CN111291339A - Processing method, device and equipment of block chain data and storage medium - Google Patents

Processing method, device and equipment of block chain data and storage medium Download PDF

Info

Publication number
CN111291339A
CN111291339A CN202010102467.2A CN202010102467A CN111291339A CN 111291339 A CN111291339 A CN 111291339A CN 202010102467 A CN202010102467 A CN 202010102467A CN 111291339 A CN111291339 A CN 111291339A
Authority
CN
China
Prior art keywords
eid
signature
application
user
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010102467.2A
Other languages
Chinese (zh)
Other versions
CN111291339B (en
Inventor
闵晓琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI F-ROAD COMMERCIAL SERVICES CO LTD
Original Assignee
SHANGHAI F-ROAD COMMERCIAL SERVICES CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI F-ROAD COMMERCIAL SERVICES CO LTD filed Critical SHANGHAI F-ROAD COMMERCIAL SERVICES CO LTD
Priority to CN202010102467.2A priority Critical patent/CN111291339B/en
Publication of CN111291339A publication Critical patent/CN111291339A/en
Application granted granted Critical
Publication of CN111291339B publication Critical patent/CN111291339B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The embodiment of the invention discloses a method, a device and equipment for processing block chain data and a storage medium. Wherein, the method comprises the following steps: processing the target data according to the user operation; acquiring a user eID mark associated with the block chain application from an eID server; determining a hash result of the target data, and generating an application signature instruction comprising the hash result; sending a signature application instruction to an eID server to instruct the eID server to execute the following steps: checking a message applying a signature instruction; if the verification is passed, generating a signature instruction comprising a hash result; if the signature instruction is received from the eID server, the signature instruction is sent to the eID module so as to instruct the eID module to determine signature data according to the hash result and the user key; and writing the processing result of the target data, the eID of the user and the signature data into a block chain in an associated manner. The identification of the user identity in the block chain data is realized, and the supervision requirement is met.

Description

Processing method, device and equipment of block chain data and storage medium
Technical Field
The present invention relates to computer technologies, and in particular, to a method, an apparatus, a device, and a storage medium for processing block chain data.
Background
With the increase of the supervision, the supervision organization requires that the block chain data of the user have identity characteristics, and the user identity can be identified and authenticated.
In the prior art, a supervising Authority wants to identify a user identity, and needs to adopt a Certificate mechanism, and use a trusted Authority CA (digital Certificate Authority) to bind a user public key and user identity information for identity authentication and identification.
However, in the prior art, the block chain technology does not have an identity authentication function, identity information cannot be directly associated with data operation of a user in a block chain by adopting a certificate mechanism for identity authentication, the identity authentication process is complicated, traceability and visualization of signature data cannot be realized, and the supervision requirement is difficult to meet.
Disclosure of Invention
The embodiment of the invention provides a processing method, a device, equipment and a storage medium of block chain data, wherein a block chain application acquires an electronic Identity (eID) identifier of a user, sends a hash result of target data to an eID module according to a signature instruction of an eID server to calculate signature data, and writes a target data processing result, the eID identifier of the user and the signature data into the block chain together to realize traceability and visualization of the signature data and meet the supervision requirement on the Identity of the user.
In a first aspect, an embodiment of the present invention provides a method for processing blockchain data, where the method is executed by a blockchain application, and the method includes:
processing the target data according to the user operation;
acquiring a user eID mark associated with the block chain application from an eID server;
determining a hash result of the target data, and generating an application signature instruction comprising the hash result;
sending the application signature instruction to an eID server to instruct the eID server to execute the following steps: checking the message of the signature application instruction; if the verification is passed, generating a signature instruction comprising the hash result;
if the signature instruction is received from the eID server, the signature instruction is sent to the eID module to indicate the eID module to determine signature data according to the hash result and a user key;
and writing the processing result of the target data, the eID of the user and the signature data into a block chain in an associated manner.
In a second aspect, an embodiment of the present invention further provides a method for processing blockchain data, where the method is performed by an eID server, and the method includes:
sending a user eID associated with a blockchain application to the blockchain application;
receiving a signature application instruction sent by the block chain application, and verifying a message of the signature application instruction;
if the verification is passed, generating a signature instruction comprising the hash result;
and sending the signature instruction to a blockchain application to instruct the blockchain application to forward the signature instruction to an eID module to instruct the eID module to determine signature data according to the hash result and a user key, and writing a processing result of the target data, the user eID and the signature data into a blockchain in an associated manner by the blockchain application.
In a third aspect, an embodiment of the present invention further provides a method for processing block chain data, where the method is executed by an eID module, and the method includes:
if a signature instruction which comprises a hash result and is forwarded by the block chain application is received, determining signature data according to the hash result and a user key; the hash result is obtained by performing hash processing on target data; the signature instruction is generated when the eID server verifies that a message applying the signature instruction passes;
and sending the signature data to a blockchain application to instruct the blockchain application to write the processing result of the target data, the user eID and the signature data into a blockchain in an associated manner.
In a fourth aspect, an embodiment of the present invention further provides an apparatus for processing blockchain data, configured on a blockchain application, where the apparatus includes:
the target data processing module is used for processing the target data according to user operation;
the eID acquisition module is used for acquiring a user eID associated with the block chain application from an eID server;
the signature application instruction generation module is used for determining a hash result of the target data and generating a signature application instruction comprising the hash result;
the signature application instruction sending module is used for sending the signature application instruction to an eID server to indicate the eID server to execute the following steps: checking the message of the signature application instruction; if the verification is passed, generating a signature instruction comprising the hash result;
the signature instruction receiving module is used for sending the signature instruction to the eID module to indicate the eID module to determine signature data according to the hash result and a user key if the signature instruction is received from the eID server;
and the data writing module is used for writing the processing result of the target data, the user eID and the signature data into a block chain in an associated manner.
In a fifth aspect, an embodiment of the present invention further provides a device for processing blockchain data, where the device is configured on an eID server, and the device includes:
the user eID sending module is used for sending a user eID associated with the block chain application to the block chain application;
the signature application instruction checking module is used for receiving a signature application instruction sent by the block chain application and checking a message of the signature application instruction;
the signature instruction generating module is used for generating a signature instruction comprising the hash result if the verification is passed;
and the signature instruction sending module is used for sending the signature instruction to a block chain application to instruct the block chain application to forward the signature instruction to an eID module so as to instruct the eID module to determine signature data according to the hash result and a user key, and the block chain application writes the processing result of the target data, the user eID and the signature data into a block chain in an associated manner.
In a sixth aspect, an embodiment of the present invention further provides a device for processing block chain data, where the device is configured on an eID module, and the device includes:
the signature data determining module is used for determining signature data according to the hash result and the user key if a signature instruction which comprises the hash result and is forwarded by the block chain application is received; the hash result is obtained by performing hash processing on target data; the signature instruction is generated when the eID server verifies that a message applying the signature instruction passes;
and the signature data sending module is used for sending the signature data to a block chain application so as to instruct the block chain application to write the processing result of the target data, the user eID and the signature data into a block chain in an associated manner.
In a seventh aspect, an embodiment of the present invention further provides a computer device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the block chain data processing method according to any embodiment of the first, second, and third aspects of the present invention.
In an eighth aspect, the present invention further provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the method for processing blockchain data according to any embodiment of the first, second or third aspect of the present invention.
The embodiment of the invention processes target data through user operation on the block chain application, obtains user eID identification associated with the block chain application from an eID server, calculates the Hash result of the target data, sends a signature application instruction carrying the Hash result to the eID server, and receives the signature instruction of the eID server. And sending the signature instruction to an eID module, calculating the signature data of the user by the eID module, and writing the processing result of the target data, the eID identification of the user and the signature data into a block chain after the block chain is applied to receiving the signature data. The problem of among the prior art, can't look over the user identity of data on the block chain is solved, through the traceable function of block chain, look over user eID sign and signature data, satisfied the supervision demand to the user.
Drawings
Fig. 1 is a flowchart illustrating a method for processing blockchain data according to a first embodiment of the present invention;
fig. 2 is a flowchart illustrating a block chain data processing method according to a second embodiment of the present invention;
fig. 3 is a flowchart illustrating a method for processing blockchain data according to a third embodiment of the present invention;
fig. 4 is a block diagram of a block chain data processing apparatus according to a fourth embodiment of the present invention;
fig. 5 is a block diagram of a block chain data processing apparatus according to a fifth embodiment of the present invention;
fig. 6 is a block diagram of a block chain data processing apparatus according to a sixth embodiment of the present invention;
FIG. 7 is a schematic structural diagram of a computer device in a seventh embodiment of the present invention;
fig. 8 is a schematic structural diagram of a computer device in an eighth embodiment of the present invention;
fig. 9 is a schematic structural diagram of a computer device in the ninth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart illustrating a method for processing blockchain data according to an embodiment of the present invention, where the method is applicable to a situation where data operations are performed on a blockchain, and the method can be executed by a blockchain data processing apparatus configured on a blockchain application. As shown in fig. 1, the method specifically includes the following steps:
and step 110, processing the target data according to the user operation.
The user performs operation on target data on the blockchain application as required, the blockchain application receives a data operation request of the user and processes the target data, and the target data is an operation object of the user. For example, the user may perform an editing operation such as addition or deletion of data in the blockchain application, or may perform a transaction operation in the financial field or the insurance field, and store the processing result of the target data.
Step 120, obtaining a user eID identification associated with the blockchain application from the eID server.
The method comprises the steps that after an eID index is obtained by a block chain application, a user eID identification obtaining request is sent to an eID server, the user eID identification obtaining request carries an eID index unique to a user, the eID index is obtained from eID modules capable of being in communication connection through the block chain application, each eID module can be equipment belonging to different users, and the eID index and a user key of the user are included. And the eID server searches for the user eID identification associated with the block chain application and the eID index and sends the user eID identification to the block chain application. The eID index is unique, and the eID identification can be changed according to different block chain applications.
Optionally, before obtaining the user eID identifier associated with the blockchain application from the eID server, the method further includes: and sending the attribute information of the block chain application to an eID server for indicating the eID server to establish an association relation between the eID index under the block chain application and the eID identifier of the user.
Specifically, the blockchain application is registered in an IDSP (Identity Service Provider), connected with an IDSP background according to an eID standard, and applies for eID services. The eID server receives attribute information of different blockchain applications, wherein the attribute information can comprise developers, development companies, network addresses and the like of the blockchain applications. After the block chain application is registered, the application of eID service is completed, and the eID server generates the association relation between the eID index and the eID identification of the user under different block chain applications. That is, under different blockchain applications, the same eID index corresponds to different user eID identifiers. For example, two block chain application attribute information, namely a block chain application a and a block chain application B, exist in the eID server, the eID index of the user is 001, under the block chain application a, the user eID identifier corresponding to the eID index 001 is 1, and under the block chain application B, the user eID identifier corresponding to the eID index 001 is 2. Different user eID identifications are used under different block chain applications, so that the problems of information leakage and the like caused by stealing of the user eID identifications can be prevented, and the protection of user privacy and information safety is facilitated.
Optionally, the eID index of the user is obtained from the connected eID module; the eID index is sent to an eID server to instruct the eID server to determine a user eID identification associated with the blockchain application and the eID index.
Specifically, communication connection can be established between the eID module and the block chain application, and after the eID module and the block chain application complete the establishment of the communication connection, the block chain application sends an eID index acquisition request to the eID module. The method comprises the steps that after an eID module receives an eID index acquisition request of a block chain application, an unique eID index in the eID module is sent to the block chain application, an eID index is stored in each eID module, and the eID module can be specially used for a user of the eID index. After receiving the eID index, the block chain application sends the eID index to an eID server, and sends a user eID identification acquisition request comprising the eID index to the eID server. And after receiving the user eID identification acquisition request, the eID server searches for the user eID identification associated with the eID index under the block chain application, and sends the user eID identification to the block chain application. By obtaining the eID index from the eID module, the accuracy of the eID index is ensured, and errors in searching the eID identification of the user are avoided.
Step 130, determining a hash result of the target data, and generating an application signature instruction comprising the hash result.
After receiving operation processing of a user on target data, the block chain application processes the target data according to a Hash algorithm and determines a Hash result of the target data. And after determining the hash result, the block chain application generates a signature application instruction carrying the hash result. The hash result of the target data calculated by the blockchain application may be before the user eID is obtained or after the user eID is obtained.
Step 140, sending a signature application instruction to the eID server to instruct the eID server to execute the following steps: checking a message applying a signature instruction; and if the verification is passed, generating a signature instruction comprising the hash result.
The method comprises the steps that a block chain application sends a signature applying instruction comprising a Hash result to an eID server, the eID server receives the signature applying instruction sent by the block chain application, and a message applying the signature instruction is verified according to a message verification rule in the eID server. If the message of the application signature command conforms to the message verification rule, the verification is passed, and the eID server generates the signature command carrying the hash result. If the message for applying the signature command does not accord with the message verification rule, the verification fails, and the eID server sends a signature forbidding command to the block chain application.
And step 150, if the signature instruction is received from the eID server, sending the signature instruction to the eID module to instruct the eID module to determine signature data according to the hash result and the user key.
The eID server sends the signature instruction including the hash result to the block chain application, and after the block chain application receives the signature instruction including the hash result, the eID server sends the signature instruction including the hash result to the eID module. After the eID module receives the signature command, the user can input the use password of the eID module on the eID module, if the password is correctly input, the user obtains the use permission of the eID module, and the eID module can calculate the signature data. The eID module obtains a hash result in the signature instruction, determines signature data of a user according to a user key and the hash result in the eID module, and sends the signature data to the block chain application.
And step 160, writing the processing result of the target data, the eID of the user and the signature data into a block chain in an associated manner.
The eID module sends signature data to the block chain application, the eID server sends a user eID identification to the block chain application, and the block chain application associates a processing result of the target data, the user eID identification and the signature data and writes the processing result, the user eID identification and the signature data into the block chain for storage. For example, if the processing result of the target data is 000, the user eID is identified as 1, and the signature data is 2, the content to be stored in the block chain is 000/1/2.
Optionally, after writing the processing result of the target data, the user eID identifier, and the signature data in the block chain in an associated manner, the method further includes: responding to an eID verification instruction of a user, sending a signature data verification request at least comprising signature data to be verified, a hash result of the data to be verified and an eID mark of the user to an eID server to indicate the eID server to verify; and receiving a verification result sent by the eID server.
Specifically, the blockchain application has a traceability function, and a user can search for the signature data stored before and verify the signature data stored before. The method comprises the steps that a block chain application responds to an eID verification instruction sent by a user and sends a signature data verification request to an eID server, wherein the signature data verification request at least comprises signature data to be verified, a Hash result of the data to be verified and a user eID, and the Hash result of the signature data to be verified and the Hash result of the data to be verified are the signature data and the Hash result of the part of the block chain to be verified. And the eID server receives a signature data verification request sent by the block chain application and searches a user key according to the eID identification of the user. The user key may be symmetric encryption or asymmetric encryption, for example, the user public key in asymmetric encryption. And verifying the signature data to be verified in the signature data verification request according to the user key to obtain a hash result to be verified of the signature data to be verified. Comparing the hash result of the data to be verified with the hash result to be verified, and if the comparison result is consistent, the signature data is correct; if the comparison result is not consistent, the signature data has a problem. And the eID server sends the verification result to the block chain application, and the block chain application receives the verification result and displays the verification result to the user. By sending the signature data verification request to the eID server by the block chain application, the signature data is traced and verified, the requirement for monitoring the data is favorably met, and the data protection degree and the data verification efficiency are improved.
According to the technical scheme, the target data are processed through user operation on the block chain application, user eID identification related to the block chain application is obtained from an eID server, a hash result of the target data is calculated, a signature application instruction carrying the hash result is sent to the eID server, and a signature instruction of the eID server is received. And sending the signature instruction to an eID module, calculating the signature data of the user by the eID module, and writing the processing result of the target data, the eID identification of the user and the signature data into a block chain after the block chain is applied to receiving the signature data. The problem of among the prior art, the user identity of data on the unable verification block chain is solved, adopt signature data to mark user identity for data on the block chain, signature data can avoid user identity to reveal at will. Through the traceable function of the block chain, the eID identification and the signature data of the user are checked, and the supervision requirements on the user and the data are met.
Example two
Fig. 2 is a flowchart illustrating a method for processing blockchain data according to a second embodiment of the present invention, where the method is applicable to a situation where data operations are performed in a blockchain, and the method can be executed by a blockchain data processing apparatus configured on an eID server. As shown in fig. 2, the method specifically includes the following steps:
step 210, sending the user eID identification associated with the blockchain application to the blockchain application.
The eID server receives an eID index sent by the block chain application, searches for a user eID mark associated with the block chain application and the eID index, and sends the user eID mark to the block chain application. The eID index is acquired from the eID module by the block chain application, and an eID index is stored in the eID module. The eID server can establish an association relation between eID indexes under different block chain applications and user eID identifications according to attribute information of the block chain applications received in advance, and after the eID indexes sent by the block chain applications are received, the user eID identifications are searched according to the association relation.
Step 220, receiving a signature application instruction sent by the block chain application, and checking a message of the signature application instruction.
The block chain application converts target data into a hash result after receiving target data processing operation of a user, and sends an application signature instruction including the hash result to the eID server. And the eID server receives the signature application instruction sent by the block chain application, and verifies the message applying the signature instruction according to the message verification rule of the eID server.
And step 230, if the verification is passed, generating a signature instruction comprising a hash result.
Step 240, sending a signature instruction to the blockchain application to instruct the blockchain application to forward the signature instruction to the eID module, so as to instruct the eID module to determine signature data according to the hash result and the user key, and writing the processing result of the target data, the user eID identification and the signature data into the blockchain by the blockchain application in an associated manner.
The eID server sends a signature instruction comprising a Hash result to the blockchain application, the blockchain application forwards the signature instruction to the eID module, the eID module determines signature data of the target data according to the Hash result in the signature instruction and a user key in the eID module and sends the signature data to the blockchain application, and the blockchain application writes a processing result of the target data, a user eID identification and the signature data into a blockchain in an associated mode.
Optionally, a signature data verification request sent by the blockchain application is received; the signature data verification request at least comprises signature data to be verified, a hash result of the data to be verified and user eID (identity); searching a user key according to the eID of the user; verifying the signature data to be verified according to the user key to obtain a hash result to be verified; and comparing the hash result of the data to be verified with the hash result to be verified to obtain a verification result.
Specifically, the user may view the historical data on the blockchain application and send a signature data verification request to the eID server. And the eID server receives the signature data verification request, acquires the eID of the user in the signature data verification request, and searches for a user key associated with the eID of the user. And converting the signature data to be verified into a hash result to be verified according to the user key and the signature data to be verified in the signature data verification request. And comparing the hash result to be verified with the hash result of the data to be verified in the signature data verification request to obtain a verification result. If the two are consistent, the signature data has no problem; if the data is inconsistent, the signature data is wrong, and the signature may be stolen. And the eID server sends the verification result to the block chain application, and the block chain application displays the verification result to the user for viewing. By verifying the signature data, the identity of the user in the historical data is recognized, and the supervision and inspection strength and the inspection efficiency are improved.
According to the embodiment of the invention, the association relation between the block chain application and the user eID is established by the eID server, and the user eID is sent to the block chain application, so that the user is ensured to have different user eID in each block chain application, and the user eID is prevented from being stolen. And the eID module is ensured to have the calculation authority of the signature data by checking the signature application instruction, and the signature data is supervised.
EXAMPLE III
Fig. 3 is a flowchart illustrating a method for processing blockchain data according to a third embodiment of the present invention, where the method is applicable to a situation where data operations are performed on a blockchain, and the method can be executed by a blockchain data processing apparatus configured on an eID module. As shown in fig. 3, the method specifically includes the following steps:
step 310, if a signature instruction which comprises a hash result and is forwarded by the block chain application is received, determining signature data according to the hash result and a user key; the hash result is obtained by performing hash processing on the target data; the signature command is generated when the eID server verifies that the message applying the signature command passes through.
The eID index acquisition method comprises the steps that a block chain application sends an eID index acquisition request to an eID module, the eID module sends an eID index to the block chain application, the block chain application sends an eID index to an eID server, and a user eID identification associated with the block chain application and the eID index is acquired from the eID server. After receiving the operation processing of the target data by the user, the block chain application performs hash processing on the target data according to a hash algorithm to obtain a hash result. The block chain application sends a signature application instruction including a hash result to the eID server, the eID server verifies that a message applying the signature instruction passes through, the signature instruction is sent to the block chain application, the block chain application forwards the signature instruction to the eID module, and the signature instruction also includes the hash result. The user inputs the use password for using the eID module on the eID module, and the eID module can calculate the signature data only after the password is correct. And the eID module calculates the signature data of the hash result according to the hash result and the user key in the eID module.
And step 320, sending signature data to the blockchain application to instruct the blockchain application to write the processing result of the target data, the user eID and the signature data into the blockchain in an associated manner.
After the eID module obtains the signature data, the signature data are sent to the block chain application, and the block chain application stores the processing result of the target data, the user eID and the signature data in an associated manner and writes the processing result, the user eID and the signature data into the block chain.
According to the embodiment of the invention, the eID module receives the signature command sent by the blockchain application, determines the signature data according to the hash result and the user key, and sends the signature data to the blockchain application for storage. The method and the device realize the correlated storage of the signature data of the user when the target data is stored in the block chain, so that the user data can be monitored at any time, the problem that a certificate mechanism is required to be adopted in the prior art is solved, the operation steps of monitoring are reduced, and the monitoring efficiency is improved.
Example four
Fig. 4 is a block diagram of a block chain data processing apparatus according to a fourth embodiment of the present invention, configured on a block chain application, capable of executing the block chain data processing method according to the first embodiment of the present invention, and having functional modules and beneficial effects corresponding to the execution method. As shown in fig. 4, the apparatus specifically includes:
a target data processing module 401, configured to process target data according to a user operation;
an eID identifier obtaining module 402, configured to obtain, from an eID server, an eID identifier of a user associated with a blockchain application;
an application signature instruction generation module 403, configured to determine a hash result of the target data, and generate an application signature instruction including the hash result;
a signature application instruction sending module 404, configured to send a signature application instruction to the eID server to instruct the eID server to execute the following steps: checking a message applying a signature instruction; if the verification is passed, generating a signature instruction comprising a hash result;
the signature instruction receiving module 405 is configured to send a signature instruction to the eID module if the signature instruction is received from the eID server, so as to instruct the eID module to determine signature data according to the hash result and the user key;
and a data writing module 406, configured to write the processing result of the target data, the user eID identifier, and the signature data into the block chain in an associated manner.
Optionally, the apparatus further comprises:
and the attribute information sending module is used for sending the attribute information of the block chain application to the eID server and indicating the eID server to establish the association relationship between the eID index under the block chain application and the eID identifier of the user.
Optionally, the apparatus further comprises:
the system comprises a signature data verification request sending module, a signature verification module and an eID verification module, wherein the signature data verification request sending module is used for responding to an eID verification instruction of a user and sending a signature data verification request at least comprising signature data to be verified, a Hash result of the data to be verified and an eID of the user to an eID server so as to indicate the eID server to verify;
and the verification result receiving module is used for receiving the verification result sent by the eID server.
Optionally, the eID identifier obtaining module 402 is specifically configured to:
acquiring eID indexes of the user from the connected eID modules;
the eID index is sent to an eID server to instruct the eID server to determine a user eID identification associated with the blockchain application and the eID index.
The embodiment of the invention processes target data through user operation on the block chain application, obtains user eID identification associated with the block chain application from an eID server, calculates the Hash result of the target data, sends a signature application instruction carrying the Hash result to the eID server, and receives the signature instruction of the eID server. And sending the signature instruction to an eID module, calculating the signature data of the user by the eID module, and writing the processing result of the target data, the eID identification of the user and the signature data into a block chain after the block chain is applied to receiving the signature data. The problem of among the prior art, can't look over the user identity of data on the block chain is solved, for data mark user identity on the block chain, through the traceable function of block chain, look over user eID sign and signature data, satisfied the supervision demand to user and data.
EXAMPLE five
Fig. 5 is a block diagram of a block chain data processing apparatus according to a fifth embodiment of the present invention, configured on an eID server, which is capable of executing the block chain data processing method according to a second embodiment of the present invention, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 5, the apparatus specifically includes:
a user eID identifier sending module 501, configured to send a user eID identifier associated with the blockchain application to the blockchain application;
a signature application instruction verification module 502, configured to receive a signature application instruction sent by a block chain application, and verify a message of the signature application instruction;
a signature instruction generating module 503, configured to generate a signature instruction including a hash result if the verification passes;
the signature instruction sending module 504 is configured to send a signature instruction to the blockchain application to instruct the blockchain application to forward the signature instruction to the eID module, instruct the eID module to determine signature data according to the hash result and the user key, and write the processing result of the target data, the user eID identifier, and the signature data into the blockchain in an associated manner by the blockchain application.
Optionally, the apparatus further comprises:
the signature data verification request receiving module is used for receiving a signature data verification request sent by the block chain application; the signature data verification request at least comprises signature data to be verified, a hash result of the data to be verified and user eID (identity);
the user key searching module is used for searching a user key according to the eID of the user;
the hash result to be verified determining module is used for verifying the signature data to be verified according to the user key to obtain a hash result to be verified;
and the verification result determining module is used for comparing the hash result of the data to be verified with the hash result to be verified to obtain a verification result.
According to the embodiment of the invention, the association relation between the block chain application and the user eID is established by the eID server, and the user eID is sent to the block chain application, so that the user is ensured to have different user eID in each block chain application, and the user eID is prevented from being stolen. And the eID module is ensured to have the calculation authority of the signature data by checking the signature application instruction, and the signature data is supervised.
EXAMPLE six
Fig. 6 is a block diagram of a block chain data processing apparatus according to a sixth embodiment of the present invention, configured on an eID module, which is capable of executing the block chain data processing method according to the sixth embodiment of the present invention, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 6, the apparatus specifically includes:
a signature data determining module 601, configured to determine, if a signature instruction including a hash result forwarded by a blockchain application is received, signature data according to the hash result and a user key; the hash result is obtained by performing hash processing on the target data; the signature instruction is generated when the eID server verifies that a message applying the signature instruction passes;
a signature data sending module 602, configured to send signature data to the blockchain application to instruct the blockchain application to write the processing result of the target data, the user eID identifier, and the signature data in the blockchain in an associated manner.
According to the embodiment of the invention, the eID module receives the signature command sent by the blockchain application, determines the signature data according to the hash result and the user key, and sends the signature data to the blockchain application for storage. The method and the device realize that the signature data of the user is obtained when the target data is stored in the block chain, so that the user data can be monitored at any time, the problem that a certificate mechanism is required to be adopted in the prior art is solved, the operation steps of monitoring are reduced, and the monitoring efficiency is improved.
EXAMPLE seven
Fig. 7 is a schematic structural diagram of a computer device according to a seventh embodiment of the present invention. FIG. 7 illustrates a block diagram of an exemplary computer device 700 suitable for use in implementing embodiments one and four of the present invention. The computer device 700 shown in fig. 7 is only an example and should not bring any limitation to the function and scope of use of the embodiments of the present invention.
As shown in fig. 7, the computer device 700 is in the form of a general purpose computing device. The components of the computer device 700 may include, but are not limited to: one or more processors or processing units 701, a system memory 702, and a bus 703 that couples various system components including the system memory 702 and the processing unit 701.
Bus 703 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer device 700 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer device 700 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 702 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)704 and/or cache memory 705. The computer device 700 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, the storage system 706 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 7, commonly referred to as a "hard drive"). Although not shown in FIG. 7, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 703 via one or more data media interfaces. Memory 702 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments one and four of the present invention.
A program/utility 708 having a set (at least one) of program modules 707 may be stored, for example, in memory 702, such program modules 707 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. The program modules 707 generally perform the functions and/or methodologies of the first and fourth embodiments of the present invention as described herein.
The computer device 700 may also communicate with one or more external devices 709 (e.g., keyboard, pointing device, display 710, etc.), with one or more devices that enable a user to interact with the computer device 700, and/or with any devices (e.g., network card, modem, etc.) that enable the computer device 700 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 711. Moreover, computer device 700 may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network such as the Internet) via network adapter 712. As shown, the network adapter 712 communicates with the other modules of the computer device 700 over a bus 703. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the computer device 700, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 701 executes various functional applications and data processing by running a program stored in the system memory 702, for example, to implement the block chain data processing method provided in the first and fourth embodiments of the present invention, including:
processing the target data according to the user operation;
acquiring a user eID mark associated with the block chain application from an eID server;
determining a hash result of the target data, and generating an application signature instruction comprising the hash result;
sending a signature application instruction to an eID server to instruct the eID server to execute the following steps: checking a message applying a signature instruction; if the verification is passed, generating a signature instruction comprising a hash result;
if the signature instruction is received from the eID server, the signature instruction is sent to the eID module so as to instruct the eID module to determine signature data according to the hash result and the user key;
and writing the processing result of the target data, the eID of the user and the signature data into a block chain in an associated manner.
Example eight
Fig. 8 is a schematic structural diagram of a computer device according to an eighth embodiment of the present invention. Fig. 8 illustrates a block diagram of an exemplary computer device 800 suitable for use in implementing embodiments two and five of the present invention. The computer device 800 shown in fig. 8 is only an example and should not bring any limitations to the functionality or scope of use of the embodiments of the present invention.
As shown in fig. 8, computer device 800 is in the form of a general purpose computing device. The components of computer device 800 may include, but are not limited to: one or more processors or processing units 801, a system memory 802, and a bus 803 that couples various system components including the system memory 802 and the processing unit 801.
Bus 803 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer device 800 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer device 800 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 802 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)804 and/or cache memory 805. The computer device 800 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 806 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 8, and commonly referred to as a "hard drive"). Although not shown in FIG. 8, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to the bus 803 by one or more data media interfaces. Memory 802 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments two and five of the invention.
A program/utility 808 having a set (at least one) of program modules 807 may be stored, for instance, in memory 802, such program modules 807 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may include an implementation of a network environment. Program modules 807 generally implement the functions and/or methodologies of embodiments two and five described herein.
The computer device 800 may also communicate with one or more external devices 809 (e.g., keyboard, pointing device, display 810, etc.), with one or more devices that enable a user to interact with the computer device 800, and/or with any devices (e.g., network card, modem, etc.) that enable the computer device 800 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 811. Moreover, computer device 800 may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network such as the Internet) via network adapter 812. As shown, the network adapter 812 communicates with the other modules of the computer device 800 via the bus 803. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the computer device 800, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 801 executes various functional applications and data processing by running programs stored in the system memory 802, for example, implementing the block chain data processing method provided in the second and fifth embodiments of the present invention, including:
sending a user eID (identity) associated with the blockchain application to the blockchain application;
receiving a signature application instruction sent by a block chain application, and verifying a message of the signature application instruction;
if the verification is passed, generating a signature instruction comprising a hash result;
and sending a signature instruction to the blockchain application to instruct the blockchain application to forward the signature instruction to the eID module so as to instruct the eID module to determine signature data according to the hash result and the user key, and writing the processing result of the target data, the user eID identification and the signature data into the blockchain by the blockchain application in an associated manner.
Example nine
Fig. 9 is a schematic structural diagram of a computer device according to a ninth embodiment of the present invention. Fig. 9 illustrates a block diagram of an exemplary computer device 900 suitable for use in implementing embodiments three and six of the present invention. The computer device 900 shown in fig. 9 is only an example and should not bring any limitations to the functionality or scope of use of the embodiments of the present invention.
As shown in fig. 9, computer device 900 is embodied in a general purpose computing device. The components of computer device 900 may include, but are not limited to: one or more processors or processing units 901, a system memory 902, and a bus 903 that couples the various system components including the system memory 902 and the processing unit 901.
Bus 903 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer device 900 typically includes a variety of computer system readable media. Such media can be any available media that is accessible by computer device 900 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 902 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)904 and/or cache memory 905. Computer device 900 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 906 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 9, and commonly referred to as a "hard drive"). Although not shown in FIG. 9, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to the bus 903 by one or more data media interfaces. Memory 902 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments three and six of the present invention.
A program/utility 908 having a set (at least one) of program modules 907, including but not limited to an operating system, one or more application programs, other program modules, and program data, may be stored in, for example, memory 902, each of which examples or some combination thereof may include an implementation of a network environment. Program modules 907 typically perform the functions and/or methodologies of embodiments three and six described herein.
The computer device 900 may also communicate with one or more external devices 909 (e.g., keyboard, pointing device, display 910, etc.), and may also communicate with one or more devices that enable a user to interact with the computer device 900, and/or with any devices (e.g., network card, modem, etc.) that enable the computer device 900 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interface 911. Moreover, computer device 900 may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network such as the Internet) via network adapter 912. As shown, the network adapter 912 communicates with the other modules of the computer device 900 over the bus 903. It should be appreciated that although not shown, other hardware and/or software modules may be used in conjunction with computer device 900, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 901 executes various functional applications and data processing by running programs stored in the system memory 902, for example, implementing the block chain data processing method provided by the third and sixth embodiments of the present invention, including:
if a signature instruction which comprises a hash result and is forwarded by the block chain application is received, determining signature data according to the hash result and a user key; the hash result is obtained by performing hash processing on the target data; the signature instruction is generated when the eID server verifies that a message applying the signature instruction passes;
and sending the signature data to the blockchain application to instruct the blockchain application to write the processing result of the target data, the user eID and the signature data into the blockchain in an associated manner.
Example ten
An embodiment tenth of the present invention further provides a storage medium containing computer-executable instructions, where the storage medium stores a computer program, and the computer program, when executed by a processor, implements the method for processing blockchain data according to the first, fourth, and seventh embodiments of the present invention, including:
processing the target data according to the user operation;
acquiring a user eID mark associated with the block chain application from an eID server;
determining a hash result of the target data, and generating an application signature instruction comprising the hash result;
sending a signature application instruction to an eID server to instruct the eID server to execute the following steps: checking a message applying a signature instruction; if the verification is passed, generating a signature instruction comprising a hash result;
if the signature instruction is received from the eID server, the signature instruction is sent to the eID module so as to instruct the eID module to determine signature data according to the hash result and the user key;
and writing the processing result of the target data, the eID of the user and the signature data into a block chain in an associated manner.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
EXAMPLE eleven
An eleventh embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the storage medium stores a computer program, and when the computer program is executed by a processor, the method for processing blockchain data according to the second, fifth, and eighth embodiments of the present invention includes:
sending a user eID (identity) associated with the blockchain application to the blockchain application;
receiving a signature application instruction sent by a block chain application, and verifying a message of the signature application instruction;
if the verification is passed, generating a signature instruction comprising a hash result;
and sending a signature instruction to the blockchain application to instruct the blockchain application to forward the signature instruction to the eID module so as to instruct the eID module to determine signature data according to the hash result and the user key, and writing the processing result of the target data, the user eID identification and the signature data into the blockchain by the blockchain application in an associated manner.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
Example twelve
An embodiment twelfth of the present invention further provides a storage medium containing computer-executable instructions, where a computer program is stored on the storage medium, and when the computer program is executed by a processor, the method for processing blockchain data provided in the third, sixth, and ninth embodiments of the present invention is implemented, where the method includes:
if a signature instruction which comprises a hash result and is forwarded by the block chain application is received, determining signature data according to the hash result and a user key; the hash result is obtained by performing hash processing on the target data; the signature instruction is generated when the eID server verifies that a message applying the signature instruction passes;
and sending the signature data to the blockchain application to instruct the blockchain application to write the processing result of the target data, the user eID and the signature data into the blockchain in an associated manner.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (12)

1. A method of processing blockchain data, performed by a blockchain application, the method comprising:
processing the target data according to the user operation;
acquiring a user eID mark associated with the block chain application from an eID server;
determining a hash result of the target data, and generating an application signature instruction comprising the hash result;
sending the application signature instruction to an eID server to instruct the eID server to execute the following steps: checking the message of the signature application instruction; if the verification is passed, generating a signature instruction comprising the hash result;
if the signature instruction is received from the eID server, the signature instruction is sent to the eID module to indicate the eID module to determine signature data according to the hash result and a user key;
and writing the processing result of the target data, the eID of the user and the signature data into a block chain in an associated manner.
2. The method of claim 1, prior to obtaining user eID identification associated with a blockchain application from an eID server, further comprising:
and sending the attribute information of the block chain application to the eID server, wherein the attribute information is used for indicating the eID server to establish an association relation between the eID index under the block chain application and the eID identifier of the user.
3. The method of claim 1, further comprising, after writing the processing result of the target data, the user eID identification, and the signature data association into a blockchain:
responding to an eID verification instruction of a user, and sending a signature data verification request at least comprising signature data to be verified, a hash result of the data to be verified and an eID mark of the user to an eID server to indicate the eID server to verify;
and receiving a verification result sent by the eID server.
4. The method of claim 1, wherein obtaining the user eID identification associated with the blockchain application from the eID server comprises:
acquiring eID indexes of the user from the connected eID modules;
sending the eID index to an eID server to instruct the eID server to determine a user eID identification associated with the blockchain application and the eID index.
5. A method for processing blockchain data, the method being performed by an eID server, the method comprising:
sending a user eID associated with a blockchain application to the blockchain application;
receiving a signature application instruction sent by the block chain application, and verifying a message of the signature application instruction;
if the verification is passed, generating a signature instruction comprising the hash result;
and sending the signature instruction to a blockchain application to instruct the blockchain application to forward the signature instruction to an eID module to instruct the eID module to determine signature data according to the hash result and a user key, and writing a processing result of the target data, the user eID and the signature data into a blockchain in an associated manner by the blockchain application.
6. The method of claim 5, further comprising:
receiving a signature data verification request sent by a block chain application; the signature data verification request at least comprises signature data to be verified, a hash result of the data to be verified and user eID (identity);
searching a user key according to the eID of the user;
verifying the signature data to be verified according to the user key to obtain a hash result to be verified;
and comparing the hash result of the data to be verified with the hash result to be verified to obtain a verification result.
7. A method for processing block chain data, wherein the method is executed by an eID module, and the method comprises the following steps:
if a signature instruction which comprises a hash result and is forwarded by the block chain application is received, determining signature data according to the hash result and a user key; the hash result is obtained by performing hash processing on target data; the signature instruction is generated when the eID server verifies that a message applying the signature instruction passes;
and sending the signature data to a blockchain application to instruct the blockchain application to write the processing result of the target data, the user eID and the signature data into a blockchain in an associated manner.
8. An apparatus for processing blockchain data, the apparatus configured to a blockchain application, the apparatus comprising:
the target data processing module is used for processing the target data according to user operation;
the eID acquisition module is used for acquiring a user eID associated with the block chain application from an eID server;
the signature application instruction generation module is used for determining a hash result of the target data and generating a signature application instruction comprising the hash result;
the signature application instruction sending module is used for sending the signature application instruction to an eID server to indicate the eID server to execute the following steps: checking the message of the signature application instruction; if the verification is passed, generating a signature instruction comprising the hash result;
the signature instruction receiving module is used for sending the signature instruction to the eID module to indicate the eID module to determine signature data according to the hash result and a user key if the signature instruction is received from the eID server;
and the data writing module is used for writing the processing result of the target data, the user eID and the signature data into a block chain in an associated manner.
9. An apparatus for processing blockchain data, configured on an eID server, the apparatus comprising:
the user eID sending module is used for sending a user eID associated with the block chain application to the block chain application;
the signature application instruction checking module is used for receiving a signature application instruction sent by the block chain application and checking a message of the signature application instruction;
the signature instruction generating module is used for generating a signature instruction comprising the hash result if the verification is passed;
and the signature instruction sending module is used for sending the signature instruction to a block chain application to instruct the block chain application to forward the signature instruction to an eID module so as to instruct the eID module to determine signature data according to the hash result and a user key, and the block chain application writes the processing result of the target data, the user eID and the signature data into a block chain in an associated manner.
10. An apparatus for processing blockchain data, configured on an eID module, the apparatus comprising:
the signature data determining module is used for determining signature data according to the hash result and the user key if a signature instruction which comprises the hash result and is forwarded by the block chain application is received; the hash result is obtained by performing hash processing on target data; the signature instruction is generated when the eID server verifies that a message applying the signature instruction passes;
and the signature data sending module is used for sending the signature data to a block chain application so as to instruct the block chain application to write the processing result of the target data, the user eID and the signature data into a block chain in an associated manner.
11. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the block chain data processing method of any one of claims 1 to 4, 5 to 6 or 7 when executing the program.
12. A storage medium containing computer-executable instructions for performing the blockchain data processing method of any one of claims 1 to 4, 5 to 6, or 7 when executed by a computer processor.
CN202010102467.2A 2020-02-19 2020-02-19 Method, device, equipment and storage medium for processing blockchain data Active CN111291339B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010102467.2A CN111291339B (en) 2020-02-19 2020-02-19 Method, device, equipment and storage medium for processing blockchain data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010102467.2A CN111291339B (en) 2020-02-19 2020-02-19 Method, device, equipment and storage medium for processing blockchain data

Publications (2)

Publication Number Publication Date
CN111291339A true CN111291339A (en) 2020-06-16
CN111291339B CN111291339B (en) 2024-02-06

Family

ID=71027489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010102467.2A Active CN111291339B (en) 2020-02-19 2020-02-19 Method, device, equipment and storage medium for processing blockchain data

Country Status (1)

Country Link
CN (1) CN111291339B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112131599A (en) * 2020-09-15 2020-12-25 北京海益同展信息科技有限公司 Method, device, equipment and computer readable medium for checking data
CN112182609A (en) * 2020-09-25 2021-01-05 中国建设银行股份有限公司 Block chain-based data uplink storage method and tracing method, device and equipment
CN112181983A (en) * 2020-09-24 2021-01-05 中国建设银行股份有限公司 Data processing method, device, equipment and medium
CN113612766A (en) * 2021-07-30 2021-11-05 北京锐安科技有限公司 Data management device, method, computer equipment and storage medium
CN113672654A (en) * 2021-08-20 2021-11-19 平安银行股份有限公司 Data query method and device, computer equipment and storage medium
CN115460017A (en) * 2022-10-27 2022-12-09 中航信移动科技有限公司 Block chain-based digital identity authority verification system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733656A (en) * 2017-10-23 2018-02-23 北京深思数盾科技股份有限公司 A kind of cipher authentication method and device
WO2018112946A1 (en) * 2016-12-23 2018-06-28 深圳前海达闼云端智能科技有限公司 Registration and authorization method, device and system
CN110263585A (en) * 2019-06-26 2019-09-20 腾讯科技(深圳)有限公司 Test monitoring and managing method, device, equipment and storage medium
CN110278180A (en) * 2018-03-16 2019-09-24 上海方付通商务服务有限公司 Exchange method, device, equipment and the storage medium of Financial Information
CN110598448A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Operation data processing method, device and equipment based on block chain and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018112946A1 (en) * 2016-12-23 2018-06-28 深圳前海达闼云端智能科技有限公司 Registration and authorization method, device and system
CN107733656A (en) * 2017-10-23 2018-02-23 北京深思数盾科技股份有限公司 A kind of cipher authentication method and device
CN110278180A (en) * 2018-03-16 2019-09-24 上海方付通商务服务有限公司 Exchange method, device, equipment and the storage medium of Financial Information
CN110263585A (en) * 2019-06-26 2019-09-20 腾讯科技(深圳)有限公司 Test monitoring and managing method, device, equipment and storage medium
CN110598448A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Operation data processing method, device and equipment based on block chain and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周艺华;李洪明;: "基于区块链的数据管理方案" *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112131599A (en) * 2020-09-15 2020-12-25 北京海益同展信息科技有限公司 Method, device, equipment and computer readable medium for checking data
CN112181983A (en) * 2020-09-24 2021-01-05 中国建设银行股份有限公司 Data processing method, device, equipment and medium
CN112182609A (en) * 2020-09-25 2021-01-05 中国建设银行股份有限公司 Block chain-based data uplink storage method and tracing method, device and equipment
CN112182609B (en) * 2020-09-25 2024-02-02 中国建设银行股份有限公司 Block chain-based data uplink storage method, block chain-based data uplink traceability device and block chain-based data uplink traceability device
CN113612766A (en) * 2021-07-30 2021-11-05 北京锐安科技有限公司 Data management device, method, computer equipment and storage medium
CN113612766B (en) * 2021-07-30 2023-04-28 北京锐安科技有限公司 Data management device, method, computer equipment and storage medium
CN113672654A (en) * 2021-08-20 2021-11-19 平安银行股份有限公司 Data query method and device, computer equipment and storage medium
CN113672654B (en) * 2021-08-20 2023-08-18 平安银行股份有限公司 Data query method, device, computer equipment and storage medium
CN115460017A (en) * 2022-10-27 2022-12-09 中航信移动科技有限公司 Block chain-based digital identity authority verification system
CN115460017B (en) * 2022-10-27 2023-01-31 中航信移动科技有限公司 Block chain-based digital identity authority verification system

Also Published As

Publication number Publication date
CN111291339B (en) 2024-02-06

Similar Documents

Publication Publication Date Title
CN111291339B (en) Method, device, equipment and storage medium for processing blockchain data
CN110414268B (en) Access control method, device, equipment and storage medium
CN108810006B (en) Resource access method, device, equipment and storage medium
CN110083610B (en) Data processing method, device, system, trusted computing device, equipment and medium
CN108960830B (en) Intelligent contract deployment method, device, equipment and storage medium
CN109657492B (en) Database management method, medium, and electronic device
CN110324416B (en) Download path tracking method, device, server, terminal and medium
CN113704781B (en) File secure transmission method and device, electronic equipment and computer storage medium
CN111680313B (en) Data processing method, device, equipment and storage medium
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
CN110545542B (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN114866258A (en) Method and device for establishing access relationship, electronic equipment and storage medium
CN110837635A (en) Method, device, equipment and storage medium for equipment verification
CN108023732B (en) Data protection method, device, equipment and storage medium
CN113792319A (en) File encryption method and device, storage medium and electronic equipment
CN112583805A (en) Data processing method and device based on block chain, electronic equipment and storage medium
CN109635558B (en) Access control method, device and system
US11138319B2 (en) Light-weight context tracking and repair for preventing integrity and confidentiality violations
CN114172663B (en) Business right determining method and device based on block chain, storage medium and electronic equipment
CN112883397A (en) Data storage method, data reading method, device, equipment and storage medium
CN112016336B (en) Method, device, equipment and storage medium for detecting copy card
CN114443721A (en) Data processing method and device, electronic equipment and storage medium
CN114978646A (en) Access authority determination method, device, equipment and storage medium
CN114205156A (en) Message detection method and device for tangent plane technology, electronic equipment and medium
CN113989177A (en) Image data processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant