CN111475826B - Private data yielding method and device based on blockchain technology - Google Patents

Private data yielding method and device based on blockchain technology Download PDF

Info

Publication number
CN111475826B
CN111475826B CN202010376380.4A CN202010376380A CN111475826B CN 111475826 B CN111475826 B CN 111475826B CN 202010376380 A CN202010376380 A CN 202010376380A CN 111475826 B CN111475826 B CN 111475826B
Authority
CN
China
Prior art keywords
data
private data
area
request
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010376380.4A
Other languages
Chinese (zh)
Other versions
CN111475826A (en
Inventor
吴烽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fengshun Science And Technology Information Service Co ltd
Original Assignee
Hangzhou Fengshun Science And Technology Information Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fengshun Science And Technology Information Service Co ltd filed Critical Hangzhou Fengshun Science And Technology Information Service Co ltd
Priority to CN202010376380.4A priority Critical patent/CN111475826B/en
Publication of CN111475826A publication Critical patent/CN111475826A/en
Application granted granted Critical
Publication of CN111475826B publication Critical patent/CN111475826B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a private data yielding method and a private data yielding device based on a blockchain technology, which are applied among a member A, a member B and other members in a blockchain organization, wherein the method comprises the following steps: the member B sends a yielding request of private data to the member A through the blockchain public area; the member B receives reply information from the member A for the yielding request; member B verifies the reply information and retrieves the encrypted private data from the temporary data area; the member B stores the obtained encrypted private data in a blockchain data isolation area of the member B, and decrypts the encrypted private data; corresponding apparatus are also disclosed. Under the block chain data security mechanism, the whole-course yielding process of private data among the block chain members is completed; the operation flow of the privacy data output is not additionally increased, but the reliable privacy data transfer based on the block chain is realized, and the transaction safety and convenience are greatly improved.

Description

Private data yielding method and device based on blockchain technology
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a method and an apparatus for outputting private data based on a blockchain technology.
Background
With the popularization of blockchain technology, protection of private data of member organizations is increasingly emphasized in private chains or alliance chains of blockchain multi-organizations. Different mechanisms are adopted for protecting the private data by different blockchain platforms, wherein a channel isolation technology is universal and can be used for protecting the private technology, and a privacy zone mechanism of the super ledger provides the privacy protection of members more conveniently.
How to transfer the private data to other organization members in the alliance chain with or without payment, the following two methods are commonly used in the application field at present:
the first is that the data owner obtains private data from the blockchain isolation area through the upper application platform and then transfers the private data to other organization members by the upper application platform. The scheme can send the private data to the appointed member by a single point, but simultaneously, the private data is separated from the protection of the blockchain data security, so that the private data is easy to attack by a public network, and the risk of misoperation of a central database operator to reveal the data is introduced. If private network is adopted to unicast private data, protection of blockchain data is lost, and high maintenance cost of the private network is also brought.
The second is to put the private data in the ledger public area of the blockchain, but to set the threshold for reading or writing by smart contracts. The scheme adopts an intelligent contract as a 'pipeline' for reading private data, protects the read-write authority of private data in a public account area, but can be broken through by purposeful attack. Because the private data is already in the ledger public area, each organization member already has a storage backup of the private data, and the "pipeline" for reading the private data is blocked, but can be repaired by deploying a targeted new intelligent contract, so that the private data is read.
Disclosure of Invention
The invention provides a private data yielding method and device based on a blockchain technology to solve the technical problems.
In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
according to a first aspect of the embodiments of the present invention, a private data export method based on a blockchain technique is provided, which is applied between a member a and a member B and in a public area in a blockchain organization, and includes the following steps:
step 101, a member B sends a yielding request of private data to a member A through a blockchain public area, wherein the private data is stored in a blockchain data isolation area of the member A;
step 102, a member B receives reply information from a member a to the let out request, the reply information including address information of a temporary data area, the temporary data area is created in a blockchain public area by the member a through an intelligent contract to store encrypted private data, the encrypted private data is generated by encrypting the private data after the member a receives the let out request, and a readable member unique to the temporary data area is set as the member B;
step 103, member B verifies the reply information and retrieves the encrypted private data from the temporary data area;
step 104, the member B stores the obtained encrypted private data in the blockchain data isolation area of the member B, and decrypts the encrypted private data.
Preferably, the member a is provided with an a mailbox for receiving the request for letting out private data, the member B is provided with a B mailbox for receiving the reply information of the request for letting out private data, and the a mailbox and the B mailbox are respectively provided with at least one letter cabinet.
Preferably, in the step 101, the private data let-off request sent by the member B to the member a contains the member B public key; in step 102, member a encrypts the private data with the public key of member B to generate encrypted private data; in step 104, the member B decrypts the encrypted private data with the private key corresponding to the public key in the private data issuing request.
Preferably, the encryption method of the private data by the member a is asymmetric encryption.
Preferably, the member B takes out the encrypted private data from the temporary data area, and then the temporary data area is destroyed.
According to a second aspect of the embodiment of the present invention, there is provided a private data let-off apparatus based on a blockchain technique, applied between a member a and a member B and in a public area in a blockchain organization, including:
the yielding request unit is used for sending a yielding request of private data to the member A through the blockchain public area by the member B, wherein the private data is stored in the blockchain data isolation area of the member A;
a reply receiving unit, configured to receive reply information from a member a for a yielding request, where the reply information includes address information of a temporary data area, where the temporary data area is created by the member a through an intelligent contract in a blockchain public area to store encrypted private data, where the encrypted private data is generated by encrypting the private data after the member a receives the yielding request, and a readable member unique to the temporary data area is set as the member B;
a data retrieving unit for verifying the reply information by the member B and retrieving the encrypted private data from the temporary data area;
and the data decryption unit is used for storing the obtained encrypted private data in the blockchain data isolation area of the member B by the member B and decrypting the encrypted private data.
Preferably, in the yielding request unit, the private data yielding request sent by the member B to the member a contains a member B public key; in the reply receiving unit, the member A encrypts the private data by using the member B public key to generate encrypted private data; in the data decryption unit, the member B decrypts the encrypted private data by using the private key corresponding to the public key in the private data issuing request.
Preferably, in the data retrieving unit, the member B retrieves the encrypted private data from the temporary data area, and then destroys the temporary data area.
Preferably, in the reply receiving unit, the encryption method of the private data by the member a is asymmetric encryption.
Preferably, the member a is provided with an a mailbox for receiving the request for letting out private data, the member B is provided with a B mailbox for receiving the reply information of the request for letting out private data, and the a mailbox and the B mailbox are respectively provided with at least one letter cabinet.
Compared with the prior art, the method completes the whole yielding process of private data among the blockchain members under the blockchain data security mechanism; under the block chain isolation storage technology, storing, encrypting and decrypting the private data plaintext are realized; the survival timeliness is strictly controlled corresponding to the encrypted privacy data, and a strategy of destroying after being used up is adopted, so that the data safety is further improved; the operation flow of the privacy data output is not additionally increased, but the reliable privacy data transfer based on the block chain is realized, and the transaction safety and convenience are greatly improved.
Drawings
FIG. 1 is a flow chart of a method for yielding private data based on blockchain technique in accordance with the present invention;
fig. 2 is a block diagram of a private data output device based on blockchain technology according to the present invention.
In the figure, 201-let-off request unit, 202-reply receiving unit, 203-data fetching unit, 204-data decrypting unit.
Detailed Description
The present invention will be described in detail below with reference to specific embodiments shown in the drawings. These embodiments are not intended to limit the invention and structural, methodological, or functional modifications of these embodiments that may be made by one of ordinary skill in the art are included within the scope of the invention.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
The privacy data yielding method based on the block chain technology is applied to the data yielding party member A, the data requesting party member B and other members in the block chain organization, and is mainly used for transferring data from the block chain organization member A to the organization member B. The corresponding blockchain data structure is briefly described below.
Data privacy zone for member a: the private data of the member A can be stored in a blockchain storage channel which is owned by the member A by a general channel isolation technology of each blockchain platform, and can also be realized by other storage isolation technologies supported by the platform, such as a 'private area' of a super ledger, and the storage units of the isolation mechanism are uniformly represented by the 'private area'.
Data privacy zone for member B: and the member B is provided with a block chain storage channel which is used for storing private data of the member B. In the invention, the member B is a data requester, and the privacy data obtained after the request is stored in the data privacy area of the member B.
The creation and application of the above two data privacy zones is not dependent on specific blockchain isolation techniques.
Public area: and the member A, the member B and other members share an account book area which is billed together, and the member A, the member B and other members have the same data reading authority. The member A is provided with an A mailbox for receiving the privacy data let-off request, the member B is provided with a B mailbox for receiving reply information of the privacy data let-off request, and the A mailbox and the B mailbox are respectively provided with at least one letter cabinet. A public mailbox is a storage unit of address disclosures that members open in a public ledger area through smart contracts. The intelligent contract supports each member to open a mailbox in a public area, and after the mailbox is opened, the other members are informed of generating a private data access request or an access reply response to the member by using the mailbox. Each member's mailbox, each blockchain member can send request letters to it, but the intelligent dating control read rights, namely carrying the access of the mailbox issuing member certificate authentication can only read the mailbox contents. The mailbox address for each member is represented by a blockchain identifier + a mailbox identifier + a member identifier, such as blc003.Box. A. The mailbox can be targeted for attack, but only the data access request is loaded in the mailbox, but not the private data, so that the value of the attack does not exist from the use case perspective, and even if the mailbox is targeted for attack, the untampered function of the blockchain can cause an attacker to leave enough evidence.
The public mailbox is provided with a plurality of usable letter cabinets, the number of the letter cabinets is set when members open, and the letter cabinets are sequentially arranged according to the sequence number. The cabinet has two states, empty or loaded. The empty information cabinet is used for receiving a request for acquiring the appointed privacy data sent by the alliance member, and the information cabinet is set to be in a loading state when receiving the request; the "loaded" cabinet waits for the "master" to read, and once the cabinet "letter" (request) is read, the cabinet is placed in a "blank" state by the smart contract. The mailbox implementation mechanism can be a design mode based on K-V storage, or a queue or other methods can be adopted.
The a-mail box (box.a) is the public mail box of member a, and the B-mail box (box.b) is the public mail box of member B. The serial numbers of the signal cabinets can be set as follows in sequence: box.A.1 is a letter cabinet with the letter box number of the member A being 1. The mailbox access work adopts a block K-V key value mode, data is put into a mailbox, namely request data is put into an address of k=blc003. Box.a through an intelligent contract interface, the intelligent appointment automatic management cabinet is carried out, an empty cabinet is selected to store the request, the cabinet state is replaced, and the member is waited to read. The member can obtain all unread letters in the mailbox at one time through the intelligent contract interface.
As shown in fig. 1, a private data outputting method based on a blockchain technology is applied between a member a and a member B in a blockchain organization and in a public area, and specifically comprises the following steps:
in step 101, the member B sends a request for yielding private data to the member a through the blockchain public area, where the private data is stored in the blockchain data isolation area of the member a.
And the member A stores valuable privacy data into a block chain data isolation area of the member A so as to realize privacy protection. For privacy data willing to leave, a will notify other members through the blockchain application platform.
And the member B sends a data transfer request to the mailbox disclosed by the member A to obtain the privacy data of the member A. Wherein the private data let-off request sent by member B to member a contains member B public key.
The private data leave request may be made by the following request protocol: { "mem_id": "ORG.B", "id_info": "units: blockchain technology, contacts: zhang III, telephone: 12345678"," event ":dataapply", "for_data":dataA "," pubkey ":MIGfMA 0GCSqGSI …".
The mem_id is the member id of the applicant in the blockchain, namely the id of the member B; id_info is a detailed description of the applicant member; event is an event type, in this example, request for private data; for_data is the unique identifier of the requested private data; the pubkey is a public key provided by the requester for encrypting data.
In step 102, the member B receives reply information from the member a to the let out request, the reply information including address information of a temporary data area created by the member a in the blockchain public area by the smart contract to store encrypted private data, the encrypted private data being generated by the member a receiving the let out request and encrypting the private data, the only readable member of the temporary data area being set as the member B.
Member a obtains, through the smart contract, an leave request for private data sent by member B into the a mailbox. The intelligent contract carries the member A signature and the necessary transfer parameters, the requested privacy data is found in the member A data privacy area, the privacy data dataA is encrypted by the member B public key, and the encrypted privacy data encrypt. The encryption process is performed within the privacy zone. Here, the encryption method of the private data by the member a may be asymmetric encryption.
The encrypted privacy data encrypter. DataA is moved out of the privacy zone by the intelligent contract, the intelligent contract carries the signature of the member A to establish a temporary data zone to store the encrypter. DataA, and only the member B is set to have the reading authority of the temporary data zone.
A temporary data area (tmp.a) is a temporary data storage area created for member a, and a read right of the temporary data area may be set as member B. The data temporary storage area holds private data encrypted with a data transfer request member public key (requester public key carried by a data request command). And the intelligent contract is used for controlling the waiting data to be sent out so that the request member can read the encrypted private data. The temporary data storage area has "life time" and "takeout". When the intelligent contract is used for destroying temporary area data, the function avoids that the encrypted privacy data is exposed to a public account book area for a long time. "extractability" refers to the destruction of data by a smart contract upon a requested member reading.
After the intelligent contract carrying member A signs and creates a temporary data area to store encrypted privacy data encryptedDataA, necessary information is packed, and reply information of a yielding request is formally replied to a B mailbox.
The reply information may be referred to as follows: { "mem_id": "ORG.A", "id_info": "units: blockchain service, contacts: and Li IV, telephone: 9876544"," event ":" answer DataApply "," for_data ":" encrypt. DataA "," data_path ":" UODJFDSK93JFLFDSL "," encrypt_type ":" ECSDA "," encrypt_pubkey ": "MIGfMA0GCSqGSI …", "cut_off_time": "2020/4/8/12:56"}.
Wherein mem_id is the responder member id; event is an event type, in this example, replying to a private data yielding request; id_info is the application member details; for_data is a unique identifier of assigned target data; the data_path is the path of the target data; encrypt_type is the encryption mode of the target data; encrypt_pubkey is used as a target data encryption public key; cut_off_time is the expiration time of the validity period of the target data.
And after the reply information reaches the B mailbox, the member B takes out the reply information from the B mailbox.
Step 103, member B verifies the reply information and retrieves the encrypted private data from the temporary data area.
After verifying the reply information, the member B takes the encrypted privacy data encryptedDataA from the temporary data area data_path along with the self certificate signature and stores the encrypted privacy data encryptedDataA in the self privacy isolation area. And after the member B takes out the encrypted private data from the temporary data area, the temporary data area is destroyed.
Step 104, the member B stores the obtained encrypted private data in the blockchain data isolation area of the member B, and decrypts the encrypted private data.
Here, the member B decrypts the encrypted private data with the private key corresponding to the public key in the private data issuing request.
Corresponding to the embodiment of the private data issuing method based on the blockchain technology, the invention also provides the embodiment of the private data issuing device based on the blockchain technology.
As shown in fig. 2, a private data let-off device based on a blockchain technology is applied between a member a, a member B and other members in a blockchain organization, and includes:
a yielding request unit 201, configured to send a yielding request of private data to a member a through a blockchain public area by a member B, where the private data is stored in a blockchain data isolation area of the member a;
a reply receiving unit 202, configured to receive reply information from a member a for a leave request, where the reply information includes address information of a temporary data area, where the temporary data area is created by the member a in a blockchain public area through an intelligent contract to store encrypted private data, where the encrypted private data is generated by encrypting the private data after the member a receives the leave request, and a readable member unique to the temporary data area is set as the member B;
a data retrieving unit 203 for verifying the reply information by the member B and retrieving the encrypted private data from the temporary data area;
the data decryption unit 204 is configured to store the obtained encrypted private data in the blockchain data isolation area of the member B, and decrypt the encrypted private data.
In the yielding request unit 201, the private data yielding request sent by the member B to the member a contains the member B public key; in the reply receiving unit 202, the member a encrypts the private data with the public key of the member B to generate encrypted private data, wherein the encryption method of the member a on the private data is asymmetric encryption; in the data extraction unit 203, after the member B extracts the encrypted private data from the temporary data area, the temporary data area is destroyed; in the data decryption unit 204, the member B decrypts the encrypted private data by using the private key corresponding to the public key in the private data issuing request.
Here, the member a is provided with an a mailbox for receiving the let-off request of the private data, the member B is provided with a B mailbox for receiving the reply information of the let-off request of the private data, and the a mailbox and the B mailbox are respectively provided with at least one letter cabinet.
The specific manner in which the individual units perform the operations in relation to the apparatus of the above embodiments has been described in detail in relation to the embodiments of the method and will not be described in detail here.
For the device embodiments, reference is made to the description of the method embodiments for the relevant points, since they essentially correspond to the method embodiments. The above-described apparatus embodiments are merely illustrative, and some or all of the modules may be selected according to actual needs to achieve the objectives of the disclosed solution. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It is to be understood that the invention is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (6)

1. The method for issuing private data based on the blockchain technology is characterized by being applied among a member A, a member B and other members in a blockchain organization and comprising the following steps:
step 101, a member B sends a yielding request of private data to a member A through a blockchain public area, wherein the private data is stored in a blockchain data isolation area of the member A;
step 102, a member B receives reply information from a member a to the let out request, the reply information including address information of a temporary data area, the temporary data area is created in a blockchain public area by the member a through an intelligent contract to store encrypted private data, the encrypted private data is generated by encrypting the private data after the member a receives the let out request, and a readable member unique to the temporary data area is set as the member B;
step 103, member B verifies the reply information and retrieves the encrypted private data from the temporary data area;
step 104, the member B stores the obtained encrypted private data in a blockchain data isolation area of the member B, and decrypts the encrypted private data;
in the step 101, a private data yielding request sent by a member B to a member a contains a member B public key; in step 102, member a encrypts the private data with the public key of member B to generate encrypted private data; in step 104, the member B decrypts the encrypted private data with the private key corresponding to the public key in the private data yielding request; in step 103, the member B takes out the encrypted private data from the temporary data area, and then destroys the temporary data area.
2. The method according to claim 1, wherein the member a is provided with an a-mail box for receiving the request for giving the private data, the member B is provided with a B-mail box for receiving the reply information to the request for giving the private data, and the a-mail box and the B-mail box are respectively provided with at least one letter cabinet.
3. The method of claim 1, wherein the encryption method of the private data by the member a is asymmetric encryption.
4. A private data issuing device based on a blockchain technology, which is applied among a member a, a member B and other members in a blockchain organization, comprising:
the yielding request unit is used for sending a private data yielding request to the member A through the blockchain public area by the member B, and the private data is stored in the blockchain data isolation area of the member A;
a reply receiving unit, configured to receive reply information from a member a for a request for issuing private data, where the reply information includes address information of a temporary data area, where the temporary data area is created by the member a in a blockchain public area through an intelligent contract to store encrypted private data, where the encrypted private data is generated by encrypting the private data after the member a receives the request for issuing private data, and a readable member unique to the temporary data area is set as the member B;
a data retrieving unit for verifying the reply information by the member B and retrieving the encrypted private data from the temporary data area;
the data decryption unit is used for storing the obtained encrypted private data in the blockchain data isolation area of the member B by the member B and decrypting the encrypted private data;
in the yielding request unit, a private data yielding request sent by a member B to a member A contains a member B public key; in the reply receiving unit, the member A encrypts the private data by using the member B public key to generate encrypted private data; in the data decryption unit, the member B decrypts the encrypted private data by using a private key corresponding to the public key in the private data issuing request; in the data extraction unit, the member B extracts the encrypted private data from the temporary data area, and then the temporary data area is destroyed.
5. The apparatus according to claim 4, wherein the encryption method of the private data by member a in the reply receiving unit is asymmetric encryption.
6. The apparatus according to any one of claims 4 to 5, wherein the member a is provided with an a-mail box for receiving a request for giving out private data, and the member B is provided with a B-mail box for receiving reply information to the request for giving out private data, and wherein the a-mail box and the B-mail box are provided with at least one letter cabinet, respectively.
CN202010376380.4A 2020-05-07 2020-05-07 Private data yielding method and device based on blockchain technology Active CN111475826B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010376380.4A CN111475826B (en) 2020-05-07 2020-05-07 Private data yielding method and device based on blockchain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010376380.4A CN111475826B (en) 2020-05-07 2020-05-07 Private data yielding method and device based on blockchain technology

Publications (2)

Publication Number Publication Date
CN111475826A CN111475826A (en) 2020-07-31
CN111475826B true CN111475826B (en) 2023-08-08

Family

ID=71757279

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010376380.4A Active CN111475826B (en) 2020-05-07 2020-05-07 Private data yielding method and device based on blockchain technology

Country Status (1)

Country Link
CN (1) CN111475826B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229203A (en) * 2017-12-29 2018-06-29 北京安云世纪科技有限公司 Document protection method and device in a kind of terminal
CN109214197A (en) * 2018-08-14 2019-01-15 上海点融信息科技有限责任公司 The method, apparatus and storage medium of private data are handled based on block chain
CN109325870A (en) * 2018-10-10 2019-02-12 上海保险交易所股份有限公司 The method and system of shared private data
CN109377221A (en) * 2018-10-16 2019-02-22 杭州趣链科技有限公司 A method of the privacy based on alliance's block chain, which is traded, to be protected
CN109947723A (en) * 2018-11-30 2019-06-28 上海点融信息科技有限责任公司 For the block data sharing method of block chain network, storage medium, calculate equipment
CN110147684A (en) * 2019-05-24 2019-08-20 众安信息技术服务有限公司 For realizing the method and apparatus of block chain data-privacy protection
CN110222052A (en) * 2019-05-20 2019-09-10 重庆金融资产交易所有限责任公司 Block chain data processing method, device, computer equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10841082B2 (en) * 2015-11-24 2020-11-17 Adi BEN-ARI System and method for blockchain smart contract data privacy
US10951394B2 (en) * 2017-08-15 2021-03-16 Acronis International Gmbh System and method for publication of private data using a blockchain network
US20190236559A1 (en) * 2018-01-31 2019-08-01 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing smart flow contracts using distributed ledger technologies in a cloud based computing environment
CN110909073B (en) * 2018-09-14 2023-06-13 宏达国际电子股份有限公司 Method and system for sharing private data based on intelligent contract

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229203A (en) * 2017-12-29 2018-06-29 北京安云世纪科技有限公司 Document protection method and device in a kind of terminal
CN109214197A (en) * 2018-08-14 2019-01-15 上海点融信息科技有限责任公司 The method, apparatus and storage medium of private data are handled based on block chain
CN109325870A (en) * 2018-10-10 2019-02-12 上海保险交易所股份有限公司 The method and system of shared private data
CN109377221A (en) * 2018-10-16 2019-02-22 杭州趣链科技有限公司 A method of the privacy based on alliance's block chain, which is traded, to be protected
CN109947723A (en) * 2018-11-30 2019-06-28 上海点融信息科技有限责任公司 For the block data sharing method of block chain network, storage medium, calculate equipment
CN110222052A (en) * 2019-05-20 2019-09-10 重庆金融资产交易所有限责任公司 Block chain data processing method, device, computer equipment and storage medium
CN110147684A (en) * 2019-05-24 2019-08-20 众安信息技术服务有限公司 For realizing the method and apparatus of block chain data-privacy protection

Also Published As

Publication number Publication date
CN111475826A (en) 2020-07-31

Similar Documents

Publication Publication Date Title
CN103716155B (en) A kind of method of automated maintenance POS terminal and operation terminal
CA2766491C (en) A method and system for securely and automatically downloading a master key in a bank card payment system
CN103262494B (en) Method and system to the cross-domain Identity Management of the safety on line supply of equipment framework based on white list
CN102710633B (en) Cloud security management system of security electronic documents and method
CN102859929A (en) Online secure device provisioning with updated offline identity data generation and offline device binding
EP1322088A2 (en) Method and apparatus for centralized processing of hardware tokens for PKI solutions
CN101593389A (en) A kind of key management method and system that is used for the POS terminal
CN102224703B (en) Method, device and system for issuing license
CN102045342A (en) Apparatus and methods for protecting network resources
CN102484638A (en) Layered protection and validation of identity data delivered online via multiple intermediate clients
CN105518687A (en) Secure data storage
CN110352413A (en) A kind of real data files access control method and system based on strategy
CN107800538A (en) A kind of self-service device remote cipher key distribution method
EP3395004B1 (en) A method for encrypting data and a method for decrypting data
CN109446259A (en) Data processing method and device, processor and storage medium
CN101656720B (en) Method for uniformly maintaining access object information in information system and device thereof
CN112149077B (en) Supply chain billing method, system and computer equipment based on block chain technology
CN106027475A (en) Secret key obtaining method and identity card information transmission method and system
CN113610528A (en) Block chain-based management system, method, device and storage medium
CN108737079B (en) Distributed quantum key management system and method
CN102542645B (en) A kind of entrance guard authentication method and Verification System
CN112668018A (en) Block chain-based government data protocol authorization sharing method and device
EP1473868B1 (en) Method and apparatus for passing data securely between parties
KR20130118951A (en) Secure management and personalization of unique code signing keys
CN111475826B (en) Private data yielding method and device based on blockchain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant