CN111539005A - Block chain data identification method and related device oriented to data security policy - Google Patents

Block chain data identification method and related device oriented to data security policy Download PDF

Info

Publication number
CN111539005A
CN111539005A CN202010326333.9A CN202010326333A CN111539005A CN 111539005 A CN111539005 A CN 111539005A CN 202010326333 A CN202010326333 A CN 202010326333A CN 111539005 A CN111539005 A CN 111539005A
Authority
CN
China
Prior art keywords
data
blockchain
identification
block chain
dimension
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010326333.9A
Other languages
Chinese (zh)
Inventor
唐晓丹
周平
李佳秾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronics Standardization Institute
Original Assignee
China Electronics Standardization Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electronics Standardization Institute filed Critical China Electronics Standardization Institute
Priority to CN202010326333.9A priority Critical patent/CN111539005A/en
Publication of CN111539005A publication Critical patent/CN111539005A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Accounting & Taxation (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the application discloses a data security policy-oriented block chain identification method and a related device. And identifying the blockchain data to be identified in the blockchain system according to the identification dimension, and determining the identification label corresponding to the identification dimension for the blockchain data to be identified according to the identification result. Because the identification tag identifies the data source and the data type of the blockchain data, the blockchain data are identified according to the identification tag, and the blockchain data of different types in the blockchain system can be classified from the two dimensions of the data source and the data type, so that management is performed according to different data security levels according to the blockchain data of different types, and the security control of the blockchain system is improved.

Description

Block chain data identification method and related device oriented to data security policy
Technical Field
The present application relates to the field of blockchain, and in particular, to a data security policy oriented blockchain data identification method and related apparatus.
Background
In various blockchain applications, data security and privacy protection are very important problems, and the privacy problem is more special because the data stored on the blockchain has the characteristic of being difficult to delete. In the system ecology of the blockchain, reasonable classification and identification of data are very critical to data security management and control.
At present, a data classification and identification mode of data security control is not involved in the related technologies, and it is obvious that how to perform block chain data identification based on data security is a technical problem which needs to be solved urgently at present.
Disclosure of Invention
In order to solve the technical problem, the present application provides a data security policy-oriented block chain data identification method and a related apparatus.
The embodiment of the application discloses the following technical scheme:
in one aspect, an embodiment of the present application provides a data security policy-oriented blockchain data identification method, where the method includes:
determining an identification dimension of blockchain data based on a data security policy, wherein the identification dimension comprises a data source and a data type, the data source is used for identifying a blockchain role for generating the blockchain data, and the data type is used for identifying a service type related to the blockchain data;
identifying the block chain data to be identified corresponding to the block chain system based on the identification dimension;
and determining an identification label corresponding to the identification dimension for the block chain data to be identified according to the identification result.
On the other hand, an embodiment of the present application provides a device for identifying blockchain data oriented to a data security policy, where the device includes a determining unit and an identifying unit:
the determining unit is configured to determine, based on a data security policy, an identification dimension of blockchain data, where the identification dimension includes a data source and a data type, the data source is used to identify a blockchain role for generating blockchain data, and the data type is used to identify a service type to which the blockchain data relates;
the identification unit is used for identifying the to-be-identified block chain data corresponding to the block chain system based on the identification dimension;
the determining unit is further configured to determine, according to the identification result, an identification tag corresponding to the identification dimension for the to-be-identified blockchain data.
In another aspect, an embodiment of the present application provides a data security policy-oriented blockchain data identification device, where the device includes a processor and a memory:
the memory is used for storing a computer program;
the processor is configured to perform the method of the above aspect according to the computer program.
In another aspect, the present application provides a computer-readable storage medium for storing a computer program for executing the method of the above aspect.
According to the technical scheme, the identification dimension of the blockchain data is determined according to the data security policy, and the identification dimension comprises the data source and the data type of the blockchain data. Wherein the data source identifies a blockchain role for generating blockchain data and the data type identifies a service type to which the blockchain data relates. And identifying the blockchain data to be identified in the blockchain system according to the identification dimension, and determining the identification label corresponding to the identification dimension for the blockchain data to be identified according to the identification result. Because the identification tag identifies the data source and the data type of the blockchain data, the blockchain data are identified according to the identification tag, and the blockchain data of different types in the blockchain system can be classified from the two dimensions of the data source and the data type, so that management is performed according to different data security levels according to the blockchain data of different types, and the security control of the blockchain system is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic flowchart of a data security policy-oriented block chain data identification method according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of another data security policy-oriented blockchain identification method according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of another data security policy-oriented blockchain identification method according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of a data security policy-oriented blockchain identification apparatus according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present application are described below with reference to the accompanying drawings.
In a blockchain system, blockchain data typically involves different roles for different blockchain users, blockchain providers, blockchain managers, and so on. The series of activities that these data-related parties undertake around the blockchain system may result in multiple types of data that may be stored or streamed on multiple devices or clouds, such as servers, mobile terminals, internet of things devices, and the like. Meanwhile, the blockchain itself can be regarded as an account book which is commonly maintained by multiple parties based on consensus. In a blockchain network, there may be different interested parties behind different nodes, and the data ownership is relatively complicated. Based on this, classifying the blockchain data of the blockchain ecosystem and safely and effectively managing the blockchain data of different types are very critical issues for all kinds of data-related parties.
Currently, there are few methods for reasonably and effectively classifying blockchain data, which are disadvantageous to blockchain data management and use and data security and privacy protection in a blockchain system. With the development and scale of blockchain applications in various industries, it will be essential to classify blockchain data. Generally, the classification of the blockchain data needs to be based on principles of stability, systematicness, expandability, comprehensive practicality, compatibility, and the like, and may be classified from different dimensions such as sources, data structures, data update methods, and the like, and a data correlation party manages the blockchain system based on the classification result of the blockchain data to improve the security and the orderliness of the blockchain system.
Based on this, the embodiment of the application provides a data security policy-oriented blockchain data identification method and a related device, which can be applied to different application fields, meet the requirements of different data security management in blockchain services, have better expandability, and can be conveniently converted into service languages in the field in different fields; and the blockchain data identification method is associated with roles of different interested parties in the blockchain system ecology. By classifying the blockchain data based on a data security policy, the interested parties of different types of blockchain data can be made aware of their own responsibilities and actions in data management.
The block chain data identification method facing the differentiated data security policy, provided by the embodiment of the application, can be applied to block chain data identification equipment with data processing capacity, such as terminal equipment or a server. The terminal equipment can be a mobile phone, a desktop computer, a portable computer and the like; the server may be understood as an application server or a Web server, and in actual deployment, the server may be an independent server or a cluster server.
The following describes a block chain data identification method for a differentiated data security policy according to an embodiment of the present application with reference to the accompanying drawings. For ease of understanding, in the following embodiments, a server is used as an execution subject. In fig. 1, the method comprises the following steps:
s101: identifying dimensions of blockchain data are determined based on a data security policy, the identifying dimensions including a data source and a data type.
S102: and identifying the to-be-identified blockchain data corresponding to the blockchain system based on the identification dimension.
S103: and determining an identification label corresponding to the identification dimension for the block chain data to be identified according to the identification result.
The security management and control of the blockchain data in the blockchain system are different in different application scenarios. Therefore, in an objective perspective, in different application scenarios, an adaptive data security policy can be formulated according to actual data security management requirements. The data security policy may be set according to different data security management requirements and different roles of the blockchain data-related parties, and is not limited herein.
In the blockchain system, for the roles of different blockchain data correlators, the corresponding data security levels of different types of blockchain data are different, that is, the requirements for data security management are different. For example, for a blockchain user, the importance of the blockchain data related to the user is high, the security level is high, and the need for data security management is high. Therefore, corresponding data security policies can be set from two dimensions, namely a data source and a data type, and are used for classifying the blockchain data with different security levels, so that differentiated security management is performed on the blockchain data according to the classification result.
In practical applications, the server may determine an identification dimension of the blockchain data according to the data security policy, where the identification dimension includes a data source and a data type. The data security policy is set based on two dimensions of data source and data type. The identification dimension divides the type of blockchain data from two different dimensions, data source and data type. In one aspect, the data source identifies a blockchain role for generating blockchain data. The data type, on the other hand, identifies the type of traffic to which the blockchain relates.
Among the blockchain roles, the roles most closely associated with blockchain data are: blockchain users and blockchain providers. Both roles blockchain user and blockchain provider have large data management requirements for blockchain data in a blockchain system. In general, a blockchain developer, blockchain auditor, etc. in the blockchain associator role can read data without generally generating data directly associated with the blockchain system. Isometric colors are less desirable for data management of blockchain data in a blockchain system than blockchain users and blockchain providers.
Therefore, in the embodiments of the present application, from the perspective of security management of blockchain data, the blockchain data is classified from two roles, namely, in one possible implementation, the blockchain role includes a blockchain user and a blockchain provider, and in addition, the data source is also used to identify derived data, which is derived when the blockchain user uses the blockchain.
Based on the above, the blockchain data can be divided into three types, i.e., blockchain user data, blockchain provider data and derivative data, according to the data source.
Blockchain user data is data generated by blockchain users when using a blockchain system. The activity of the blockchain user to generate blockchain data includes: the block chain user provides data to the block chain system; the block chain user acquires data from the block chain system; blockchain users download, install, or otherwise use blockchain applications in blockchain systems, and the like.
Blockchain provider data is data generated by a blockchain provider when providing services associated with a blockchain. The activity of the blockchain provider to generate blockchain data includes: managing access and authorization data; managing application configuration data; maintaining operation data; processing and using agreed upon blockchain user data; application and data related services; data recovery, classification and protection; managing cross-link data exchanges, etc.
The derived data is data derived by the blockchain user when using the blockchain application.
The blockchain data is divided into transaction data, intelligent contract data, blockchain account data, operation data, access and authorization data, end user identifiable information, and the like according to the data type, namely from the perspective of the service to which the blockchain data relates.
Transaction data (Transaction data): the block chain transaction processing data is data describing relevant business actions and recording transaction processing results. The transaction data may include financial transaction data, or in general, transaction data such as genetic data, voting records, shipping records, product production data, and the like. The transaction record may be data on the chain or linked to data outside the chain by a hash.
Smart contract data (Smart contract data): in the blockchain technology, the smart contracts are computer programs that are triggered based on a predetermined event, are not tampered, and are automatically executed, and usually, the execution result of the smart contracts is recorded on the blockchain. The smart contract data includes executable code and the results of the execution.
Block chain account data (Blockchain account data): the blockchain account is representative of entities such as the actual initiator and interested party of the transaction. For example, intelligent contracts or data assets in a blockchain may be associated with blockchain accounts. Accordingly, blockchain account data is representative of the entities whose data is stored in the blockchain system.
Operation data: the operation data is data for supporting the operation of the blockchain system, and includes service logs, configuration data, and the like.
Access and authorization data: is data used within the blockchain system to manage access blockchain capabilities, blockchain data, and intelligent contracts, including passwords, keys, security certificates, etc.
End user identifiable information: is data that is associated with the blockchain user but is not blockchain user data. Including link data, usage data, application configuration data, etc.
The embodiment of the present application provides a hierarchical extensible blockchain data identification method based on data sources and data types of a blockchain system by using a view method in system description, as shown in fig. 2.
In fig. 2, the blockchain data may be divided into three types, i.e., blockchain user data, blockchain provider data, and derived data, according to the data source, and each type of data is further divided into several subtypes according to the data type. It should be noted that the data security policy-oriented block chain identification method provided in the embodiment of the present application is a data classification method with strong expandability, and this data classification method is not exhaustive, and more types or subtypes may be set in future with the development of the block chain or according to the actual data security management requirement task.
After the identification dimensions, namely the data source and the data type, of the blockchain data are determined, the server can identify the blockchain data to be identified in the blockchain system according to the identification dimensions, and the identification result identifies the data source and the data type of the blockchain data to be identified. Furthermore, the server can determine the identification label corresponding to the identification dimension for the block chain data to be identified according to the identification result. The identification tag identifies information of two dimensions, namely a data source and a data type of the blockchain data to be identified.
In the data security policy-oriented blockchain identification method provided in the above embodiment, the identification dimension of the blockchain data is determined according to the data security policy, where the identification dimension includes a data source and a data type of the blockchain data. Wherein the data source identifies a blockchain role for generating blockchain data and the data type identifies a service type to which the blockchain data relates. And identifying the blockchain data to be identified in the blockchain system according to the identification dimension, and determining the identification label corresponding to the identification dimension for the blockchain data to be identified according to the identification result. Because the identification tag identifies the data source and the data type of the blockchain data, the blockchain data are identified according to the identification tag, and the blockchain data of different types in the blockchain system can be classified from the two dimensions of the data source and the data type, so that management is performed according to different data security levels according to the blockchain data of different types, and the security control of the blockchain system is improved.
In the above embodiment, the identified dimensions include data source and data category. In one possible implementation, the identification dimension may further include a data category that identifies a category of a transaction to which the blockchain data relates. The data type is determined based on a data security policy and is preset according to the requirement of data security control on the blockchain system. The transaction to which the blockchain data relates can be understood as some action performed by a role in the blockchain system, for example, a blockchain provider records voting data of blockchain users, a blockchain user stores transaction encryption data, and the like.
In addition, the blockchain data is divided into on-chain data and off-chain data according to different data storage positions. Since the on-chain or off-chain data also has a large influence on the management of the data, in the block chain data identification method oriented to the data security policy provided in the present scheme, it will also be discussed that the specific data type is usually stored on-chain or off-chain.
In another possible implementation manner, the identification dimension may further include a data storage manner, where the data storage manner identifies whether a storage manner in the blockchain data blockchain system is an on-chain storage manner or an off-chain storage manner. The data storage mode is determined according to a data security policy and is preset according to the requirement of data security control on the blockchain system.
According to the block chain data identification method facing the data security policy, the identification of the block chain data types aims to organize different types of block chain data according to fixed principles and types, so that the data can be maintained and managed conveniently by adopting different policies and schemes.
As shown in fig. 3, in a possible implementation manner, the first step of the method is to identify various types of service data and system data in the blockchain system, so as to list the types of data in the blockchain system as much as possible. The second step is to determine the data source for each type of data. The third step is to re-determine the data type of each data based on the second step. The fourth step is to determine the storage mode of the transaction data and the like by adopting the data type stored on the chain or out of the chain.
Based on the above, the server may perform classification and identification on the blockchain data in the blockchain system by performing any one of the manners provided in the above embodiments, so as to obtain the blockchain data with the identification tag. Furthermore, in the process of carrying out data security management and control on the blockchain system, the target blockchain data which accord with the target dimensionality is determined by acquiring the data security management requirement for the blockchain system and then according to the identification tag corresponding to the blockchain data to be identified, so that data security management is carried out on the target blockchain data. The data security management requirements carry corresponding target dimensions, and the target dimensions at least comprise a specified data source and a specified data type.
For example, the target dimensions include: the data source is designated as blockchain user and the data type is designated as intelligent contract data. Therefore, according to the data security management requirement comprising the target dimension, the blockchain data with the identification tag in the blockchain system is identified, and the blockchain data with the blockchain user and the intelligent contract data is identified as the target blockchain data.
The embodiment provides a hierarchical and highly-extensible block chain data identification method facing a data security policy, and the method can be used as an important basis for a data classification policy of a block chain system. Due to the adoption of an abstract view method, the block chain data identification method has universality, is suitable for various types of block chain systems, and is also suitable for block chain data correlation parties with different data security management requirements. The block chain data identification method is matched with relevant international standards and national standards, and has a strong adaptive foundation. In addition, the blockchain data identification method focuses on the role of the blockchain system induced by the activities related to the blockchain system, and is more helpful for the classification of data and the security control of the data.
For the method provided by the above embodiment, the embodiment of the present application further provides a corresponding device for identifying blockchain data oriented to a data security policy. In fig. 4, the apparatus includes a determination unit 401 and a recognition unit 402:
the determining unit 401 is configured to determine, based on a data security policy, an identification dimension of blockchain data, where the identification dimension includes a data source and a data type, the data source is used to identify a blockchain role for generating blockchain data, and the data type is used to identify a service type to which the blockchain data relates;
the identifying unit 402 is configured to identify to-be-identified blockchain data corresponding to a blockchain system based on the identification dimension;
the determining unit 401 is further configured to determine, according to the identification result, an identification tag corresponding to the identification dimension for the to-be-identified blockchain data.
The data source is further used for identifying derived data, and the derived data is data derived when the blockchain user uses a blockchain.
Wherein the identification dimension further comprises a data category for identifying a category of the transaction involved.
The identification dimension further comprises a data storage mode, and the data storage mode is used for identifying the on-chain storage mode and the off-chain storage mode.
Wherein the apparatus further comprises an acquisition unit:
the acquiring unit is configured to acquire a data security management requirement for the blockchain system, where the data security management requirement carries a corresponding target dimension, and the target dimension at least includes a specified data source and a specified data type;
the determining unit 401 is configured to determine, according to the identification tag corresponding to the to-be-identified blockchain data, target blockchain data that meets the target dimension.
The device for identifying a blockchain oriented to a data security policy according to the foregoing embodiment determines, according to the data security policy, an identification dimension of blockchain data, where the identification dimension includes a data source and a data type of the blockchain data. Wherein the data source identifies a blockchain role for generating blockchain data and the data type identifies a service type to which the blockchain data relates. And identifying the blockchain data to be identified in the blockchain system according to the identification dimension, and determining the identification label corresponding to the identification dimension for the blockchain data to be identified according to the identification result. Because the identification tag identifies the data source and the data type of the blockchain data, the blockchain data are identified according to the identification tag, and the blockchain data of different types in the blockchain system can be classified from the two dimensions of the data source and the data type, so that management is performed according to different data security levels according to the blockchain data of different types, and the security control of the blockchain system is improved.
The embodiment of the present application further provides a device for identifying blockchain data oriented to a data security policy, where the device includes a processor and a memory:
the memory is used for storing a computer program;
the processor is configured to execute the data security policy-oriented blockchain data identification method according to the computer program.
The embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium is used for storing a computer program, and the computer program is used for executing the data security policy-oriented block chain data identification method provided by the foregoing embodiment.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium may be at least one of the following media: various media that can store program codes, such as read-only memory (ROM), RAM, magnetic disk, or optical disk.
It should be noted that, in the present specification, all the embodiments are described in a progressive manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus and system embodiments, since they are substantially similar to the method embodiments, they are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described embodiments of the apparatus and system are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only one specific embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A data security policy oriented blockchain data identification method is characterized by comprising the following steps:
determining an identification dimension of blockchain data based on a data security policy, wherein the identification dimension comprises a data source and a data type, the data source is used for identifying a blockchain role for generating the blockchain data, and the data type is used for identifying a service type related to the blockchain data;
identifying the block chain data to be identified corresponding to the block chain system based on the identification dimension;
and determining an identification label corresponding to the identification dimension for the block chain data to be identified according to the identification result.
2. The method of claim 1, wherein the blockchain role comprises a blockchain user and a blockchain provider, and wherein the data source is further configured to identify derived data derived from using a blockchain by the blockchain user.
3. The method of claim 1, wherein the identification dimension further comprises a data category, the data category identifying a category of the transaction involved.
4. The method of claim 1, wherein the identification dimension further comprises a data storage means, the data storage means being configured to identify an on-chain storage means and an off-chain storage means.
5. The method according to any one of claims 1-4, further comprising:
acquiring a data security management requirement aiming at the block chain system, wherein the data security management requirement carries a corresponding target dimension, and the target dimension at least comprises a specified data source and a specified data type;
and determining target block chain data which accord with the target dimensionality according to the identification label corresponding to the block chain data to be identified.
6. A device for identifying data security policy-oriented blockchain data, the device comprising a determining unit and an identifying unit:
the determining unit is configured to determine, based on a data security policy, an identification dimension of blockchain data, where the identification dimension includes a data source and a data type, the data source is used to identify a blockchain role for generating blockchain data, and the data type is used to identify a service type to which the blockchain data relates;
the identification unit is used for identifying the to-be-identified block chain data corresponding to the block chain system based on the identification dimension;
the determining unit is further configured to determine, according to the identification result, an identification tag corresponding to the identification dimension for the to-be-identified blockchain data.
7. The apparatus of claim 6, wherein the blockchain role comprises a blockchain user and a blockchain provider, and wherein the data source is further configured to identify derived data derived from using a blockchain by the blockchain user.
8. The apparatus of claim 6, wherein the identification dimension further comprises a data category, the data category identifying a category of the transaction involved.
9. A data security policy oriented blockchain data identification device, the device comprising a processor and a memory:
the memory is used for storing a computer program;
the processor is configured to perform the method of any of claims 1-5 in accordance with the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium is used to store a computer program for performing the method of any of claims 1-5.
CN202010326333.9A 2020-04-23 2020-04-23 Block chain data identification method and related device oriented to data security policy Pending CN111539005A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010326333.9A CN111539005A (en) 2020-04-23 2020-04-23 Block chain data identification method and related device oriented to data security policy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010326333.9A CN111539005A (en) 2020-04-23 2020-04-23 Block chain data identification method and related device oriented to data security policy

Publications (1)

Publication Number Publication Date
CN111539005A true CN111539005A (en) 2020-08-14

Family

ID=71975310

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010326333.9A Pending CN111539005A (en) 2020-04-23 2020-04-23 Block chain data identification method and related device oriented to data security policy

Country Status (1)

Country Link
CN (1) CN111539005A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112307133A (en) * 2020-10-29 2021-02-02 平安普惠企业管理有限公司 Security protection method and device, computer equipment and storage medium
CN112765137A (en) * 2021-04-07 2021-05-07 暗链科技(深圳)有限公司 Block synchronization method based on block distributed block chain and electronic equipment
CN112765683A (en) * 2021-04-07 2021-05-07 暗链科技(深圳)有限公司 Block data structure of block chain, storage medium and electronic equipment
CN112765681A (en) * 2021-04-07 2021-05-07 暗链科技(深圳)有限公司 Block distributed block chain generation method, storage medium and electronic device
CN113256289A (en) * 2021-05-17 2021-08-13 网易(杭州)网络有限公司 Block chain judging method and device and electronic equipment
CN115118528A (en) * 2022-08-26 2022-09-27 人民法院信息技术服务中心 Block chain security evaluation method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018076760A1 (en) * 2016-10-27 2018-05-03 上海亿账通区块链科技有限公司 Block chain-based transaction processing method, system, electronic device, and storage medium
CN109597843A (en) * 2018-12-19 2019-04-09 北京锐安科技有限公司 Data managing method, device, storage medium and the electronic equipment of big data environment
CN109903046A (en) * 2019-02-02 2019-06-18 中国互联网络信息中心 User data management and device based on block chain
CN110266752A (en) * 2019-05-07 2019-09-20 深圳壹账通智能科技有限公司 Block chain information method for pushing, device, computer equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018076760A1 (en) * 2016-10-27 2018-05-03 上海亿账通区块链科技有限公司 Block chain-based transaction processing method, system, electronic device, and storage medium
CN109597843A (en) * 2018-12-19 2019-04-09 北京锐安科技有限公司 Data managing method, device, storage medium and the electronic equipment of big data environment
CN109903046A (en) * 2019-02-02 2019-06-18 中国互联网络信息中心 User data management and device based on block chain
CN110266752A (en) * 2019-05-07 2019-09-20 深圳壹账通智能科技有限公司 Block chain information method for pushing, device, computer equipment and storage medium

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112307133A (en) * 2020-10-29 2021-02-02 平安普惠企业管理有限公司 Security protection method and device, computer equipment and storage medium
CN112765137A (en) * 2021-04-07 2021-05-07 暗链科技(深圳)有限公司 Block synchronization method based on block distributed block chain and electronic equipment
CN112765683A (en) * 2021-04-07 2021-05-07 暗链科技(深圳)有限公司 Block data structure of block chain, storage medium and electronic equipment
CN112765681A (en) * 2021-04-07 2021-05-07 暗链科技(深圳)有限公司 Block distributed block chain generation method, storage medium and electronic device
WO2022213706A1 (en) * 2021-04-07 2022-10-13 暗链科技(深圳)有限公司 Block data structures of blockchain, and storage medium and electronic device
CN113256289A (en) * 2021-05-17 2021-08-13 网易(杭州)网络有限公司 Block chain judging method and device and electronic equipment
CN115118528A (en) * 2022-08-26 2022-09-27 人民法院信息技术服务中心 Block chain security evaluation method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111539005A (en) Block chain data identification method and related device oriented to data security policy
US11695828B2 (en) System and method for peer group detection, visualization and analysis in identity management artificial intelligence systems using cluster based analysis of network identity graphs
US11962597B2 (en) System and method for outlier and anomaly detection in identity management artificial intelligence systems using cluster based analysis of network identity graphs
US11818136B2 (en) System and method for intelligent agents for decision support in network identity graph based identity management artificial intelligence systems
US11888602B2 (en) System and method for predictive platforms in identity management artificial intelligence systems using analysis of network identity graphs
Golightly et al. Adoption of cloud computing as innovation in the organization
US20200280564A1 (en) System and method for role mining in identity management artificial intelligence systems using cluster based analysis of network identity graphs
RU2586866C2 (en) Differentiation of set of features of participant of leased medium and user
US8051298B1 (en) Integrated fingerprinting in configuration audit and management
CN109522751B (en) Access right control method and device, electronic equipment and computer readable medium
CN103166911A (en) Version management server authority management method and version management server authority management equipment
CN113111369B (en) Data protection method and system in data annotation
US20230273959A1 (en) Computer-implemented methods, systems comprising computer-readable media, and electronic devices for narrative representation of a network computing environment
US20230281249A1 (en) Computer-implemented methods, systems comprising computer-readable media, and electronic devices for enabled intervention into a network computing environment
CN111078980A (en) Management method, device, equipment and storage medium based on credit investigation big data
CN111699484A (en) System and method for data management
Opara-Martins Taxonomy of cloud lock-in challenges
US9135324B1 (en) System and method for analysis of process data and discovery of situational and complex applications
US20080244518A1 (en) Telecom Business-Oriented Taxonomy for Reusable Services
CN106156904B (en) Cross-platform virtual asset tracing method based on eID
Elliot Adoption and implementation of IT: An evaluation of the applicability of Western strategic models to Chinese firms
Koo et al. Decision making for the adoption of cloud computing for sensor data: From the viewpoint of industrial security
Taneja et al. Reputation based novel trust management framework with enhanced availability for cloud
US20090327350A1 (en) Interactive review system and method
Laili et al. An Analysis of the Use of Accounting System on Cloud: A Case Study in Malaysia

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination