CN111460400A - Data processing method and device and computer readable storage medium - Google Patents

Data processing method and device and computer readable storage medium Download PDF

Info

Publication number
CN111460400A
CN111460400A CN202010248930.4A CN202010248930A CN111460400A CN 111460400 A CN111460400 A CN 111460400A CN 202010248930 A CN202010248930 A CN 202010248930A CN 111460400 A CN111460400 A CN 111460400A
Authority
CN
China
Prior art keywords
file
user
public key
terminal device
acquisition request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010248930.4A
Other languages
Chinese (zh)
Inventor
李茂材
王宗友
张劲松
黄焕坤
周开班
时一防
刘攀
刘区城
蓝虎
杨常青
朱耿良
孔利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010248930.4A priority Critical patent/CN111460400A/en
Publication of CN111460400A publication Critical patent/CN111460400A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The application discloses a data processing method, a data processing device and a computer readable storage medium. The method comprises the following steps: receiving an acquisition request sent by terminal equipment and used for acquiring a digital product, if the user is judged to have the download authority of the digital product according to the identity information of the user in the acquisition request, acquiring a first public key of the terminal equipment, and if the first public key of the terminal equipment exists in a pre-stored public key list of a trusted execution environment, encrypting the digital product through the public key of the trusted execution environment of the terminal equipment, and sending an encrypted file to the terminal equipment. Therefore, the digital product is encrypted by using the public key of the trusted execution environment of the terminal device, so that the encrypted file can only be used on the corresponding terminal device. Therefore, the problem that the digital product is illegally forwarded and used is solved, and the legal rights and interests of the owner of the digital product are protected.

Description

Data processing method and device and computer readable storage medium
Technical Field
The present application relates to the field of computer networks, and in particular, to a data processing method and apparatus, and a computer-readable storage medium.
Background
The problem of copyright protection of digital products is often involved in many application scenarios, such as: user a has composed a song. After being distributed in the network, there may be a case where user B offers the song to unpaid user C for use after purchasing the song, or the song is resold to other users to make profits. Thereby causing the rights of user a to be compromised. Therefore, how to effectively protect the copyright of the digital products becomes a hot issue of current research.
Disclosure of Invention
The application discloses a data processing method, a data processing device and a computer readable storage medium, which can provide protection for the copyright of digital products in a network.
In a first aspect, the present application provides a data processing method, including:
receiving a first acquisition request sent by terminal equipment, wherein the first acquisition request is used for acquiring a first file and carries identity information of a first user of the terminal equipment;
judging whether the first user has the downloading authority of the first file or not according to the identity information of the first user;
if the first user has the downloading authority of the first file, acquiring a first public key of the terminal device;
and if the first public key exists in a pre-stored public key list of the trusted execution environment, encrypting the first file through the first public key to obtain a first encrypted file, and sending the first encrypted file to the terminal equipment.
In a second aspect, the present application provides a data processing apparatus comprising:
a receiving unit, configured to receive a first acquisition request sent by a terminal device, where the first acquisition request is used to acquire a first file, and the first acquisition request carries identity information of a first user of the terminal device;
and the processing unit is used for judging whether the first user has the download authority of the first file or not according to the identity information of the first user, acquiring a first public key of the terminal device if the first user has the download authority of the first file, encrypting the first file through the first public key of the terminal device if the first public key of the terminal device exists in a pre-stored public key list of a trusted execution environment to obtain a first encrypted file, and sending the first encrypted file to the terminal device.
In a third aspect, the present application provides a data processing apparatus comprising a processor, a memory and a communication interface, wherein the processor, the memory and the communication interface are connected to each other, wherein the memory is used for storing a computer program, and the computer program comprises program instructions, and the processor is configured to call the program instructions to execute the method according to the first aspect.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon one or more instructions adapted to be loaded by a processor and to perform the method of the first aspect described above.
In the application, the device used by the owner of the digital product receives an acquisition request sent by the terminal device and used for acquiring the digital product, if the user is judged to have the download authority of the digital product according to the identity information of the user in the acquisition request, the first public key of the terminal device is acquired, and if the first public key of the terminal device exists in a pre-stored public key list of a trusted execution environment, the digital product is encrypted through the public key of the trusted execution environment of the terminal device, and the encrypted file is sent to the terminal device. Therefore, the digital product is encrypted by using the public key of the trusted execution environment of the terminal device, so that the encrypted file can only be used on the corresponding terminal device. Therefore, the problem that the digital product is illegally forwarded and used is solved, and the legal rights and interests of the owner of the digital product are protected.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a scene architecture diagram of a network according to an embodiment of the present application;
fig. 2 is a flowchart of a data processing method according to an embodiment of the present application;
fig. 3 is a flowchart of another data processing method provided in the embodiment of the present application;
fig. 4 is a flowchart of another data processing method provided in the embodiment of the present application;
FIG. 5 is a flow chart of another data processing method provided in the embodiments of the present application;
fig. 6 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another data processing apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.
The embodiment of the application relates to a block chain, a block chain network and a trusted execution environment, wherein the block chain (BlockChain) is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, and a distributed account book which is cryptographically guaranteed to be untrustable and unforgeable is data. The blockchain is essentially a decentralized database, which is a string of data blocks associated by using cryptography, each data block contains information of a batch of network transactions, and the information is used for verifying the validity (anti-counterfeiting) of the information and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The blockchain underlying platform may include processing modules for user management, basic services, and intelligent contracts. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, contract triggering and contract execution, developers can define contract logic through a certain programming language, issue the contract logic onto a block chain (contract registration), and call keys or other event triggering execution according to the logic of contract terms to complete the contract logic.
The blockchain network is a distributed application architecture for distributing tasks and workloads among peers, and is a networking or network form formed by peer-to-peer computing models in an application layer. Generally, a blockchain network includes a plurality of computers connected to each other, and these computers are also called node devices of the blockchain network. In a blockchain network environment, a plurality of computers connected with each other are in an equivalent position, each computer has the same function and is not divided into a master computer and a slave computer, and one computer can be used as a server to set shared resources for other computers in the network to use; the network as a whole generally does not rely on a dedicated centralized server, and there are no dedicated workstations. Each computer in the network can both act as a requester of network services and provide resources, services and content in response to requests from other computers.
The Trusted Execution Environment (TEE) is an Execution Environment coexisting with a multimedia Execution Environment (REE) on the terminal device. The TEE is composed of Trusted software and hardware resources such as a processor, a secure memory, a Trusted User Interface (TUI), a Trusted Operating System (TOS), and a Trusted Application (TA) on the terminal device to construct a safer operating environment than the REE. To secure TEE resources, the TEE resources that are accessible by the REE are also accessible to the TEE, and conversely, trusted resources on the TEE are only allowed access to other trusted resources unless explicitly authorized by the TEE.
The TEE generates a public-private key pair in an asymmetric encryption mode, and writes a private key into a chip when the chip is produced, so that a file encrypted by a public key corresponding to the chip can be decrypted only in the chip to obtain information in the file. It should be noted that the private key in each chip is unique and not tampered. Therefore, personal information of the user can be stored and processed more safely in the running environment isolated from the REE, and operations with higher confidentiality requirements, such as electronic payment, and the like, can be executed.
The public key list of the trusted execution environment is issued to the blockchain network by a chip manufacturer after a chip is produced, and an owner of a digital product can acquire the public key list of the trusted execution environment through the blockchain. The list of the public keys of the trusted execution environment includes the public keys of the trusted execution environment corresponding to each chip that has been put into use. In another embodiment, a chip manufacturer produces certification information corresponding to each chip when producing the chip, a user carries the corresponding certification information when providing the public key of the trusted execution environment, and an owner of the digital product can verify whether the public key of the trusted execution environment provided by the user is authentic or not to the chip manufacturer through the certification information.
Fig. 1 is a scene architecture diagram of a network according to an embodiment of the present application. As shown in fig. 1, the network includes a terminal device 101, a first node device 102, and a second node device 103. The number of terminal devices and node devices in the network shown in fig. 1 is only an example, and for example: the number of the terminal device 101, the number of the first node device 102, and the number of the second node device 103 may also be multiple, and a third node device, a fourth node device, and the like may also exist in the blockchain network.
The terminal apparatus 101 is an apparatus used by a user, and the user may specifically be an individual, a company, an organization, or the like. Terminal device 101 may include, but is not limited to: smart phones (e.g., Android phones, iOS phones, etc.), tablet computers, portable personal computers, Mobile Internet Devices (MID), and the like.
The first node device 102 is a node device corresponding to an owner of the digital product, and the first node device 102 may be a node device in a blockchain network or a terminal device that establishes a communication connection with the node device in the blockchain network. The second node apparatus 103 is a node apparatus in the blockchain network. The first node device 102 and the second node device 103 may specifically be a client or a server, which is not limited in this embodiment of the application. Wherein, the client can be any one of the following: a terminal, a standalone Application, an Application Programming Interface (API), or a Software Development Kit (SDK). Among others, the terminal may include but is not limited to: smart phones (such as Android phones, iOS phones, and the like), tablet computers, portable personal computers, MID, and the like, which are not limited in the embodiments of the present invention. The type of node device may include, but is not limited to, a full node, a Simple PaymentVerification (SPV) node, or other node types in a blockchain network.
In the blockchain network shown in fig. 1, a first user sends a first acquisition request to a first node device 102 corresponding to a digital product owner through a terminal device 101. The first acquisition request is used to acquire a first file (i.e., a first user requests to acquire a certain digitized file, such as a song, owned by the owner of the digitized product). The first acquisition request carries identity information of the first user (e.g., information such as a user identifier that can uniquely determine the user identity). After receiving the first acquisition request, the first node device 102 determines whether the first user has the right to acquire (download) the first file according to the identity information of the first user (for example, by querying the second node device 103 in the blockchain network for the transaction record of the terminal device 101). If the first node device 102 determines that the first user has the right to download the first file, the first file is encrypted by using a public key (which may be carried in the first acquisition request or acquired from the blockchain network) of the trusted execution environment of the terminal device 101 used by the first user, so as to obtain a first encrypted file. The first node apparatus 102 transmits the first encrypted file to the terminal apparatus 101. After receiving the first encrypted file, the terminal device 101 decrypts the first encrypted file in its trusted execution environment, that is, may use the decrypted first file. It is understood that the first encrypted file can only be decrypted and used in the trusted execution environment of the terminal device 101, and the first user cannot obtain the decrypted first file from the trusted execution environment of the terminal device 101.
In the data processing method, the digital product owner encrypts the provided digital file through the public key of the trusted execution environment of the terminal device used by the first user, and ensures that the encrypted digital file can be decrypted and used only by the terminal device used by the first user. Therefore, the problem that the digital product is illegally forwarded and used after being acquired by a user is solved, and the legal rights and interests of the owner of the digital product are protected.
A data processing method provided by the present application is described in detail below.
Referring to fig. 2, fig. 2 is a flowchart of a data processing method according to an embodiment of the present disclosure. The data processing method can be interactively realized by the terminal equipment 101, the first node equipment 102 and the second node equipment 103 shown in fig. 1; as shown in fig. 2, the data processing method includes, but is not limited to, the following steps 201 to 205:
201. the first node equipment receives a first acquisition request sent by the terminal equipment.
The first node device is a node device corresponding to a digital product owner, and the terminal device is a device used by a first user. The terminal device requests to acquire the first file by sending a first acquisition request to the first node device, where the first acquisition request carries identity information of a first user using the terminal device (for example, information that can uniquely determine an identity of the first user, such as an account password of the first user).
In an embodiment, the first obtaining request further carries a first public key of the terminal device.
202. The first node device sends acknowledgement information to a second node device in the blockchain network.
Wherein the second node device is a node device in the blockchain network for processing transactions. The confirmation information includes identity information of the first user. The confirmation information is used for confirming whether the first user has the downloading authority of the first file.
In one embodiment, the first node device sends file information (including associated description information, download address of the file, etc., but not the file itself) for the transaction to the second node device in the blockchain network in the form of an intelligent contract. After the consensus passes, the second node device issues file information used for transaction by the first node device to the blockchain network. And if the first user needs to acquire the first file, the first user executes transaction with the second node device through the terminal device to acquire the download permission of the first file. After the transaction is completed, the second node device establishes an authorization relationship between the first user and the first file.
203. And the first node equipment receives the response information sent by the second node equipment.
The response information is used for indicating whether the first user has the authority of downloading the first file or not.
In an implementation manner, after receiving the confirmation information sent by the first node device, the second node device searches and confirms whether the first user and the first file have an authorization relationship or not through the identity information of the first user in the confirmation information. And transmitting the confirmed result to the first node device through the response information. And if the response information indicates that the first user does not have the authority to download the first file, the first node device sends prompt information to the terminal device, wherein the prompt information is used for indicating that the first user does not have the authority to download the first file. If the response information indicates that the first user has the right to download the first file, the first public key of the terminal device is obtained, whether the first public key of the terminal device exists in the pre-stored public key list of the trusted execution environment is determined, and if the first public key of the terminal device exists in the pre-stored public key list of the trusted execution environment, it is determined that the first public key is real and valid, and step 204 is continuously executed.
In another embodiment, the first user sends the first public key of the terminal device to the second node device when performing the transaction. If the second node device finds and confirms that the first user and the first file have the authorization relationship by confirming the identity information of the first user in the information, the response information further comprises a first public key of the terminal device.
204. The first node device encrypts the first file through the first public key of the terminal device to obtain a first encrypted file.
The first public key of the terminal device refers to a public key of a trusted execution environment provided by the first user through the terminal device, and the first public key may correspond to the terminal device or other devices used by the first user, which is not limited in this application.
In an embodiment, the first node device obtains a first public key of the terminal device through a first obtaining request sent by the terminal device, and encrypts the first file by using the first public key to obtain a first encrypted file.
In another embodiment, the first node device obtains the first public key of the terminal device through the response message sent by the second node device, and encrypts the first file by using the first public key to obtain the first encrypted file.
205. The first node device sends the first encrypted file to the terminal device.
In one embodiment, the first node device sends a first encrypted file to the terminal device. And after receiving the first encrypted file, the terminal equipment decrypts the first encrypted file in the equipment corresponding to the first trusted environment and uses the decrypted file.
A data processing method provided in the present application is further described below by way of a complete example. For example, singer a sends an intelligent contract 1 to a second node device in the blockchain network through a first node device, and the intelligent contract 1 includes album 1 related information issued by singer a and an address for downloading album 1. And the user B transacts with the second node equipment in the block chain network through the terminal equipment to obtain the downloading authority of the album 1. After the second node device in the blockchain network recognizes the transaction, the transaction record of the user B (the used terminal device) obtaining the download right of the album is stored in the blockchain. After obtaining the download authority of the album 1, the user B sends an acquisition request 1 to the first node device through the address of the album 1 downloaded in the intelligent contract 1 when the album 1 needs to be downloaded. The acquisition request 1 is for requesting acquisition of a file 1 (album 1). The acquisition request 1 includes the identity information of the user B, trusted execution environment information (a public key of a trusted execution environment of a terminal device used by the user B), and an identifier of the album 1 that the user B requests to acquire. After receiving the acquisition request 1 sent by the terminal device, the first node device sends confirmation information to the second node device, where the confirmation information is used to confirm whether the user B has the authority to download the album 1 (i.e., whether the user B has the authority to download the album 1 is determined according to the identity information of the user B). And receiving response information returned by the second node equipment. If the response information indicates that the user B does not have the download authority of the album 1, the first node device sends prompt information 1 to the terminal device, and the prompt information 1 is used for prompting that the terminal device can download the album only after the terminal device needs to obtain the download authority of the album 1. If the response information indicates that the user B has the download authority of the album 1, it is determined whether the public key of the trusted execution environment of the terminal device exists in the pre-stored public key list of the trusted execution environment, and if the public key of the trusted execution environment of the terminal device exists in the pre-stored public key list of the trusted execution environment, the first node device encrypts the album 1 through the public key of the trusted execution environment of the terminal device, so as to obtain the encrypted file 1. And the second node equipment sends the encrypted file 1 to the terminal equipment, and after receiving the encrypted file 1, the terminal equipment decrypts the encrypted file 1 in the trusted execution environment through a private key of the trusted execution environment carried in a terminal equipment chip, so that the album 1 can be played. It should be noted that, in the trusted execution environment, the user B can only play the album 1 through the terminal device corresponding to the trusted execution environment, and cannot acquire the decrypted album 1. If the user B sends the encrypted file 1 to the user C, the user C cannot play the album 1 through the device itself because the private key in the chip in each device is unique and cannot be tampered with.
In the data processing method, the first node device determines whether the terminal device used by the first user has the download authority of the first file by sending the confirmation information to the second node device. After the terminal device used by the first user is confirmed to have the downloading authority of the first file, the first file is encrypted through a first public key provided by the terminal device, and a first encrypted file is obtained. Since the first encrypted file can only be decrypted and used in the device corresponding to the first trusted execution environment. Therefore, the data processing method provided by the embodiment of the application solves the problem that the digital product is illegally forwarded and used after being acquired by a user, and protects the legitimate rights and interests of the owner of the digital product.
Referring to fig. 3, fig. 3 is a flowchart of another data processing method according to an embodiment of the present disclosure. The data processing method can be interactively realized by the terminal device 101 and the first node device 102 shown in fig. 1; as shown in fig. 3, the data processing method includes, but is not limited to, the following steps 301 to 305:
301. the first node equipment receives a first acquisition request sent by the terminal equipment.
The specific implementation of step 301 may refer to the specific implementation of step 201 in fig. 2, and is not described herein again.
302. The first node equipment searches whether a transaction record of the first user for acquiring the downloading authority of the first file exists in the blockchain.
In one embodiment, the first node device searches whether a transaction record exists in the blockchain, wherein the transaction record indicates that the first user has permission to download the first file, through the identity information of the first user. If the transaction record of the first user for obtaining the downloading authority of the first file does not exist in the block chain, the first node device sends first prompt information to the terminal device, and the first prompt information is used for indicating that the first user does not have the authority of downloading the first file. If the transaction record of the download authority of the first file acquired by the first user exists in the block chain, the first node device checks whether the transaction record contains the download authority time range. If the transaction record does not contain the time range of the download right (i.e. the first user has the permanent download right of the first file), determining that the first user has the download right of the first file, and continuing to execute step 303; if the transaction record contains the download authority time range, the first node device determines whether the current time is within the download authority time range. If the current time is within the download right time range, it is determined that the first user has the download right of the first file, and step 303 is continuously executed. And if the current time is not within the downloading permission time range, the first node equipment sends second prompt information to the terminal equipment, wherein the second prompt information is used for prompting that the permission of the first user for downloading the first file is expired, and the first user does not have the permission for downloading the first file at present.
For example, the user 1 purchases a time-limited song 1 in a blockchain network through the terminal device, and assuming that the download permission time range of the time-limited song 1 is from 2018 to 2019 and 12 months, after the transaction is completed, the transaction record of the user 1 purchasing the song 1 is recorded in the blockchain, and the transaction record includes the download permission time ranges 2018.1-2019.12. Assuming that user 1 needs to download song 1 in 11 months in 2019, user 1 sends an acquisition request 1 to the first node apparatus through the terminal apparatus. And the first node equipment searches the transaction record of the user 1 in the block chain according to the identity information of the user 1 in the acquisition request 1. At this time, there is a transaction record of the user 1 purchasing song 1 in the blockchain, and the transaction record includes the download right time range. Since 11 months in 2019 included the download right time range in the transaction record, the first node device determines that the user 1 has the download right of song 1.
303. The first node device obtains a first public key of the terminal device.
In an embodiment, the first node device obtains the first public key of the terminal device through a first obtaining request sent by the terminal device, and after obtaining the first public key of the terminal device, determines whether the first public key is real and valid through a pre-stored public key list of a trusted execution environment in the blockchain network. If the first public key exists in the pre-stored public key list of the trusted execution environment, it is determined that the first public key is authentic and valid, and step 304 is continued.
In another embodiment, the first node device obtains the first public key of the terminal device corresponding to the first user from the blockchain through a correspondence between the user identity information stored in the blockchain and the public key of the trusted execution environment. It will be appreciated that the first public key in the blockchain has been verified against the list of public keys of the trusted execution environment and is valid. For example, assuming that user 1 establishes an association with trusted execution environment 1 at the time of blockchain registration, the association of user 1 with trusted execution environment 1 is recorded in the blockchain. The first node device searches for the relevant information of the user 1 in the block chain through the identity information of the user 1, and then obtains the association relationship between the user 1 and the trusted execution environment 1, and further obtains the public key of the trusted execution environment 1.
304. The first node device encrypts the first file through the first public key of the terminal device to obtain a first encrypted file.
305. The first node device sends the first encrypted file to the terminal device.
The specific implementation of step 304 and step 305 may refer to the implementation of step 204 and step 205 in fig. 2, and will not be described herein again.
In the data processing method, the first node device determines whether the terminal device used by the first user has the download authority of the first file by searching the transaction record in the block chain. After the terminal device used by the first user is confirmed to have the downloading authority of the first file, the first file is encrypted through a first public key provided by the terminal device, and a first encrypted file is obtained. Since the first encrypted file can only be decrypted and used in the device corresponding to the first trusted execution environment. Therefore, the data processing method provided by the embodiment of the application solves the problem that the digital product is illegally forwarded and used after being acquired by a user, and protects the legitimate rights and interests of the owner of the digital product.
Referring to fig. 4, fig. 4 is a flowchart of another data processing method according to an embodiment of the present disclosure. The data processing method can be interactively realized by the terminal device 101 and the first node device 102 shown in fig. 1; as shown in fig. 4, the data processing method includes, but is not limited to, the following steps 401 to 404:
401. the first node device records a first time at which the first encrypted file was generated.
In one embodiment, the first node device records a first time for generating the first encrypted file after generating the first encrypted file or after transmitting the first encrypted file to the terminal device. For example, assuming that the first node device generated encrypted file 1 in 2018, 3/28, the first time recorded by the first node device is 2018.3.28.
402. The first node device receives the second acquisition request.
In one embodiment, the first user may have a need to replace the terminal device. At this time, the first user sends a second acquisition request to the first node device through the terminal device or other devices. The second obtaining request is used for obtaining the first file, and the second obtaining request carries a second public key and the identity information of the first user.
403. And if the interval between the time of receiving the second acquisition request and the first time is greater than the time threshold value and the second public key exists in a pre-stored public key list of the trusted environment, the first node equipment encrypts the first file through the second public key to obtain a second encrypted file.
In one embodiment, the first node device determines whether an interval between a time of receiving the second acquisition request and the first time is greater than a time threshold. And if the interval between the time for receiving the second acquisition request and the first time is not greater than the time threshold, the first node equipment sends prompt information to the terminal equipment, wherein the prompt information is used for prompting that the first user cannot download the first file at present. If the interval between the time of receiving the second acquisition request and the first time is greater than the time threshold and the second public key exists in the pre-stored public key list of the trusted environment, the first node device encrypts the first file through the second public key to obtain a second encrypted file, and the specific implementation manner may refer to the implementation manner in step 204 in fig. 2, which is not described herein again.
For example, assuming that the user 1 has the download right of song 1, and the time threshold is 3 months, the user 1 sends an acquisition request 1 to the first node device in month 1 of 2019, where the acquisition request 1 is used to acquire the song 1, and the acquisition request 1 carries the trusted execution environment 1. After confirming that the user 1 has the download authority of the song 1, the first node device encrypts the song 1 by using the trusted execution environment 1 to obtain an encrypted file 1. The first node device records the time 1 for generating the encrypted file 1 and transmits the encrypted file 1 to the terminal device used by the user 1. The user 1 sends an obtaining request 2 to the first node device in 2019, in 2 months, where the obtaining request 2 is used to obtain the song 1, and the obtaining request 2 carries the trusted execution environment 2. Because the interval between the current time and the time 1 is smaller than the time threshold, the first node device sends a prompt message 1 to the terminal device, and the prompt message 1 is used for prompting that the user 1 cannot download the song 1 at present. The user 1 sends an obtaining request 2 to the first node device again in 2019 and 6 months, wherein the obtaining request 2 is used for obtaining the song 1, and the obtaining request 2 carries the trusted execution environment 2. Since the interval between the current time and the time 1 is greater than the time threshold, the first node device encrypts the song 1 by using the trusted execution environment 2 to obtain an encrypted file 2. The first node device records the time 2 at which the encrypted file 2 was generated and transmits the encrypted file 2 to the terminal device used by the user 1.
404. And the first node equipment sends the second encrypted file to the terminal equipment.
The specific implementation of step 404 may refer to the implementation of step 205 in fig. 2, and is not described herein again.
By the data processing method, the first node device not only ensures that the first user can download the first file again after replacing the terminal device by controlling the downloading time interval of the first file, but also avoids the situation that the first user acquires the request to download the first file by frequently sending, and simultaneously protects the legitimate rights and interests of the owner of the digital product.
Referring to fig. 5, fig. 5 is a flowchart of another data processing method according to an embodiment of the present disclosure. The data processing method can be interactively realized by the terminal device 101 and the first node device 102 shown in fig. 1; as shown in fig. 5, the data processing method includes, but is not limited to, the following steps 501 to 504:
501. the first node equipment counts the downloading times of the first file downloaded by the first user.
In one embodiment, after the first node device generates the first encrypted file or sends the first encrypted file to the terminal device, the first node device counts the download times of the first user for downloading the first file.
502. The first node device receives the third acquisition request.
The specific implementation of step 502 may refer to the implementation of step 402 in fig. 4, and is not described herein again.
In one embodiment, there may be situations where a first user needs to run a first file on multiple devices. For example, user 1 may wish to listen to song 1 on both a cell phone and a computer.
503. And if the downloading times of the first user for downloading the first file are less than the quantity threshold value and the third public key exists in a pre-stored public key list of the trusted environment, the first node equipment encrypts the first file through the third public key to obtain a third encrypted file.
In one embodiment, the first node device determines whether the number of times that the first user provides the public key of the different trusted execution environments to download the first file is greater than a quantity threshold. And if the downloading times of the first file downloaded by the public key of the different trusted execution environments provided by the first user are greater than or equal to the quantity threshold, the first node equipment sends prompt information to the terminal equipment, and the prompt information is used for prompting that the first user cannot download the first file at present. If the number of times that the first user provides the public keys of different trusted execution environments to download the first file is less than the number threshold, and the third public key exists in the pre-stored public key list of the trusted environment, the first node device encrypts the first file through the third public key to obtain a third encrypted file, which may refer to the implementation manner of step 204 in fig. 2, and is not described herein again.
For example, assuming that the user 1 has the download right of song 1 and the number threshold is 5, the number of times that the user 1 provides the public key of different trusted execution environments to download song 1 counted by the first node device is 2. The user 1 sends an obtaining request 3 to the first node device, where the obtaining request 3 is used to obtain the song 1, and the obtaining request 3 carries the trusted execution environment 3. Because the download times of the song 1 downloaded by the public key provided by the user 1 in different trusted execution environments are less than the time threshold, the first node device encrypts the song 1 by using the trusted execution environment 3 to obtain the encrypted file 3. The first node device counts the number of times that the user 1 provides the public key of different trusted execution environments to download the song 1 to be 3, and sends the encrypted file 3 to the terminal device used by the user 1.
504. And the first node equipment sends the third encrypted file to the terminal equipment.
The specific implementation of step 504 can refer to the implementation of step 205 in fig. 2, and is not described herein again.
Through the data processing method, the first node equipment not only ensures that the first user can download the first file again after replacing the terminal equipment by controlling the downloading times of the first file, but also avoids the situation that the first user acquires the first file through frequent sending and downloading requests, and simultaneously protects the legal rights and interests of the owner of the digital product.
While the method of the embodiments of the present application has been described in detail above, to facilitate better implementation of the above-described aspects of the embodiments of the present application, the apparatus of the embodiments of the present application is provided below accordingly.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application, where the data processing apparatus may be mounted on the second node device in the foregoing method embodiment. The data processing apparatus shown in fig. 6 may be used to perform some or all of the functions in the method embodiments described above with reference to fig. 2, 3, 4 and 5. Wherein, the detailed description of each unit is as follows:
an obtaining unit 601, configured to receive a first obtaining request sent by a terminal device, where the first obtaining request is used to obtain a first file, and the first obtaining request carries identity information of a first user of the terminal device;
a processing unit 602, configured to determine whether the first user has the download permission of the first file according to the identity information of the first user, obtain a first public key of the terminal device if the first user has the download permission of the first file, encrypt the first file by using the first public key of the terminal device if the first public key of the terminal device exists in a pre-stored public key list of a trusted execution environment, obtain a first encrypted file, and send the first encrypted file to the terminal device.
In an embodiment, the processing unit 602 is further configured to determine, according to the identity information of the first user, whether the first user has the download permission of the first file, and specifically, to:
searching whether a transaction record of the first user for acquiring the downloading authority of the first file exists in a block chain;
if the transaction record of the first user for acquiring the downloading authority of the first file exists, determining that the first user has the downloading authority of the first file;
and if the transaction record of the first user for acquiring the downloading authority of the first file does not exist, determining that the first user does not have the downloading authority of the first file.
In an embodiment, the processing unit 602 is further configured to obtain a first public key of the terminal device, and specifically configured to:
and acquiring a first public key of the terminal device corresponding to the first user from the block chain according to the corresponding relation between the user identity information stored in the block chain and the public key of the trusted execution environment.
In an embodiment, the transaction record includes a download right time range, and the processing unit 602 is further configured to:
judging whether the current time is within the download permission time range;
if the current time is within the time range of the downloading authority, executing a step of determining that the first user has the downloading authority of the first file;
and if the current time is not within the downloading authority time range, determining that the first user does not have the downloading authority of the first file.
In one embodiment, a first public key is carried in a first acquisition request of the terminal device;
the processing unit 602 is further configured to obtain a first public key of the terminal device, and specifically configured to:
and acquiring the first public key from the first acquisition request of the terminal equipment.
In an embodiment, after sending the first encrypted file to the terminal device, the processing unit 602 is further configured to:
recording a first time for generating the first encrypted file;
receiving, by an obtaining unit 601, a second obtaining request sent by the terminal device, where the second obtaining request is used to obtain the first file, and the second obtaining request carries identity information of a first user of the terminal device and a second public key;
if the interval between the time of receiving the second acquisition request and the first time is greater than a time threshold value and the second public key exists in a pre-stored public key list of the trusted environment, encrypting the first file through the second public key to obtain a second encrypted file;
and recording a second time for generating the second encrypted file, and sending the second encrypted file to the terminal equipment.
In an embodiment, after sending the first encrypted file to the terminal device, the processing unit 602 is further configured to:
counting the downloading times of the first file downloaded by the first user;
receiving, by an obtaining unit 601, a third obtaining request sent by the terminal device, where the third obtaining request is used to obtain the first file, and the third obtaining request carries identity information of a first user of the terminal device and a third public key;
if the downloading times of the first file downloaded by the first user is less than the quantity threshold value and the third public key exists in a pre-stored public key list of the trusted environment, encrypting the first file through the third public key to obtain a third encrypted file;
and sending the third encrypted file to the terminal equipment.
According to an embodiment of the present application, some steps involved in the data processing methods shown in fig. 2, 3, 4 and 5 may be performed by various units in the data processing apparatus shown in fig. 6. For example, step 201 and step 203 shown in fig. 2 may be performed by the acquisition unit 601 shown in fig. 6, and step 202, step 204 and step 205 may be performed by the processing unit 602 shown in fig. 6. Step 301 shown in fig. 3 may be performed by the acquisition unit 601 shown in fig. 6, and steps 302 to 305 may be performed by the processing unit 602 shown in fig. 6. Step 402 shown in fig. 4 may be performed by the acquisition unit 601 shown in fig. 6, and step 401, step 403, and step 404 may be performed by the processing unit 602 shown in fig. 6. The units in the data processing apparatus shown in fig. 6 may be respectively or entirely combined into one or several other units to form one or several other units, or some unit(s) may be further split into multiple functionally smaller units to form one or several other units, which may achieve the same operation without affecting the achievement of the technical effect of the embodiments of the present application. The units are divided based on logic functions, and in practical application, the functions of one unit can be realized by a plurality of units, or the functions of a plurality of units can be realized by one unit. In other embodiments of the present application, the data processing apparatus may also include other units, and in practical applications, the functions may also be implemented by being assisted by other units, and may be implemented by cooperation of a plurality of units.
According to another embodiment of the present application, a data processing apparatus as shown in fig. 6 may be constructed by running a computer program (including program codes) capable of executing steps involved in the respective methods shown in fig. 2, 3, 4, and 5 on a general-purpose computing apparatus such as a computer including a processing element such as a Central Processing Unit (CPU), a random access storage medium (RAM), a read-only storage medium (ROM), and a storage element, and implementing the data processing method of the embodiment of the present application. The computer program may be recorded on a computer-readable recording medium, for example, and loaded and executed in the above-described computing apparatus via the computer-readable recording medium.
Based on the same inventive concept, the principle and the advantageous effect of the data processing apparatus provided in the embodiment of the present application for solving the problem are similar to the principle and the advantageous effect of the data processing apparatus in the embodiment of the method of the present application for solving the problem, and for brevity, the principle and the advantageous effect of the implementation of the method may be referred to, and are not described herein again.
Referring to fig. 7, fig. 7 is a schematic structural diagram of another data processing apparatus according to an embodiment of the present application, where the data processing apparatus at least includes a processor 701, a communication interface 702, and a memory 703. The processor 701, the communication interface 702, and the memory 703 may be connected by a bus or in other manners, and in this embodiment of the application, the connection by the bus is taken as an example. The processor 701 (or Central Processing Unit (CPU)) is a computing core and a control core of the terminal, and can analyze various instructions in the terminal and process various data of the terminal, for example: the CPU can be used for analyzing a power-on and power-off instruction sent to the terminal by a user and controlling the terminal to carry out power-on and power-off operation; the following steps are repeated: the CPU may transmit various types of interactive data between the internal structures of the terminal, and so on. The communication interface 702 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI, mobile communication interface, etc.), and may be controlled by the processor 701 to transmit and receive data; the communication interface 702 can also be used for transmission and interaction of data inside the terminal. A Memory 703(Memory) is a Memory device in the terminal for storing programs and data. It is understood that the memory 703 herein may comprise both the built-in memory of the terminal and, of course, also the expansion memory supported by the terminal. The memory 703 provides storage space that stores the operating system of the terminal, which may include, but is not limited to: android system, iOS system, Windows Phone system, etc., which are not limited in this application.
In the embodiment of the present application, the processor 701 executes the executable program code in the memory 703 to perform the following operations:
receiving a first acquisition request sent by a terminal device through a communication interface 702, where the first acquisition request is used to acquire a first file, and the first acquisition request carries identity information of a first user of the terminal device;
judging whether the first user has the downloading authority of the first file or not according to the identity information of the first user;
if the first user has the downloading authority of the first file, acquiring a first public key of the terminal device;
and if the first public key exists in a pre-stored public key list of the trusted execution environment, encrypting the first file through the first public key to obtain a first encrypted file, and sending the first encrypted file to the terminal equipment.
As an optional implementation manner, the specific implementation manner of the processor 701 determining whether the first user has the download permission of the first file according to the identity information of the first user is as follows:
searching whether a transaction record of the first user for acquiring the downloading authority of the first file exists in a block chain;
if the transaction record of the first user for acquiring the downloading authority of the first file exists, determining that the first user has the downloading authority of the first file;
and if the transaction record of the first user for acquiring the downloading authority of the first file does not exist, determining that the first user does not have the downloading authority of the first file.
As an optional implementation manner, a specific implementation manner of the processor 701 obtaining the first public key of the terminal device is as follows:
and acquiring a first public key of the terminal device corresponding to the first user from the block chain according to the corresponding relation between the user identity information stored in the block chain and the public key of the trusted execution environment.
As an optional implementation, the transaction record includes a download authority time range, and the processor 701 further performs the following operations:
judging whether the current time is within the download permission time range;
if the current time is within the time range of the downloading authority, executing a step of determining that the first user has the downloading authority of the first file;
and if the current time is not within the downloading authority time range, determining that the first user does not have the downloading authority of the first file.
As an optional implementation manner, the first obtaining request of the terminal device carries a first public key;
the specific implementation manner of the processor 701 obtaining the first public key of the terminal device is as follows:
and acquiring the first public key from the first acquisition request of the terminal equipment.
As an optional implementation manner, after sending the first encrypted file to the terminal device, the processor 701 further performs the following operations by executing the executable program code in the memory 703:
recording a first time for generating the first encrypted file;
receiving a second acquisition request sent by the terminal device through a communication interface 702, where the second acquisition request is used to acquire the first file, and the second acquisition request carries identity information of a first user of the terminal device and a second public key;
if the interval between the time of receiving the second acquisition request and the first time is greater than a time threshold value and the second public key exists in a pre-stored public key list of the trusted environment, encrypting the first file through the second public key to obtain a second encrypted file;
and recording a second time for generating the second encrypted file, and sending the second encrypted file to the terminal equipment.
As an optional implementation manner, after sending the first encrypted file to the terminal device, the processor 701 further performs the following operations by executing the executable program code in the memory 703:
counting the downloading times of the first file downloaded by the first user;
receiving a third acquisition request sent by the terminal device through a communication interface 702, where the third acquisition request is used to acquire the first file, and the third acquisition request carries identity information of a first user of the terminal device and a third public key;
if the downloading times of the first file downloaded by the first user is less than the quantity threshold value and the third public key exists in a pre-stored public key list of the trusted environment, encrypting the first file through the third public key to obtain a third encrypted file;
and sending the third encrypted file to the terminal equipment.
Based on the same inventive concept, the principle and the advantageous effect of the data processing apparatus provided in the embodiment of the present application for solving the problem are similar to the principle and the advantageous effect of the data processing apparatus in the embodiment of the method of the present application for solving the problem, and for brevity, the principle and the advantageous effect of the implementation of the method may be referred to, and are not described herein again.
The embodiment of the present application further provides a computer-readable storage medium, where one or more instructions are stored in the computer-readable storage medium, and the one or more instructions are adapted to be loaded by a processor and to execute the data processing method described in the foregoing method embodiment.
Embodiments of the present application further provide a computer program product containing instructions, which when run on a computer, cause the computer to execute the data processing method described in the above method embodiments.
It should be noted that, for simplicity of description, the above-mentioned embodiments of the method are described as a series of acts or combinations, but those skilled in the art should understand that the present application is not limited by the order of acts described, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The modules in the device can be merged, divided and deleted according to actual needs.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, which may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
While the invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A method of data processing, the method comprising:
receiving a first acquisition request sent by terminal equipment, wherein the first acquisition request is used for acquiring a first file and carries identity information of a first user of the terminal equipment;
judging whether the first user has the downloading authority of the first file or not according to the identity information of the first user;
if the first user has the downloading authority of the first file, acquiring a first public key of the terminal device;
and if the first public key exists in a pre-stored public key list of the trusted execution environment, encrypting the first file through the first public key to obtain a first encrypted file, and sending the first encrypted file to the terminal equipment.
2. The method according to claim 1, wherein the determining whether the first user has the right to download the first file according to the identity information of the first user comprises:
searching whether a transaction record of the first user for acquiring the downloading authority of the first file exists in a block chain;
if the transaction record of the first user for acquiring the downloading authority of the first file exists, determining that the first user has the downloading authority of the first file;
and if the transaction record of the first user for acquiring the downloading authority of the first file does not exist, determining that the first user does not have the downloading authority of the first file.
3. The method of claim 1, wherein obtaining the first public key of the terminal device comprises:
and acquiring a first public key of the terminal device corresponding to the first user from the block chain according to the corresponding relation between the user identity information stored in the block chain and the public key of the trusted execution environment.
4. The method of claim 2, wherein the transaction record includes a download authority time range; the method further comprises the following steps:
judging whether the current time is within the download permission time range;
if the current time is within the time range of the downloading authority, executing a step of determining that the first user has the downloading authority of the first file;
and if the current time is not within the downloading authority time range, determining that the first user does not have the downloading authority of the first file.
5. The method according to claim 1 or 2, characterized in that the first public key is carried in the first acquisition request of the terminal device;
acquiring a first public key of the terminal device, including:
and acquiring the first public key from the first acquisition request of the terminal equipment.
6. The method of claim 5, wherein after sending the first encrypted file to the terminal device, the method further comprises:
recording a first time for generating the first encrypted file;
receiving a second acquisition request sent by the terminal device, wherein the second acquisition request is used for acquiring the first file, and the second acquisition request carries identity information and a second public key of a first user of the terminal device;
if the interval between the time of receiving the second acquisition request and the first time is greater than a time threshold value and the second public key exists in a pre-stored public key list of the trusted environment, encrypting the first file through the second public key to obtain a second encrypted file;
and recording a second time for generating the second encrypted file, and sending the second encrypted file to the terminal equipment.
7. The method of claim 5, wherein after sending the first encrypted file to the terminal device, the method further comprises:
counting the downloading times of the first file downloaded by the first user;
receiving a third acquisition request sent by the terminal device, wherein the third acquisition request is used for acquiring the first file, and the third acquisition request carries identity information and a third public key of a first user of the terminal device;
if the downloading times of the first file downloaded by the first user is less than the quantity threshold value and the third public key exists in a pre-stored public key list of the trusted environment, encrypting the first file through the third public key to obtain a third encrypted file;
and sending the third encrypted file to the terminal equipment.
8. A data processing apparatus, comprising:
a receiving unit, configured to receive a first acquisition request sent by a terminal device, where the first acquisition request is used to acquire a first file, and the first acquisition request carries identity information of a first user of the terminal device;
and the processing unit is used for judging whether the first user has the download authority of the first file or not according to the identity information of the first user, acquiring a first public key of the terminal device if the first user has the download authority of the first file, encrypting the first file through the first public key of the terminal device if the first public key of the terminal device exists in a pre-stored public key list of a trusted execution environment to obtain a first encrypted file, and sending the first encrypted file to the terminal device.
9. A data processing apparatus comprising a processor, a memory and a communication interface, the processor, the memory and the communication interface being interconnected, wherein the memory is configured to store a computer program comprising program instructions, the processor being configured to invoke the program instructions to perform a data processing method according to any one of claims 1 to 7.
10. A computer-readable storage medium having stored thereon one or more instructions adapted to be loaded by a processor and to perform a data processing method according to any of claims 1 to 7.
CN202010248930.4A 2020-03-31 2020-03-31 Data processing method and device and computer readable storage medium Pending CN111460400A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010248930.4A CN111460400A (en) 2020-03-31 2020-03-31 Data processing method and device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010248930.4A CN111460400A (en) 2020-03-31 2020-03-31 Data processing method and device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN111460400A true CN111460400A (en) 2020-07-28

Family

ID=71681602

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010248930.4A Pending CN111460400A (en) 2020-03-31 2020-03-31 Data processing method and device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111460400A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187742A (en) * 2020-09-14 2021-01-05 绿瘦健康产业集团有限公司 Information security transmission method, device, medium and terminal equipment
CN112492035A (en) * 2020-11-30 2021-03-12 维沃移动通信有限公司 File transmission method and device and electronic equipment
CN112507369A (en) * 2021-01-29 2021-03-16 腾讯科技(深圳)有限公司 Service processing method and device based on block chain, readable medium and electronic equipment
WO2022120938A1 (en) * 2020-12-09 2022-06-16 杭州趣链科技有限公司 Data sharing method, system and apparatus, and device and storage medium
CN115423126A (en) * 2022-08-30 2022-12-02 昆明华龙智腾科技股份有限公司 Fire protection maintenance management system based on big data

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743903A (en) * 2016-03-07 2016-07-06 读者出版传媒股份有限公司 Audio digital rights management method and system, intelligent terminal and authentication server
CN106845160A (en) * 2015-12-03 2017-06-13 国家新闻出版广电总局广播科学研究院 A kind of digital copyright management for intelligent operating system(DRM)Method and system
CN107241364A (en) * 2017-08-10 2017-10-10 广州杰之良软件有限公司 Document down loading method and device
CN107995230A (en) * 2016-10-26 2018-05-04 中国移动通信有限公司研究院 A kind of method for down loading and terminal
CN109768865A (en) * 2019-01-18 2019-05-17 深圳市威赫科技有限公司 Block chain upper body part under credible performing environment digitizes realization method and system
CN109885988A (en) * 2019-02-18 2019-06-14 四川迪佳通电子有限公司 Method for broadcasting multimedia file, multimedia equipment based on credible performing environment
CN110110548A (en) * 2019-04-12 2019-08-09 深圳市中易通安全芯科技有限公司 The correlation technique that file encryption stores under credible performing environment based on encryption chip
US20190278944A1 (en) * 2018-12-21 2019-09-12 Alibaba Group Holding Limited Verifying integrity of data stored in a consortium blockchain using a public sidechain
US20190294761A1 (en) * 2018-03-20 2019-09-26 Markany Inc. Method and apparatus for watermarking of digital content, method for extracting information
CN110519049A (en) * 2019-08-07 2019-11-29 赤峰学院 A kind of cloud data protection system based on credible performing environment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845160A (en) * 2015-12-03 2017-06-13 国家新闻出版广电总局广播科学研究院 A kind of digital copyright management for intelligent operating system(DRM)Method and system
CN105743903A (en) * 2016-03-07 2016-07-06 读者出版传媒股份有限公司 Audio digital rights management method and system, intelligent terminal and authentication server
CN107995230A (en) * 2016-10-26 2018-05-04 中国移动通信有限公司研究院 A kind of method for down loading and terminal
CN107241364A (en) * 2017-08-10 2017-10-10 广州杰之良软件有限公司 Document down loading method and device
US20190294761A1 (en) * 2018-03-20 2019-09-26 Markany Inc. Method and apparatus for watermarking of digital content, method for extracting information
US20190278944A1 (en) * 2018-12-21 2019-09-12 Alibaba Group Holding Limited Verifying integrity of data stored in a consortium blockchain using a public sidechain
CN109768865A (en) * 2019-01-18 2019-05-17 深圳市威赫科技有限公司 Block chain upper body part under credible performing environment digitizes realization method and system
CN109885988A (en) * 2019-02-18 2019-06-14 四川迪佳通电子有限公司 Method for broadcasting multimedia file, multimedia equipment based on credible performing environment
CN110110548A (en) * 2019-04-12 2019-08-09 深圳市中易通安全芯科技有限公司 The correlation technique that file encryption stores under credible performing environment based on encryption chip
CN110519049A (en) * 2019-08-07 2019-11-29 赤峰学院 A kind of cloud data protection system based on credible performing environment

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187742A (en) * 2020-09-14 2021-01-05 绿瘦健康产业集团有限公司 Information security transmission method, device, medium and terminal equipment
CN112492035A (en) * 2020-11-30 2021-03-12 维沃移动通信有限公司 File transmission method and device and electronic equipment
CN112492035B (en) * 2020-11-30 2023-10-27 维沃移动通信有限公司 File transmission method and device and electronic equipment
WO2022120938A1 (en) * 2020-12-09 2022-06-16 杭州趣链科技有限公司 Data sharing method, system and apparatus, and device and storage medium
CN112507369A (en) * 2021-01-29 2021-03-16 腾讯科技(深圳)有限公司 Service processing method and device based on block chain, readable medium and electronic equipment
CN115423126A (en) * 2022-08-30 2022-12-02 昆明华龙智腾科技股份有限公司 Fire protection maintenance management system based on big data

Similar Documents

Publication Publication Date Title
CN112214780B (en) Data processing method and device, intelligent equipment and storage medium
JP7436568B2 (en) Methods and systems realized by blockchain
US11314891B2 (en) Method and system for managing access to personal data by means of a smart contract
CN111429254B (en) Business data processing method and device and readable storage medium
CN110036613B (en) System and method for providing identity authentication for decentralized applications
CN111460400A (en) Data processing method and device and computer readable storage medium
CN109740384A (en) Data based on block chain deposit card method and apparatus
CN107483509A (en) A kind of auth method, server and readable storage medium storing program for executing
JP6543743B1 (en) Management program
CN110908786A (en) Intelligent contract calling method, device and medium
CN113704210A (en) Data sharing method and electronic equipment
CN111914293A (en) Data access authority verification method and device, computer equipment and storage medium
US20180218364A1 (en) Managing distributed content using layered permissions
CN112800392A (en) Authorization method and device based on soft certificate and storage medium
CN113486122A (en) Data sharing method and electronic equipment
CN115412269A (en) Service processing method, device, server and storage medium
CN110910110A (en) Data processing method and device and computer storage medium
CN111680013A (en) Data sharing method based on block chain, electronic equipment and device
CN112423302A (en) Wireless network access method, terminal and wireless access equipment
CN115048672A (en) Data auditing method and device based on block chain, processor and electronic equipment
CN115146252B (en) Authorization authentication method, system, computer device and storage medium
CN113946864B (en) Confidential information acquisition method, device, equipment and storage medium
WO2024011863A9 (en) Communication method and apparatus, sim card, electronic device, and terminal device
Alblooshi Blockchain-based Ownership Management for Medical IoT (MIoT) Devices and their Data
CN114491468A (en) Equipment flow recording method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination