute the transaction transfer of the calculated service charge.
The task management module receives the processing result r' of the required terminaljIs verified as a signature (r ″)j) Then, it is required to finishAnd calculating the payment from the terminal to the computing terminal, and linking the computing task information to the intelligent contract of the block chain.
The specific service fee payment method comprises the following steps:
firstly, the task management module calls a Payment function of a block chain intelligent contract to complete the secondary demand terminal address addrreqTo the computing terminal address addrsrvTransfer of (2):
Payment(addrreq,addrsrv,amount)
wherein the content of the first and second substances,
and calculating the actual service cost price of the terminal to be 6000.
Then, after the transaction is successfully transferred, the transaction hash value hash and the block height of the transaction are obtained.
The specific mode of calculating the task information uplink is as follows:
first, the task management module packages the uplink information of the current calculation task to obtain srvInfo, whose main contents are shown in table 3.
And then, the task management module calls Record function of the intelligent block chain contract and stores the related information of the computing service in the intelligent block chain contract, so that the full-flow information is ensured to be public, transparent and traceable.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all modifications and equivalents of the present invention, which are made by the contents of the present specification and the accompanying drawings, or directly/indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (9)

1. A distributed computing method based on data encryption is characterized by comprising the following steps:
step S1: the task management module defines a standard calculation model set, defines data input and output formats supported by each standard calculation model in the set, and simultaneously creates a block chain intelligent contract on a block chain; the computing terminal installs a standard computing model adapted to the computing terminal and registers the standard computing model to the task management module;
step S2: the demand terminal initiates a calculation task request, defines the number of data samples of the calculation task, and performs calculation on each data sample djSequentially carrying out secondary encryption to respectively obtain initial encrypted data samples d ″jAnd first transit encrypted data samples D ″j
Step S3: the task management module acquires the calculation task request information of the demand terminal, adds the calculation task request information into a task queue, and decrypts the first transfer encryption data sample D ″jObtaining initial encrypted data sample d ″j
Step S4: the computing terminal checks the standard computing model installed therein, selects one or more computing tasks which can be satisfied from the task queue, reports the computing tasks and the d 'to the task management module, and the task management module carries out the computing tasks and the d' according to a preset distribution principlejAfter encryption, distributing the encrypted data to a matched computing terminal;
step S5: the computing terminal decrypts the d' encrypted in the step S4jAnd after the verification is successful, d' is obtainedjProcessing d' according to standard calculation model required in calculation taskjObtaining the processing result rjAnd processing the result r ″jFeeding back to the task management module according to the data input and output format requirement;
step S6: the task management module informs the requirement terminal to confirm the processing result r ″jAfter the confirmation information is acquired, transferring the service cost of the calculation task from the address of the block chain of the demand terminal to the block chain address of the calculation terminal to complete the calculation task;
step S7: and packaging the related information of the calculation task and storing the related information in the intelligent contract of the block chain.
2. The distributed computing method based on data encryption according to claim 1, wherein in said step S1,
the task management module creates a block chain intelligent contract on a block chain, and main functional functions of the intelligent contract comprise a functional function for executing calculation of task service cost payment and a functional function for calculating task information uplink;
the function of calculating the payment of the task service fee is as follows:
Payment(addrreq,addrsrv,amount)
wherein:
addrreqthe block chain address of the demand terminal;
addrsrvcalculating the block chain address of the terminal;
amount is the service cost of the calculation task;
the information uplink function of the calculation task is:
Record(srvInfo)
the srvInfo comprises calculation task requirement information, block chain address information, requirement terminal confirmation signature information and block chain transaction information.
3. The distributed computing method based on data encryption according to claim 1, wherein in step S1, the task management module assigns a random identification id to each computing terminal, and each computing terminal sends the installation information of the standard computing model installed therein to the task management module for registration, and the registration includes: the method comprises the steps of identifying id by a computing terminal, calculating a block chain address of the computing terminal and calculating a standard computing model set installed by the computing terminal.
4. The distributed computing method based on data encryption according to claim 1, wherein in said step S1,
the task management module defines a standard calculation model set as m(1),m(2),…,m(K)And the number collection set of data input and output formats supported by the standard calculation model is { n }(1),n(2),…,n(K)}。
Wherein, K is the number of standard calculation models supported by the task management module, and the kth standard calculation model is m(k)The number of the data input and output formats of the model is n(k),k=1,2,…,K。
5. The distributed computing method according to claim 4, wherein in step S2, the process of the demand terminal initiating the computing task request to the task management module is:
s21: selecting a standard computing model for use in a computing task request
mreq=m(k)
S22: selecting the data input/output format adopted by the standard calculation model in step S21
freq=i
Wherein, the value of i can be 1, 2, …, n(k)
S23: determining the number N of data samples needing to be processed by the calculation task and the highest service unit price PriceLimit, and according to the number N of the data samples and the highest service unit price PriceLimit, the highest transfer amount of the demand terminal authorization task management module when the calculation service cost is paid is as follows: n + PriceLimit;
s24: selecting a homomorphic encryption function to each data sample d according to the operation characteristics and the calculated amount of the calculation taskjCarrying out homomorphic encryption to obtain initial encrypted data sample d ″j
d`j=HE(dj)
Wherein:
j=1,2,…,N;
HE () is a homomorphic encryption function;
s25: computing initial encrypted data samples d ″jThe digest H, and the signature Sig,
H=digest(d`j)
Sig=f(H,PrivKeyreq)
wherein:
digest () is a digest calculation function;
f () is an asymmetric cryptographic function;
PrivKeyreqa private key for asymmetric encryption of the demand terminal;
s26: utilizing public key of task management module to make original data sample d ″jAsymmetric encryption to obtain a first transit encrypted data sample D ″j
D`j=f`(d`j,PubKeytaskmgt)
Wherein:
f' is an asymmetric cryptographic function;
PubKeytaskmgtasymmetrically encrypting a public key for the task management module;
s27: m is to bereq、freq、N、PriceLimit、D`jAnd the Sig and H calculation task request information are all sent to the task management module.
6. The distributed computing method based on data encryption according to claim 5, wherein in said step S3,
task management module utilizes its private key PrivKeytaskmgtDecrypting D' systemjTo obtain d-jAnd calculating d ″)jThe abstract H' of (1) is obtained by Sig and a public key PubKey of a required terminalreqTo obtain d-jThe abstract of (1) is H;
if H ═ H, the data verification passes, d ″jAnd the data can be transmitted to the computing terminal, otherwise, the data verification fails.
7. The data encryption-based distributed computing method according to claim 6, wherein in the steps S4 and S5,
the task management module performs task allocation according to the principle of service price priority and application time priority; aiming at the same computing task, if the service price quotation and the application time of a plurality of computing terminals are the same, the task management module selects the computing terminal with high service online rate and system configuration to execute the computing task;
the specific way for the computing terminal to execute the computing task is as follows:
s51: the task management module uses the selected public key of the computing terminal to transmit the d ″)jEncrypting and calculating d ″)jThe corresponding abstract H is signed with a signature Sig' and then is sent to the selected computing terminal; the selected computing terminal uses its private key to decrypt and obtain d ″, againjAnd calculating d ″)jThe abstract H ' of (a) is solved to d ' through Sig ' and the public key of the task management modulejIf H ″) is H, the data verification is passedOtherwise, the data verification fails, i.e. d ″jA delivery failure;
s52: the computing terminal obtains the d ″)jComputing the function m according to a standard computing model required in the computing taskreqProcessing N initial encrypted data samples d' in a computational taskjObtaining the processing result rj
r`j=mreq(d`j)
Wherein: j is 1, 2, 3, …, N;
s53: r' is required to be converted according to the data input and output format supported by the standard calculation modeljFeeding back to the task management module, and informing the required terminal of the processing result r ″jAnd (4) confirmation:
s54: the demand terminal decrypts r' by using homomorphic decryption functionjObtaining the original processing result rj
rj=HE-1(r`j)
S55: requiring the terminal to confirm the original processing result rjAfter completion, the processing result r' is calculatedjThe digest and the signature are carried out to obtain signature (r')j) Signature (r' is signedj) And sending the data to a task management module.
8. A distributed computing system based on data encryption, comprising:
a demand terminal: the task management module is used for initiating a calculation task request to the task management module;
a task management module: the system comprises a demand terminal, a computing terminal and a block chain intelligent contract, wherein the demand terminal is used for receiving a computing task request of the demand terminal, distributing and managing the computing task request, distributing the computing task to the computing terminal, and calling the block chain intelligent contract to complete transaction transfer of computing service cost and information uplink of computing service after the computing terminal completes the computing task;
a computing terminal: the system is used for applying for and executing the calculation task and obtaining the final payment cost of the calculation task;
block chains: and creating a block chain intelligent contract in the block chain by the task management module, wherein the block chain intelligent contract is used for calculating the cost actually paid to the computing terminal and calculating the uplink of the task information.
9. The distributed computing system based on data encryption of claim 8,
the demand terminal is used for encrypting the data samples in the calculation tasks for the second time and then sending the data samples to the task management module, the task management module is used for receiving the calculation tasks, decrypting the data samples after the second encryption to obtain an initial encryption file and successfully verifying the initial encryption file, distributing the calculation tasks and the initial encryption file to the matched calculation terminals after encrypting the calculation tasks and the initial encryption file again according to the information reported by the calculation terminals, and executing the calculation tasks after decrypting the calculation terminals again to obtain the initial encryption file and successfully verifying the initial encryption file.
CN201911323932.9A 2019-12-19 2019-12-19 Distributed computing method and system based on data encryption Active CN110995408B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911323932.9A CN110995408B (en) 2019-12-19 2019-12-19 Distributed computing method and system based on data encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911323932.9A CN110995408B (en) 2019-12-19 2019-12-19 Distributed computing method and system based on data encryption

Publications (2)

Publication Number Publication Date
CN110995408A true CN110995408A (en) 2020-04-10
CN110995408B CN110995408B (en) 2023-08-15

Family

ID=70074297

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911323932.9A Active CN110995408B (en) 2019-12-19 2019-12-19 Distributed computing method and system based on data encryption

Country Status (1)

Country Link
CN (1) CN110995408B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111383019A (en) * 2020-05-28 2020-07-07 支付宝(杭州)信息技术有限公司 Transaction execution method and system based on alliance link network
CN111556147A (en) * 2020-04-27 2020-08-18 中国银行股份有限公司 Block chain-based calculation method and device
CN111625231A (en) * 2020-05-27 2020-09-04 哈尔滨云天智旅大数据有限公司 Software development method based on data security
CN113162752A (en) * 2021-04-26 2021-07-23 建信金融科技有限责任公司 Data processing method and device based on hybrid homomorphic encryption
CN113987561A (en) * 2021-09-18 2022-01-28 京信数据科技有限公司 Trusted execution environment-based private data classification method, system and terminal
CN116484398A (en) * 2023-03-15 2023-07-25 香港理工大学深圳研究院 Encryption verification method and system based on chameleon hash

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109426952A (en) * 2017-08-22 2019-03-05 汇链丰(北京)科技有限公司 A kind of block chain framework
CN109660358A (en) * 2019-01-08 2019-04-19 余炀 A kind of data circulation method based on block chain and secure execution environments
US20190173854A1 (en) * 2017-11-22 2019-06-06 Michael Beck Decentralized information sharing network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109426952A (en) * 2017-08-22 2019-03-05 汇链丰(北京)科技有限公司 A kind of block chain framework
US20190173854A1 (en) * 2017-11-22 2019-06-06 Michael Beck Decentralized information sharing network
CN109660358A (en) * 2019-01-08 2019-04-19 余炀 A kind of data circulation method based on block chain and secure execution environments

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556147A (en) * 2020-04-27 2020-08-18 中国银行股份有限公司 Block chain-based calculation method and device
CN111625231A (en) * 2020-05-27 2020-09-04 哈尔滨云天智旅大数据有限公司 Software development method based on data security
CN111625231B (en) * 2020-05-27 2021-02-26 哈尔滨云天智旅大数据有限公司 Software development method based on data security
CN111383019A (en) * 2020-05-28 2020-07-07 支付宝(杭州)信息技术有限公司 Transaction execution method and system based on alliance link network
WO2021239066A1 (en) * 2020-05-28 2021-12-02 支付宝(杭州)信息技术有限公司 Consortium blockchain network-based transaction execution method, and system
CN113162752A (en) * 2021-04-26 2021-07-23 建信金融科技有限责任公司 Data processing method and device based on hybrid homomorphic encryption
CN113162752B (en) * 2021-04-26 2022-07-19 建信金融科技有限责任公司 Data processing method and device based on hybrid homomorphic encryption
CN113987561A (en) * 2021-09-18 2022-01-28 京信数据科技有限公司 Trusted execution environment-based private data classification method, system and terminal
CN116484398A (en) * 2023-03-15 2023-07-25 香港理工大学深圳研究院 Encryption verification method and system based on chameleon hash
CN116484398B (en) * 2023-03-15 2024-04-02 香港理工大学深圳研究院 Encryption verification method and system based on chameleon hash

Also Published As

Publication number Publication date
CN110995408B (en) 2023-08-15

Similar Documents

Publication Publication Date Title
CN110995408B (en) Distributed computing method and system based on data encryption
WO2022042301A1 (en) Data processing method and apparatus, smart device and storage medium
AU2019277292B2 (en) System and method for secure electronic transaction platform
US10067810B2 (en) Performing transactions between application containers
CN111770200B (en) Information sharing method and system
CN110766406B (en) Resource transfer method, resource transfer device, storage medium and electronic equipment
AU2014279915B2 (en) System and method for encryption
WO2021239089A1 (en) Transaction processing method, apparatus, device and system
CN114884697B (en) Data encryption and decryption method and related equipment based on cryptographic algorithm
CN114500093B (en) Safe interaction method and system for message information
WO2022156594A1 (en) Federated model training method and apparatus, electronic device, computer program product, and computer-readable storage medium
CN112910660A (en) Certificate issuing method, adding method and transaction processing method of blockchain system
CN114219490A (en) Transaction behavior data updating method, device, equipment and storage medium
CN110599270A (en) Electronic bill generation method and device and computer equipment
WO2016067224A1 (en) System for electronic commerce using gold
CN111291420B (en) Distributed off-link data storage method based on block chain
CN109948370A (en) A kind of method for processing business based on block chain, device and electronic equipment
CN117121037A (en) Method and system for atomic exchange of blockchain assets using temporary key pairs
US11924178B2 (en) Method and system for secure information distribution based on group shared key
CN114021162A (en) Computing power sharing method, device, system, electronic equipment and storage medium
CN112788555B (en) Cross-operator telephone charge transfer settlement method, device and computing equipment
CN110276693B (en) Insurance claim settlement method and system
CN107911220B (en) Signature method, signature device and terminal equipment
CN114357472B (en) Data tagging method, system, electronic device and readable storage medium
US20220366381A1 (en) System and method for distributed storage of transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230330

Address after: 528313 401-118, 4th Floor, Building 18, Shunlian Machinery City, No. 18, Xingye 4th Road, Guanglong Industrial Park, Chihua Neighborhood Committee, Chencun Town, Shunde District, Foshan City, Guangdong Province

Applicant after: Linker Technology (Foshan) Co.,Ltd.

Address before: 1303-1305, 13 / F, block B2, building 9, Shenzhen Bay science and technology ecological park, 1819 Shahe West Road, Yuehai street, Nanshan District, Shenzhen, Guangdong 518000

Applicant before: SHENZHEN COOS Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230524

Address after: 518000 Building A, Building 1, Shenzhen International Innovation Valley, Dashi 1st Road, Xili Community, Xili Street, Nanshan District, Shenzhen City, Guangdong Province, 1001

Applicant after: Shenzhen Qianshu Technology Co.,Ltd.

Address before: 528313 401-118, 4th Floor, Building 18, Shunlian Machinery City, No. 18, Xingye 4th Road, Guanglong Industrial Park, Chihua Neighborhood Committee, Chencun Town, Shunde District, Foshan City, Guangdong Province

Applicant before: Linker Technology (Foshan) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant