CN111416716A - Information sharing method based on block chain, receiving terminal and sending terminal - Google Patents

Information sharing method based on block chain, receiving terminal and sending terminal Download PDF

Info

Publication number
CN111416716A
CN111416716A CN202010356122.XA CN202010356122A CN111416716A CN 111416716 A CN111416716 A CN 111416716A CN 202010356122 A CN202010356122 A CN 202010356122A CN 111416716 A CN111416716 A CN 111416716A
Authority
CN
China
Prior art keywords
information
key
encrypted
decryption code
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010356122.XA
Other languages
Chinese (zh)
Inventor
田新雪
肖征荣
马书惠
杨子文
董慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202010356122.XA priority Critical patent/CN111416716A/en
Publication of CN111416716A publication Critical patent/CN111416716A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an information sharing method based on a block chain, a sending terminal and a receiving terminal, belongs to the technical field of encryption, and can at least partially solve the problem that the existing information sharing method is high in leakage risk. The information sharing method of the embodiment of the invention comprises the following steps: encrypting first encryption information by using a first key to obtain second encryption information, wherein the first encryption information is information to be shared encrypted by the second key; and sending the second encrypted information and a decryption code embedded with the first key to a receiving end, wherein the decryption code is used for decrypting the second encrypted information by using the first key when the second encrypted information is opened to obtain the first encrypted information which cannot be copied.

Description

Information sharing method based on block chain, receiving terminal and sending terminal
Technical Field
The invention belongs to the technical field of encryption, and particularly relates to an information sharing method based on a block chain, a receiving terminal and a sending terminal.
Background
The existing information sharing method increases the security of information by encrypting the information, and a user who acquires the encrypted information can acquire the original information only by decrypting the encrypted information. Therefore, only a user who knows the decryption key can acquire the original information.
However, if a user who knows the decryption key unilaterally transmits the decrypted information to other people by copying or the like, the information still leaks, and the risk of information leakage is increased.
Disclosure of Invention
The invention at least partially solves the problem of high leakage risk of the existing information sharing method, and provides the information sharing method based on the block chain, the sending terminal and the receiving terminal with low leakage risk.
A first aspect of the present invention provides an information sharing method based on a block chain, which is used at a sending end, and the method includes: .
Encrypting first encryption information by using a first key to obtain second encryption information, wherein the first encryption information is information to be shared encrypted by the second key;
and sending the second encrypted information and a decryption code embedded with the first key to a receiving end, wherein the decryption code is used for decrypting the second encrypted information by using the first key when the second encrypted information is opened to obtain the first encrypted information which cannot be copied.
Optionally, the method is used for blockchains.
Optionally, the sending the second encrypted information and the decryption code embedded with the first key to a receiving end includes: and disclosing the second encrypted information and the decryption code for the receiving end to download.
Optionally, after the sending the second encrypted information and the decryption code embedded with the first key to a receiving end, the method further includes: and encrypting the second secret key by using a public key of the receiving end, and disclosing the encrypted second secret key for the receiving end to download.
Optionally, the decryption code is further configured to delete the second encrypted information when the second encrypted information is turned off.
Optionally, before sending the second encrypted information and the decryption code embedded with the first key to the receiving end, the method further includes: obtaining the first key and the second key, and generating the decryption code using the first key.
Optionally, the obtaining the first key and the second key includes: the first key and the second key are randomly generated.
A second aspect of the present invention provides an information sharing method based on a block chain, which is used at a receiving end, and the method includes:
receiving second encryption information and a decryption code embedded with a first key, wherein the decryption code is used for decrypting the second encryption information by using the first key when the second encryption information is opened to obtain uncopyable first encryption information;
opening the second encryption information to obtain first encryption information which cannot be copied;
and decrypting the first encrypted information by using a second key to obtain the uncopyable information to be shared.
A third aspect of the present invention provides a transmitting terminal, where the terminal is an intra-block chain terminal, and the terminal includes:
the encryption module is used for encrypting first encryption information by using a first key to obtain second encryption information, wherein the first encryption information is information to be shared which is encrypted by using the second key;
and the sending module is used for sending the second encrypted information and a decryption code embedded with the first key to a receiving end, wherein the decryption code is used for decrypting the second encrypted information by using the first key when the second encrypted information is opened to obtain the first encrypted information which cannot be copied.
Optionally, the sending the second encrypted information and the decryption code embedded with the first key to a receiving end includes: and disclosing the second encrypted information and the decryption code for the receiving end to download.
A fourth aspect of the present invention provides a receiving terminal, where the terminal is an intra-block-chain terminal, and the receiving terminal includes:
the receiving module is used for receiving second encrypted information and a decryption code embedded with a first key, wherein the decryption code is used for decrypting the second encrypted information by using the first key when the second encrypted information is opened to obtain uncopyable first encrypted information;
the code module is used for opening the second encryption information to obtain first encryption information which cannot be copied;
and the decryption module is used for decrypting the first encrypted information by using a second key so as to obtain the uncopyable information to be shared.
In the information sharing method based on the block chain, the information copying and decrypting prohibiting code is sent to the receiving end to prevent the receiving end from copying the information after receiving the information, so that information leakage caused by the fact that the receiving end sends the information to others is reduced, and the information safety is improved.
Drawings
Fig. 1 is a schematic flowchart of an information sharing method based on a block chain for a sending end according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an information sharing method based on a block chain for a receiving end according to an embodiment of the present invention;
fig. 3 is a schematic flow chart illustrating an information sharing method according to an embodiment of the present invention;
fig. 4 is a block diagram schematically illustrating a transmitting terminal according to an embodiment of the present invention;
fig. 5 is a block diagram schematically illustrating a receiving terminal according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
It is to be understood that the specific embodiments and figures described herein are merely illustrative of the invention and are not limiting of the invention.
It is to be understood that the embodiments and features of the embodiments can be combined with each other without conflict.
It is to be understood that, for the convenience of description, only parts related to the present invention are shown in the drawings of the present invention, and parts not related to the present invention are not shown in the drawings.
It should be understood that each unit and module related in the embodiments of the present invention may correspond to only one physical structure, may also be composed of multiple physical structures, or multiple units and modules may also be integrated into one physical structure.
It will be understood that, without conflict, the functions, steps, etc. noted in the flowchart and block diagrams of the present invention may occur in an order different from that noted in the figures.
It is to be understood that the flowchart and block diagrams of the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, apparatus, devices and methods according to various embodiments of the present invention. Each block in the flowchart or block diagrams may represent a unit, module, segment, code, which comprises executable instructions for implementing the specified function(s). Furthermore, each block or combination of blocks in the block diagrams and flowchart illustrations can be implemented by a hardware-based system that performs the specified functions or by a combination of hardware and computer instructions.
It is to be understood that the units and modules involved in the embodiments of the present invention may be implemented by software, and may also be implemented by hardware, for example, the units and modules may be located in a processor.
Example 1:
as shown in fig. 1, this embodiment provides an information sharing method based on a block chain, which is used at a sending end.
Namely, the sending end of the information and the receiving end of the information are both located in the block chain, and the sending end needs to send the information to be shared to the receiving end. If the administrator in the block chain sends the information to be shared to the specific user group, namely the administrator is the sending end, and the group members of the specific user group are all the receiving ends.
The block chain is a decentralized database in nature, data on the database cannot be tampered, and safety is high.
The information sharing method based on the block chain specifically includes:
s101, encrypting the first encrypted information by using the first key to obtain second encrypted information, wherein the first encrypted information is information to be shared encrypted by the second key.
The terminal (such as an administrator of the block chain) located in the block chain and needing to send information, that is, the sending end encrypts the information to be shared by using the second key to obtain first encrypted information, and encrypts the first encrypted information again by using the first key to obtain second encrypted information.
Wherein the first key and the second key are different keys.
S102, sending the second encrypted information and a decryption code embedded with the first key to a receiving end, wherein the decryption code is used for decrypting the second encrypted information by using the first key when the second encrypted information is opened to obtain the first encrypted information which cannot be copied.
The sending end in the blockchain embeds the first key into the decryption code, and sends the decryption code and the second encryption information obtained in step S101 to the receiving end in the blockchain (e.g., a group member of a specific user group). Because the decryption code is embedded with the first key, when the receiving end opens the second encryption information, the decryption code can obtain the first encryption information after running, and the obtained first encryption information is the first encryption information which can not be copied and can be used for copying information.
In the information sharing method for the sending end based on the block chain, the information copying and decrypting prohibiting code is sent to the receiving end, so that the receiving end is prevented from copying information after receiving the information, information leakage caused by the fact that the receiving end sends the information to others is reduced, and the information safety is improved.
Example 2:
as shown in fig. 2, the present embodiment provides an information sharing method based on a block chain, which is used at a receiving end.
Namely, the sending end of the information and the receiving end of the information are both located in the block chain, and the sending end needs to send the information to be shared to the receiving end. If the administrator in the block chain sends the information to be shared to the specific user group, namely the administrator is the sending end, and the group members of the specific user group are all the receiving ends.
The block chain is a decentralized database in nature, data on the database cannot be tampered, and safety is high.
The information sharing party based on the block chain of this embodiment specifically includes:
s201, receiving second encryption information and a decryption code embedded with a first key, wherein the decryption code is used for decrypting the second encryption information by using the first key when the second encryption information is opened to obtain uncopyable first encryption information.
The receiving end (such as group members of a specific user group) in the blockchain receives the second encryption information and the decryption code embedded with the first key sent by the sending end (such as an administrator of the blockchain) in the blockchain. The decryption code is the first encryption information which is operated when the second encryption information is opened, and the second encryption information is decrypted through the embedded first secret key during the operation of the decryption code, and the operation of copying information such as copying cannot be carried out.
S202, opening the second encryption information to obtain the first encryption information which cannot be copied.
And the receiving end positioned in the block chain operates the decryption code after opening the second encryption information, and the decryption code decrypts the second encryption information through the embedded first key during operation to obtain the first encryption information which can not be copied and other information copying operations.
S203, decrypting the first encrypted information by using the second key to obtain the uncopyable information to be shared.
And the receiving end positioned in the block chain decrypts the obtained first encrypted information by using the second key so as to obtain the information to be shared which cannot be subjected to the operation of copying information such as copying.
In the information sharing method for the receiving end based on the block chain, the receiving end obtains the uncopyable information to be shared by running the decryption code, so that information leakage caused by the fact that the receiving end sends the information to others is reduced, and the information security is improved.
Example 3:
as shown in fig. 3, the present embodiment provides an information sharing method based on a block chain.
Namely, the sending end of the information and the receiving end of the information are both located in the block chain, and the sending end needs to send the information to be shared to the receiving end. If the administrator in the block chain sends the information to be shared to the specific user group, namely the administrator is the sending end, and the group members of the specific user group are all the receiving ends.
The block chain is a decentralized database in nature, data on the database cannot be tampered, and safety is high.
The information sharing method of the embodiment specifically includes:
s301, the sending end encrypts first encryption information by using a first secret key to obtain second encryption information, wherein the first encryption information is information to be shared, and the information is encrypted by the second secret key.
The sending end encrypts the information to be shared by using the second key to obtain first encrypted information, and encrypts the first encrypted information again by using the first key to obtain second encrypted information.
The first key and the second key are different keys, and optionally, the first key and the second key are generated randomly.
The first key and the second key which are randomly generated are only used in one information sharing process, and the first key and the second key can be changed in the next information sharing process, so that the possibility of cracking the keys is reduced, and the information safety is improved.
Further optionally, if the second key is a random number, the information to be shared encrypted by using the second key may specifically be combined information obtained by combining the information to be shared and the random number.
The encryption method using the random number in combination with the information to be shared is different from the method using the key to directly encrypt. Because the encryption modes are different, the decryption modes are also different, so that the difficulty of decrypting the encrypted information is greatly increased, and the safety of the information is improved.
Specifically, if an administrator in the blockchain needs to send information to be shared to a specific user group (e.g., a plurality of users a1, a2, etc.), after determining the user group to be distributed, the administrator randomly generates a first key K and a second key R, combines the second key R with the information M to be shared to obtain first encrypted information C (M, R), and encrypts the first encrypted information C (M, R) with the first key K to obtain second encrypted information C (M, R)k(M,R)。
S302, the sending end sends the second encrypted information and the decryption code embedded with the first secret key to the receiving end, and the decryption code is used for decrypting the second encrypted information by using the first secret key when the second encrypted information is opened to obtain the first encrypted information which cannot be copied.
The sending end embeds the first secret key into the decryption code, and sends the decryption code and the second encryption information obtained in the step S301 to the receiving end. Because the decryption code is embedded with the first key, when the receiving end opens the second encryption information, the decryption code can obtain the first encryption information after running, and the obtained first encryption information is the first encryption information which can not be copied and can be used for copying information.
Optionally, the decryption code is further configured to delete the second encrypted information when the second encrypted information is turned off.
That is, when the receiving end user closes the second encrypted information after finishing looking at the second encrypted information, the decryption code runs and deletes the second encrypted information which may exist locally
The second encrypted information which possibly exists locally is deleted through the decryption code, so that the receiving end can be prevented from locally saving a copy and sending others to cause information leakage, and the safety of the information is improved.
Optionally, before sending the second encryption information and the decryption code embedded with the first key to the receiving end, the method further includes:
s3021, the sending end obtains the first key and the second key, and generates a decryption code by using the first key.
The sending end obtains the generated first key and the second key and embeds the first key into the code to generate a decryption code which can be used for decryption.
After generating the first key and the second key, the sending end encrypts the information to be shared by using the first key and the second key to obtain second encrypted information.
After the second encrypted information is obtained, a code for decrypting the second encrypted information by using the first key is generated according to the method for encrypting the first encrypted information by using the first key, and then the first key is embedded into the code to obtain a decrypted code which can be automatically decrypted without inputting the first key.
Optionally, sending the second encrypted information and the decryption code embedded with the first key to the receiving end includes:
and S3022, the sending end discloses the second encryption information and the decryption code for the receiving end to download.
The sending end discloses the second encryption information and the encryption code to a position which can be accessed by the receiving end, so that the receiving end can obtain the second encryption information and the decryption code embedded with the first key in a downloading mode.
The information is sent in the public mode, and the receiving end can acquire the information in a downloading mode at any time, so that the convenience of acquiring the information is improved, and the user experience of the receiving end is improved.
Further optionally, after the sending the second encryption information and the decryption code embedded with the first key to the receiving end, the method further includes:
and S3023, the sending end encrypts the second secret key by using the public key of the receiving end, and discloses the encrypted second secret key for the receiving end to download.
After the sending end discloses the second encryption information and the decryption code, the sending end encrypts and discloses the second secret key by using the public key of the receiving end, so that the receiving end can obtain the decrypted second secret key in a downloading mode and decrypt by using the private key of the receiving end to obtain the second secret key.
The second key is encrypted through the public key, so that the information security is improved, and the sending end does not need to encrypt different second keys aiming at different receiving ends because the public key can be decrypted through the private key, so that the different receiving ends can decrypt and obtain the second key, and the workload of the sending end is reduced.
Specifically, the administrator of the block chain acquires the first encryption information C (M, R) and the second encryption information Ck(M, R) then, a decryption code sh is generated from the first key K and a second key R is encrypted using the group public key of the group where the receiver is located, the encrypted second key R becoming Cka1(R),Cka2(R), and the like, and the second encryption information C is broadcastk(M, R), decryption code (Code.sh) and encrypted second key (C)ka1(R) is issued onto the blockchain. Certainly, the broadcast information includes a group member list of the user group and is encrypted by using a private key of the administrator, so that the receiving end can verify whether the broadcast information is received.
S303, the receiving end receives the second encrypted information and the decryption code embedded with the first key, and the decryption code is used for decrypting the second encrypted information by using the first key when the second encrypted information is opened to obtain the first encrypted information which cannot be copied.
And the receiving end receives the second encryption information sent by the sending end and the decryption code embedded with the first key. The decryption code is the first encryption information which is operated when the second encryption information is opened, and the second encryption information is decrypted through the embedded first secret key during the operation of the decryption code, and the operation of copying information such as copying cannot be carried out.
Specifically, for example, after a certain user (e.g., user a1) in the blockchain receives the broadcast information sent by the administrator, the private key of the broadcast information is verified, and after the verification is passed, the broadcast information is received, that is, the virtual machine on the blockchain is started, and the decryption codeka1(R) and second encryption information Ck(M,R)。
S304, the receiving end opens the second encryption information to obtain the first encryption information which can not be copied.
S305, the receiving end decrypts the first encrypted information by using the second key to obtain the uncopyable information to be shared.
And the receiving end operates the decryption code after opening the second encrypted information, and the decryption code operates to decrypt the second encrypted information through the embedded first secret key so as to obtain the first encrypted information which can not be subjected to the operation of copying information such as copying.
And the receiving end decrypts the obtained first encrypted information by using the second key to obtain the information to be shared, wherein the information cannot be copied.
In particular, if the user (for example, user a1) obtains the decryption code code.sh, the second key C of public key encryptionka1(R) and second encryption information Ck(M, R) followed by a second key C, which first encrypts the public key according to its own private keyka1(R) performs decryption to obtain the second key R.
After obtaining the second key R, the second key R and the second encryption information C may be combinedk(M, R) to the decryption code.sh so that the decryption code.sh can pass through the second encryption information CkAnd (M, R) and the embedded first key K acquire first encrypted information C (M, R), and decrypt the first encrypted information through the second key to acquire the information M to be shared.
The process of decrypting the first encrypted information C (M, R) by the second key R can also be completed by the decryption code, and the first encrypted information C (M, R) is not displayed or saved as code intermediate information, that is, the receiving end cannot acquire the first encrypted information C (M, R).
Of course, the decryption code may also run on the virtual machine of the block chain, and the receiving end only needs to use the second key R and the second encryption information CkAnd (M, R) sending to the virtual machine. And after the decryption code.sh on the virtual machine runs to obtain the information M to be shared, displaying the information M to be shared on a screen, and limiting copying operations such as screen capture.
And after the receiving end finishes checking the information to be shared and closes the virtual machine, the information to be shared possibly existing on the virtual machine is automatically deleted, so that the user is prevented from copying.
In the information sharing method of the embodiment, the sending end sends the information copy prohibiting decryption code to the receiving end to prevent the receiving end from copying the information after receiving the information, so that information leakage caused by the fact that the receiving end sends the information to others is reduced, and the information security is improved.
Example 4:
as shown in fig. 4, this embodiment provides a sending terminal, where the sending terminal is located in a block chain, and the terminal specifically includes:
the encryption module is used for encrypting the first encryption information by using the first key to obtain second encryption information, and the first encryption information is information to be shared which is encrypted by the second key;
and the sending module is used for sending the second encrypted information and the decryption code embedded with the first key to a receiving end, and the decryption code is used for decrypting the second encrypted information by using the first key when the second encrypted information is opened to obtain the first encrypted information which cannot be copied.
Optionally, sending the second encrypted information and the decryption code embedded with the first key to the receiving end includes: and disclosing the second encrypted information and the decryption code for the receiving end to download.
The transmitting terminal of the embodiment prevents the receiving terminal from copying the information after receiving the information by transmitting the information copying and decrypting prohibiting code to the receiving terminal, reduces information leakage caused by the receiving terminal transmitting the information to others, and increases the information security.
Example 5:
as shown in fig. 5, this embodiment provides a receiving terminal, where the terminal is located in a block chain, and the terminal specifically includes:
the receiving module is used for receiving the second encrypted information and a decryption code embedded with the first key, and the decryption code is used for decrypting the second encrypted information by using the first key when the second encrypted information is opened to obtain uncopyable first encrypted information;
the code module is used for opening the second encryption information to obtain first encryption information which cannot be copied;
and the decryption module is used for decrypting the first encrypted information by using the second key so as to obtain the uncopyable information to be shared.
The receiving terminal of the embodiment obtains the uncopyable information to be shared by operating the decryption code, thereby reducing information leakage caused by sending the information to others and increasing the information security.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (10)

1. An information sharing method based on a block chain is used for a sending end, and is characterized in that the method comprises the following steps:
encrypting first encryption information by using a first key to obtain second encryption information, wherein the first encryption information is information to be shared encrypted by the second key;
and sending the second encrypted information and a decryption code embedded with the first key to a receiving end, wherein the decryption code is used for decrypting the second encrypted information by using the first key when the second encrypted information is opened to obtain the first encrypted information which cannot be copied.
2. The method of claim 1, wherein sending the second encrypted information and the decryption code embedded with the first key to a receiving end comprises:
and disclosing the second encrypted information and the decryption code for the receiving end to download.
3. The method of claim 2, wherein after sending the second encrypted information and the decryption code embedded with the first key to a receiving end, the method further comprises:
and encrypting the second secret key by using a public key of the receiving end, and disclosing the encrypted second secret key for the receiving end to download.
4. The method of claim 1, wherein the decryption code is further configured to delete the second encrypted information when the second encrypted information is turned off.
5. The method of claim 1, wherein before sending the second encrypted information and the decryption code embedded with the first key to a receiving end, the method further comprises:
obtaining the first key and the second key, and generating the decryption code using the first key.
6. The method of claim 5, wherein obtaining the first key and the second key comprises:
the first key and the second key are randomly generated.
7. An information sharing method based on a block chain is used for a receiving end and is characterized in that the method comprises the following steps:
receiving second encryption information and a decryption code embedded with a first key, wherein the decryption code is used for decrypting the second encryption information by using the first key when the second encryption information is opened to obtain uncopyable first encryption information;
opening the second encryption information to obtain first encryption information which cannot be copied;
and decrypting the first encrypted information by using a second key to obtain the uncopyable information to be shared.
8. A transmitting terminal, the terminal being an intra-block chain terminal, the terminal comprising:
the encryption module is used for encrypting first encryption information by using a first key to obtain second encryption information, wherein the first encryption information is information to be shared which is encrypted by using the second key;
and the sending module is used for sending the second encrypted information and a decryption code embedded with the first key to a receiving end, wherein the decryption code is used for decrypting the second encrypted information by using the first key when the second encrypted information is opened to obtain the first encrypted information which cannot be copied.
9. The terminal according to claim 8, wherein the sending the second encrypted information and the decryption code embedded with the first key to a receiving end comprises:
and disclosing the second encrypted information and the decryption code for the receiving end to download.
10. A receiving terminal, the terminal being an intra-block chain terminal, the terminal comprising:
the receiving module is used for receiving second encrypted information and a decryption code embedded with a first key, wherein the decryption code is used for decrypting the second encrypted information by using the first key when the second encrypted information is opened to obtain uncopyable first encrypted information;
the code module is used for opening the second encryption information to obtain first encryption information which cannot be copied;
and the decryption module is used for decrypting the first encrypted information by using a second key so as to obtain the uncopyable information to be shared.
CN202010356122.XA 2020-04-29 2020-04-29 Information sharing method based on block chain, receiving terminal and sending terminal Pending CN111416716A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010356122.XA CN111416716A (en) 2020-04-29 2020-04-29 Information sharing method based on block chain, receiving terminal and sending terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010356122.XA CN111416716A (en) 2020-04-29 2020-04-29 Information sharing method based on block chain, receiving terminal and sending terminal

Publications (1)

Publication Number Publication Date
CN111416716A true CN111416716A (en) 2020-07-14

Family

ID=71495060

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010356122.XA Pending CN111416716A (en) 2020-04-29 2020-04-29 Information sharing method based on block chain, receiving terminal and sending terminal

Country Status (1)

Country Link
CN (1) CN111416716A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020124177A1 (en) * 2001-01-17 2002-09-05 Harper Travis Kelly Methods for encrypting and decrypting electronically stored medical records and other digital documents for secure storage, retrieval and sharing of such documents
CN106452728A (en) * 2016-08-30 2017-02-22 上海卓易科技股份有限公司 Data encryption method
CN106656472A (en) * 2016-12-27 2017-05-10 广州智慧城市发展研究院 Transaction data encryption method and system
CN109144961A (en) * 2018-08-22 2019-01-04 矩阵元技术(深圳)有限公司 Authority sharing method and device
CN109525573A (en) * 2018-11-08 2019-03-26 安徽太阳石科技有限公司 Data safety sharing method and its system based on block chain
CN109768987A (en) * 2019-02-26 2019-05-17 重庆邮电大学 A kind of storage of data file security privacy and sharing method based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020124177A1 (en) * 2001-01-17 2002-09-05 Harper Travis Kelly Methods for encrypting and decrypting electronically stored medical records and other digital documents for secure storage, retrieval and sharing of such documents
CN106452728A (en) * 2016-08-30 2017-02-22 上海卓易科技股份有限公司 Data encryption method
CN106656472A (en) * 2016-12-27 2017-05-10 广州智慧城市发展研究院 Transaction data encryption method and system
CN109144961A (en) * 2018-08-22 2019-01-04 矩阵元技术(深圳)有限公司 Authority sharing method and device
CN109525573A (en) * 2018-11-08 2019-03-26 安徽太阳石科技有限公司 Data safety sharing method and its system based on block chain
CN109768987A (en) * 2019-02-26 2019-05-17 重庆邮电大学 A kind of storage of data file security privacy and sharing method based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
许发见: "计算机系统安全实训编程与创新", 国防科技大学出版社, pages: 266 - 267 *

Similar Documents

Publication Publication Date Title
US8209540B2 (en) Incremental secure backup and restore of user settings and data
US7270193B2 (en) Method and system for distributing programs using tamper resistant processor
US7681037B2 (en) Network connection system
EP2267628A2 (en) Token passing technique for media playback devices
CN110690956B (en) Bidirectional authentication method and system, server and terminal
CN110535641B (en) Key management method and apparatus, computer device, and storage medium
US11831753B2 (en) Secure distributed key management system
KR20070063534A (en) Regular content check system
CN113992702B (en) Ceph distributed file system storage state password reinforcement method and system
US20080069342A1 (en) Method and system for protecting against unity keys
CN110635901A (en) Local Bluetooth dynamic authentication method and system for Internet of things equipment
JPH08320847A (en) Password management system
JPH11298470A (en) Key distribution method and system
CN117240625A (en) Tamper-resistant data processing method and device and electronic equipment
CN114915504A (en) Security chip initial authentication method and system
TWI827906B (en) Message transmitting system, user device and hardware security module for use therein
WO1998033296A1 (en) Distribution system with authentication
JP2003345930A (en) Attribute warrant management method and device
CN111416716A (en) Information sharing method based on block chain, receiving terminal and sending terminal
CN110611674B (en) Protocol interaction method, system and storage medium between different computer systems
JP2002539489A (en) Voice and data encryption method using encryption key split combiner
JP2004297755A (en) Key management server in encryption system, program for controlling decryption apparatus, key management server in signature/verification system and program for controlling verification apparatus
Campbell Supporting digital signatures in mobile environments
JP2007158984A (en) Electronic document authenticity assurance method, and electronic document disclosure system
CN109981678B (en) Information synchronization method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200714

RJ01 Rejection of invention patent application after publication