CN112039892B - Data sharing method and related device - Google Patents

Data sharing method and related device Download PDF

Info

Publication number
CN112039892B
CN112039892B CN202010898770.8A CN202010898770A CN112039892B CN 112039892 B CN112039892 B CN 112039892B CN 202010898770 A CN202010898770 A CN 202010898770A CN 112039892 B CN112039892 B CN 112039892B
Authority
CN
China
Prior art keywords
node
data
shared
shared data
industrial internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010898770.8A
Other languages
Chinese (zh)
Other versions
CN112039892A (en
Inventor
李雨蓉
池程
朱斯语
张钰雯
刘阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Information and Communications Technology CAICT
Original Assignee
China Academy of Information and Communications Technology CAICT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Information and Communications Technology CAICT filed Critical China Academy of Information and Communications Technology CAICT
Priority to CN202010898770.8A priority Critical patent/CN112039892B/en
Publication of CN112039892A publication Critical patent/CN112039892A/en
Application granted granted Critical
Publication of CN112039892B publication Critical patent/CN112039892B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the application provides a data sharing method and a related device, after a first node acquires a data sharing requirement sent by a second node, a consensus of shared information is initiated to the nodes in a block chain, the nodes in the block chain comprise the second node, the data sharing requirement comprises an industrial internet identifier of shared data, the shared information comprises an associated industrial internet identifier of the first node, an industrial internet identifier of the second node and an identifier of the shared data, and after the consensus feedback of the block chain on the shared information is acquired, a ciphertext of the shared data is sent to the second node. And after receiving the ciphertext of the shared data sent by the first node, the second node decrypts the ciphertext by using the key to obtain the shared data. The first node shares the data after the shared information is identified, so that the record of data sharing can be traced, and the security of data sharing is improved. And the data sent by the first node to the second node is a ciphertext obtained by encrypting the shared data, so that the security is further improved.

Description

Data sharing method and related device
Technical Field
The present application relates to the field of data processing, and more particularly, to a data sharing method and related apparatus.
Background
In the industrial internet system, when the enterprise provides data to the purchase enterprise, in order to ensure the privacy of the data, the data is only opened to the purchase enterprise, and to the privacy of other enterprises, and the behavior of the purchase enterprise is not traceable, so that it is difficult to ensure that the purchase enterprise can not provide or sell the data to other enterprises at will, and data leakage and data abuse phenomena are caused. Therefore, in an industrial internet system, data circulation among enterprises has the problems of low safety and poor privacy.
Disclosure of Invention
In view of this, the present application provides a data sharing method, apparatus, device and readable storage medium, for improving security and privacy of shared data, as follows:
a data sharing method is applied to a first node in an industrial Internet identification analysis system and comprises the following steps:
acquiring a data sharing requirement sent by a second node, wherein the data sharing requirement comprises an industrial internet identifier of shared data;
initiating consensus of shared information to nodes in a blockchain, the nodes in the blockchain including the second node, the shared information comprising: the associated industrial internet identity of the first node, the industrial internet identity of the second node, and the identity of the shared data; the identification of the shared data is determined according to the industrial Internet identification of the shared data;
and after obtaining the consensus feedback of the block chain on the shared information, sending the ciphertext of the shared data to the second node.
Optionally, the identification of shared data comprises:
a hash value of the industrial internet identity of the shared data.
Optionally, before the sending the ciphertext of the shared data to the second node, the method further includes:
acquiring a random number and a public key of the second node;
encrypting the locally stored shared data by using the random number to obtain intermediate data;
and encrypting the intermediate data signature by using the public key to obtain a ciphertext of the shared data.
Optionally, the sharing information further includes:
the random number; and the random number is stored in the block chain, and the hash value is used as a storage space of an address.
Optionally, before the acquiring the data sharing requirement sent by the second node, the method further includes:
registering to the blockchain to become a node in the blockchain;
the initiating the consensus of the shared information to the nodes in the blockchain comprises:
and triggering nodes in the block chain to commonly identify the shared information.
Optionally, the first node is not on the blockchain;
the initiating the consensus of the shared information to the nodes in the blockchain comprises:
selecting a corresponding node of the first node from the nodes on the block chain according to the physical addresses or the IP addresses of the first node and the nodes on the block chain;
sending the shared information to the corresponding node to trigger the block chain to identify the shared information;
the associated industrial internet identity of the first node comprises: and the industrial Internet identification of the corresponding node.
A data sharing method is applied to an industrial Internet identification analysis system, obtains a second node sharing data from a first node, and comprises the following steps:
sending a data sharing requirement to the first node, wherein the data sharing requirement comprises an industrial internet identifier of shared data;
receiving a ciphertext of the shared data sent by the first node; the ciphertext is sent out after the first node initiates consensus of shared information to nodes in a block chain and acquires consensus feedback of the block chain to the shared information, wherein the nodes in the block chain comprise the second node; the shared information includes: the associated industrial internet identity of the first node, the industrial internet identity of the second node, and the identity of the shared data; the identification of the shared data is determined according to the industrial Internet identification of the shared data;
acquiring a first secret key from the block chain by using the identifier of the shared data as a storage space of an address;
decrypting ciphertext of the shared data using a key, the key comprising the first key.
Optionally, the identification of shared data comprises:
a hash value of the industrial internet identity of the shared data.
Optionally, the first key comprises:
a random number;
the shared information further comprises: the random number;
the random number is stored in a storage space on the block chain with the hash value as an address.
Optionally, decrypting the ciphertext of the shared data using the key includes:
decrypting the ciphertext of the shared data by using the private key of the second node to obtain intermediate data;
and decrypting the intermediate data by using the first secret key to obtain the shared data.
Optionally, before the sending the data sharing requirement to the first node, the method further includes:
registering with the blockchain as a node in the blockchain.
A data sharing device is applied to a first node in an industrial Internet identity parsing system and comprises the following components:
the demand acquisition module is used for acquiring data sharing demands sent by a second node, and the data sharing demands comprise industrial internet identifications of shared data;
a consensus initiating module, configured to initiate consensus of shared information to nodes in a blockchain, where the nodes in the blockchain include the second node, and the shared information includes: the associated industrial internet identity of the first node, the industrial internet identity of the second node, and the identity of the shared data; the identification of the shared data is determined according to the industrial Internet identification of the shared data;
and the ciphertext sending module is used for sending the ciphertext of the shared data to the second node after acquiring the consensus feedback of the block chain on the shared information.
A data sharing device is applied to an industrial Internet identification analysis system, a second node for acquiring shared data from a first node, and comprises:
the demand sending module is used for sending a data sharing demand to the first node, wherein the data sharing demand comprises an industrial internet mark of shared data;
the ciphertext receiving module is used for receiving a ciphertext of the shared data sent by the first node; the ciphertext is sent out after the first node initiates consensus of shared information to nodes in a block chain and acquires consensus feedback of the block chain to the shared information, wherein the nodes in the block chain comprise the second node; the shared information includes: the associated industrial internet identity of the first node, the industrial internet identity of the second node, and the identity of the shared data; the identification of the shared data is determined according to the industrial Internet identification of the shared data;
a key obtaining module, configured to obtain a first key from a storage space in which an identifier of the shared data is an address in the block chain;
a decryption module to decrypt a ciphertext of the shared data using a key, the key comprising the first key.
A data sharing device comprising a processor and a memory;
the memory is used for storing programs, and the processor is used for operating the programs to realize the data sharing method.
A computer-readable storage medium, on which a computer program is stored, which, when run on a computer, implements the above-mentioned data sharing method.
As can be seen from the foregoing technical solutions, in the data sharing method and the related apparatus provided in the embodiments of the present application, after obtaining a data sharing requirement sent by a second node, a first node initiates a consensus of shared information to nodes in a blockchain, where the nodes in the blockchain include the second node, the data sharing requirement includes an industrial internet identifier of shared data, and the shared information includes: and after acquiring the consensus feedback of the block chain on the shared information, sending a ciphertext of the shared data to the second node. And after receiving the ciphertext of the shared data sent by the first node, the second node decrypts the ciphertext by using the key to obtain the shared data. Therefore, according to the consensus mechanism of the block chain, the shared information after consensus is stored in the block chain, and the first node shares data after the shared information is subjected to consensus, so that the record of data sharing can be traced, and the record cannot be tampered based on the characteristics of the block chain, so that the safety of data sharing is improved. Further, the data sent by the first node to the second node is a ciphertext obtained by encrypting the shared data, so that the security is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only the embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an industrial internet identity resolution system according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a specific implementation of a data sharing method according to an embodiment of the present application;
fig. 3 is a flowchart illustrating another specific implementation of a data sharing method according to an embodiment of the present application;
fig. 4 is a schematic diagram of encrypted file transmission according to an embodiment of the present application;
fig. 5 is a schematic flowchart of a data sharing method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a data sharing device applied to a first node according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of a data sharing device applied to a second node according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a data sharing device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
Fig. 1 illustrates an architecture diagram of an industrial internet identity parsing system, as shown in fig. 1, an enterprise a and an enterprise B are enterprise nodes that register an industrial internet identity in the industrial internet identity parsing system in advance, and the enterprise a registers owned data in the industrial internet identity parsing system in advance to obtain an industrial internet identity of the data. For ease of description, a node bound by enterprise A will be referred to as a first node and a node bound by enterprise B will be referred to as a second node. It should be noted that, a process of registering an industrial internet identity in the industrial internet identity resolution system by any node (for example, a first node or a second node) to become a secondary node of the industrial internet identity resolution system is a prior art, and a process of registering owned data in the industrial internet identity resolution system by any node (for example, a first node) to obtain an industrial internet identity of the data is a prior art.
Taking the architecture of the industrial internet identity resolution system shown in fig. 1 as an example, the data sharing method provided in the embodiment of the present application is applied but not limited to: the first node is used as an owner of the shared data, the second node is used as a demand side of the shared data, and the data sharing process between the first node and the second node is realized.
It should be noted that, in the application scenario of the embodiment of the present application, the industrial internet identity parsing system is an industrial internet identity parsing system based on a block chain, that is, the industrial internet identity parsing system includes the block chain.
The following describes in detail a specific flow of a data sharing process between a first node and a second node, based on whether the first node is a node in a block chain.
Fig. 2 illustrates a data sharing flow between a first node and a second node when the first node is not a node in a blockchain. Specifically, S201 to S212 may be included.
S201, the second node sends a data sharing requirement to the first node.
In this embodiment, the data sharing requirement is information of data required by the second node, where the data sharing requirement at least includes an industrial internet identifier of the shared data, and may further include a name of the shared data. The shared data is data locally stored by the first node, the industrial internet identification of the shared data is obtained by the first node by registering in the industrial internet identification analysis system in advance, and the industrial internet identification of the shared data uniquely indicates the shared data.
It should be noted that the interaction of the data sharing requirement does not pass through the blockchain.
S202, the first node acquires the data sharing requirement sent by the second node.
In this embodiment, after receiving the data sharing requirement sent by the second node, the first node determines whether the first node has the data required by the second node according to the identifier or the name of the industrial internet of the shared data in the data sharing requirement, and when the shared data indicated by the data sharing requirement is locally stored, sends a determination message to the second node to complete the acquisition of the data sharing requirement.
S203, the first node acquires the random number and the public key of the second node.
In this embodiment, the first node generates a 256-bit random number by using the random number generator, and acquires the public key of the second node from the blockchain, where it should be noted that, when the second node is registered as a node on the blockchain, the public key of the second node is generated in advance and sent to each node on the blockchain, and is stored by each node on the blockchain.
S204, the first node encrypts the locally stored shared data by using the random number to obtain intermediate data.
S205, the first node encrypts the intermediate data signature by using the public key of the second node to obtain the ciphertext of the shared data.
S205 to S206 are processes of encrypting the shared data by the first node, and the obtained ciphertext of the shared data is an encrypted and transmittable data packet. The encryption process can be seen in the prior art.
S206, the first node selects a corresponding node of the first node from the nodes on the block chain according to the physical addresses or the IP addresses of the first node and the nodes on the block chain.
In this embodiment, the first node is not a node registered on the blockchain, and a node corresponding to the first node in the blockchain may be a node closest to a physical address of the first node on the blockchain or a node closest to an IP address of the first node on the blockchain.
And S207, the first node sends the shared information to the corresponding node so as to trigger the block chain to carry out consensus on the shared information.
In this embodiment, the shared information sent by the first node includes: the method comprises the steps of associating industrial internet identification of a first node, industrial internet identification of a second node, identification of shared data and a random number. The related industrial internet identification of the first node is the industrial internet identification of the corresponding node of the first node, the industrial internet identification of the second node is the industrial internet identification of the second node, the industrial internet identification of any node is obtained by registering the node in an industrial internet identification analysis system, and the industrial internet identification of any node uniquely indicates the node.
In this embodiment, the identifier of the shared data is a hash value of the industrial internet identifier of the shared data, and the identifier of the shared data is generated by the first node according to the industrial internet identifier of the shared data. It should be noted that, when the first node is not on the blockchain, the node on the blockchain cannot know the owner of the data by using the corresponding node of the first node instead of the industrial internet identifier of the first node, thereby further protecting privacy.
It should be noted that the shared information further includes other information such as the sending time of the shared information and the usage time of the shared data, and specific other information types may be preset in the first node.
In this embodiment, after the first node sends the shared information to the corresponding node, each node in the block chain performs consensus on the shared information according to a consensus mechanism of the block chain, stores a random number in the block chain, and uses the hash value as a storage space of the address.
And S208, after the consensus feedback of the block chain on the shared information is obtained, the first node sends a ciphertext of the shared data to the second node.
In this embodiment, the consensus feedback is used to indicate that the shared information completes consensus in the block chain, that is, after confirming that the block chain completes consensus on the shared information, the first node sends a pre-generated ciphertext of the shared data to the second node.
S209, the second node receives the ciphertext of the shared data sent by the first node.
S210, the second node acquires the first key from the block chain by using the identifier of the shared data as the storage space of the address.
In this embodiment, the first key includes: a random number. And the random number is stored in the storage space with the identifier of the shared data as an address through the consensus of the blockchain on the shared information, and the identifier of the shared data is the hash value of the industrial internet identifier of the shared data, so that the random number acquired by the second node from the storage space with the hash value as the address on the blockchain is used as the first key.
S211, the second node decrypts the ciphertext of the shared data by using the private key of the second node to obtain intermediate data.
S212, the second node decrypts the intermediate data by using the first key to obtain the shared data.
S211 to S212 are processes of decrypting the ciphertext of the shared data by the second node to obtain the shared data. The specific decryption method is referred to the prior art.
As can be seen from the foregoing S201 to S212, the shared data obtained by decryption by the second node is data uniquely indicated by the industrial internet identifier of the shared data in the data sharing requirement sent by the second node. Thus, the data sharing process between the second node and the first node is completed in a scenario where the first node (owner of the shared data) is not a node on the blockchain.
Fig. 3 illustrates a data sharing flow between a first node and a second node in a scenario where the first node registers with a blockchain in advance to become a node in the blockchain. Specifically, S301 to S311 may be included.
S301, the second node sends a data sharing requirement to the first node.
In this embodiment, the data sharing requirement at least includes an industrial internet identifier of shared data, the industrial internet identifier of the shared data is obtained by registering the first node in the industrial internet identifier parsing system in advance, and the industrial internet identifier of the shared data uniquely indicates the shared data, which is specifically referred to S201, and this embodiment is not described herein again.
S302, the first node acquires the data sharing requirement sent by the second node.
Specifically, refer to S202, which is not described herein again.
S303, the first node obtains the random number and the public key of the second node.
For details, reference may be made to S203, which is not described herein again.
S304, the first node encrypts the locally stored shared data by using the random number to obtain intermediate data.
S305, the first node encrypts the intermediate data signature by using the public key of the second node to obtain the ciphertext of the shared data.
S305 to S306 are processes for encrypting the shared data by the first node, and the obtained ciphertext of the shared data is an encrypted and transmittable data packet. The encryption process can be seen in particular in the prior art.
And S306, the nodes in the first node trigger block chain agree on the shared information.
In this embodiment, the sharing information includes: the method comprises the steps of associating industrial internet identification of a first node, industrial internet identification of a second node, identification of shared data and a random number. The associated industrial Internet identification of the first node is the industrial Internet identification of the first node, the industrial Internet identification of any node is obtained by registering the node in an industrial Internet identification analysis system, and the industrial Internet identification of any node uniquely indicates the node. The shared data identifier is a hash value of the industrial internet identifier of the shared data, and the shared data identifier is generated by the first node according to the industrial internet identifier of the shared data.
The first node is a node in the block chain, triggers each node in the block chain to perform consensus on the shared information according to a consensus mechanism of the block chain, stores the random number in the block chain, and uses the hash value as a storage space of the address.
It should be noted that the shared information further includes other information such as the sending time of the shared information and the usage time of the shared data, and specific other information types may be preset in the first node.
And S307, after acquiring the consensus feedback of the block chain on the shared information, the first node sends the ciphertext of the shared data to the second node.
In this embodiment, the consensus feedback is used to indicate that the shared information completes consensus in the block chain, that is, after confirming that the block chain completes consensus on the shared information, the first node sends a pre-generated ciphertext of the shared data to the second node.
S308, the second node receives the ciphertext of the shared data sent by the first node.
S309, the second node acquires the first key from the block chain by using the identifier of the shared data as the storage space of the address.
Specifically, refer to S210, which is not described herein again.
S310, the second node decrypts the ciphertext of the shared data by using the private key of the second node to obtain intermediate data.
S311, the second node decrypts the intermediate data by using the first key to obtain the shared data.
S310 to S311 are processes of decrypting the ciphertext of the shared data by the second node to obtain the shared data. The specific decryption method is referred to the prior art.
As can be seen from the foregoing S301 to S311, the shared data obtained by decrypting by the second node is data uniquely indicated by the industrial internet identifier of the shared data in the data sharing requirement sent by the second node. Thus, the data sharing process between the second node and the first node is completed in a scenario where the first node (owner of the shared data) is a node on the blockchain.
As can be seen from the flows shown in fig. 3 and fig. 4, the data sharing method provided in the embodiment of the present application has at least the following beneficial effects:
1. the first node serves as an owner of shared data, and initiates consensus of shared information to nodes in a block chain, wherein the shared information at least comprises an associated industrial Internet identification of the first node (owner of the shared data), an associated industrial Internet identification of the second node (demander of the shared data), and an identification of the shared data. According to the consensus mechanism of the block chain, the consensus information is stored in the block chain. Therefore, the first node shares the data after the shared information is identified, the record of data sharing can be traced, and the record cannot be tampered based on the characteristics of the block chain, so that the safety of data sharing is improved.
2. And the data sent by the first node to the second node is a ciphertext obtained by encrypting the shared data, so that the security is further improved.
3. The shared data in the shared information is a hash value generated by the industrial internet identification of the shared data, and because the node in the block chain only stores the hash value, other nodes on the block chain do not know the specific information of the shared data, thereby ensuring the privacy of the shared data.
4. The random number is a first secret key of the ciphertext of the shared data, and in the consensus process of the shared information, the hash value is used as the storage basis of the random number: if a plurality of nodes store random numbers, the random numbers are stored in a storage space with the hash value as an address on any node, and the security of shared data is further improved.
5. When the first node is not a node in the blockchain, the associated industrial Internet identification of the first node in the shared information is the industrial Internet identification of the node corresponding to the first node, and after consensus, the industrial Internet identification of the corresponding node is stored in other nodes in the blockchain instead of the industrial Internet identification of the first node, so that the privacy of the owner of the data is ensured.
In summary, the data sharing method provided by the embodiment of the application improves the security and privacy of the data sharing process, promotes the sharing and circulation of data among enterprises, and solves the problem of 'information isolated island' of enterprise data in the prior art.
Fig. 4 illustrates a schematic diagram of a process of file encryption transmission, in fig. 4, an enterprise a is a first node, an enterprise B is a second node, and a data model source file is shared data, fig. 4 illustrates an enterprise B as an owner of the data model source file, an enterprise a as a demander of the data model source file, and a data transmission process between the enterprise a and the enterprise B.
Specifically, after data sharing between enterprise a and enterprise B is chain approved, enterprise a needs to transmit the data model source file to enterprise B. During transmission, in order to ensure the privacy of data, encrypted and signed data packets (transmittable data packets shown in fig. 4) are transmitted.
As shown in fig. 4, the file encryption process in this embodiment includes 1 and 2, as follows:
1. the enterprise a encrypts the data model source file by using a key seed to obtain intermediate data, wherein the key seed can generate a random number with 256 bits for the enterprise a by using a random number generator, and the random number is stored in a block chain, and the hash value is used as a storage space of an address.
2. Enterprise a encrypts the intermediate data signature using enterprise B's public key to generate a transmittable data packet.
After obtaining consensus feedback of the block chain, the enterprise A sends a transmittable data packet to the enterprise B, and the processes of receiving the data packet and decrypting the data packet by the enterprise B comprise 3 and 4, and are as follows:
3. and the enterprise B decrypts the data packet by using the private key of the enterprise B to obtain the intermediate data.
4. And the enterprise B acquires the key seeds from the block chain, and decrypts the intermediate data by using the key seeds to obtain the data model source file.
As can be seen from the data transmission process shown in fig. 4, in the data sharing method provided in the embodiment of the present application, a double encryption method combining symmetric encryption and asymmetric encryption is used, a random number is stored in a block chain, and a hash value is used as a storage space of an address, so that the security of data transmission is improved.
It should be noted that, in the data sharing method provided in the embodiment of the present application, the first node may be a node bound by any type of data owner (including but not limited to an enterprise), and the second node may be a node bound by any type of data demander (including but not limited to an enterprise). The first node and the second node are nodes which are registered in the industrial Internet identity analysis system in advance to obtain the industrial Internet identity. And the shared data interacted between the second node and the first node is data which is registered in the industrial Internet identification analysis system in advance to obtain the industrial Internet identification.
In this embodiment, the schematic flow diagrams of the data sharing method shown in fig. 2 and fig. 3 are summarized and summarized as shown in fig. 5, which specifically includes S501 to S507.
S501, the second node sends a data sharing requirement to the first node.
In this embodiment, the data sharing requirement is information of data required by the second node, where the data sharing requirement at least includes an industrial internet identifier of shared data, the shared data is data locally stored by the first node, the industrial internet identifier of the shared data is obtained by the first node by registering in the industrial internet identifier parsing system in advance, and the industrial internet identifier of the shared data uniquely indicates the shared data.
S502, the first node acquires the data sharing requirement sent by the second node.
S503, the first node initiates consensus of the shared information to the nodes in the blockchain.
In this embodiment, the information sharing includes: an associated industrial internet identity of the first node, an industrial internet identity of the second node, and an identity of the shared data. The associated industrial internet identifier of the first node is determined by whether the first node is in a blockchain or not, specifically, the first node is in the blockchain, the associated industrial internet identifier of the first node is the industrial internet identifier of the first node, the first node is not in the blockchain, and the associated industrial internet identifier of the first node is the industrial internet identifier of a corresponding node of the first node. The industrial Internet identification of any node is obtained by registering the node in an industrial Internet identification analysis system, and the node is uniquely indicated.
It should be noted that the identifier of the shared data is determined according to the identifier of the industrial internet of the shared data, such as the aforementioned hash value. The identity of the shared data uniquely indicates the shared data.
It should be further noted that the second node is registered in the blockchain in advance, that is, the second node is a node on the blockchain, and the first node may be a node on the blockchain or not. If the first node is not on the blockchain, the method for the first node to initiate the consensus of the shared information to the nodes in the blockchain may be referred to as S206 to S207. Alternatively, if the second node is pre-registered as a node on the blockchain, the method for the first node to initiate the consensus of sharing information to the nodes in the blockchain may be as shown in S306.
S504, after obtaining the consensus feedback of the block chain to the shared information, the first node sends the ciphertext of the shared data to the second node.
In this embodiment, the consensus feedback is used to indicate that the shared information completes consensus in the block chain, that is, the first node sends a pre-generated ciphertext of the shared data to the second node after confirming that the block chain completes consensus on the shared information.
It should be noted that, the first node encrypts the shared data to obtain the ciphertext, and the encryption method includes multiple methods, and an optional encryption method may be referred to above as S203 to S205.
And S505, the second node receives the ciphertext of the shared data sent by the first node.
S506, the second node acquires the first key from the block chain by using the identifier of the shared data as the storage space of the address.
And S507, the second node decrypts the ciphertext of the shared data by using the key, wherein the key comprises the first key.
In this embodiment, in the process of consensus of shared information, the blockchain stores the first key in the storage space using the identifier of the shared data as an address, and after receiving the ciphertext of the shared data, the second node obtains the first key from the blockchain using the identifier of the shared data as the storage space of the address, and decrypts the ciphertext of the shared data by using at least the first key to obtain the shared data.
According to the data sharing method provided by the embodiment of the application, after acquiring the data sharing requirement sent by the second node, the first node initiates consensus of shared information to the nodes in the blockchain, wherein the nodes in the blockchain include the second node, the data sharing requirement includes an industrial internet identifier of shared data, and the shared information includes: and after acquiring the consensus feedback of the block chain on the shared information, sending a ciphertext of the shared data to the second node. And after receiving the ciphertext of the shared data sent by the first node, the second node decrypts the ciphertext by using the key to obtain the shared data. Therefore, according to the consensus mechanism of the block chain, the shared information after consensus is stored in the block chain, and the first node shares data after the shared information is subjected to consensus, so that the record of data sharing can be traced, and the record cannot be tampered based on the characteristics of the block chain, so that the safety of data sharing is improved. Further, the data sent by the first node to the second node is a ciphertext obtained by encrypting the shared data, so that the safety is further improved.
An embodiment of the present application further provides a data sharing apparatus, which is applied to a first node, and fig. 6 illustrates a schematic structural diagram of a data sharing apparatus (60) applied to the first node, where as shown in fig. 6, the data sharing apparatus includes:
a requirement obtaining module 601, configured to obtain a data sharing requirement sent by a second node, where the data sharing requirement includes an industrial internet identifier of shared data;
a consensus initiating module 602, configured to initiate consensus of shared information to nodes in a blockchain, where the nodes in the blockchain include a second node, and the shared information includes: the method comprises the steps that a correlation industrial internet identification of a first node, an industrial internet identification of a second node and an identification of shared data are obtained; the identification of the shared data is determined according to the industrial internet identification of the shared data;
the ciphertext sending module 603 is configured to send a ciphertext of the shared data to the second node after obtaining the consensus feedback of the block chain on the shared information.
Optionally, the identification of shared data comprises: a hash value of the industrial internet identification of the shared data.
Optionally, the apparatus further comprises:
an encryption module to: before sending the ciphertext of the shared data to the second node, acquiring a random number and a public key of the second node; encrypting the locally stored shared data by using a random number to obtain intermediate data; and encrypting the intermediate data signature by using the public key to obtain a ciphertext of the shared data.
Optionally, the sharing information further includes:
a random number; the random number is stored in a block chain, and the hash value is used as the address in the storage space.
Optionally, the apparatus further comprises: the node registration module is used for registering the node in the block chain before acquiring the data sharing requirement sent by the second node;
optionally, the consensus initiating module is configured to initiate consensus of shared information to nodes in the blockchain, and includes: the consensus initiating module is specifically configured to: and nodes in the trigger block chain commonly identify the shared information.
Optionally, the first node is not on the blockchain, and the consensus initiating module is configured to initiate consensus of shared information to nodes in the blockchain, where the consensus includes: the consensus initiating module is specifically further configured to:
selecting a corresponding node of the first node from the nodes on the block chain according to the physical addresses or the IP addresses of the first node and the nodes on the block chain;
sending shared information to a corresponding node to trigger a block chain to carry out consensus on the shared information;
the associated industrial internet identification of the first node comprises: and identifying the industrial internet of the corresponding node.
An embodiment of the present application further provides a data sharing apparatus, which is applied to a second node, where fig. 7 illustrates a schematic structural diagram of the data sharing apparatus applied to the second node, where the second node is a node that acquires shared data from a first node in an industrial internet identity resolution system, and as shown in fig. 7, the data sharing apparatus includes:
a requirement sending module 701, configured to send a data sharing requirement to a first node, where the data sharing requirement includes an industrial internet identifier of shared data;
a ciphertext receiving module 702, configured to receive a ciphertext of shared data sent by a first node; the ciphertext initiates consensus of the shared information to nodes in the block chain at the first node, and the consensus feedback of the block chain on the shared information is acquired and then sent out, wherein the nodes in the block chain comprise a second node; the shared information includes: the method comprises the steps that a correlation industrial internet identification of a first node, an industrial internet identification of a second node and an identification of shared data are obtained; the identification of the shared data is determined according to the industrial internet identification of the shared data;
a key obtaining module 703, configured to obtain a first key from a storage space in which an identifier of shared data is an address in a blockchain;
a decryption module 704 configured to decrypt a ciphertext of the shared data using a key, the key comprising the first key.
Optionally, the identification of shared data comprises: a hash value of the industrial internet identification of the shared data.
Optionally, the first key comprises: a random number;
optionally, the shared information further includes: a random number; the random number is stored in a memory space on the block chain with the hash value as an address.
Optionally, the decryption module is configured to decrypt a ciphertext of the shared data using the key, and includes: the decryption module is specifically configured to:
decrypting the ciphertext of the shared data by using the private key of the second node to obtain intermediate data;
and decrypting the intermediate data by using the first key to obtain the shared data.
Optionally, the apparatus further comprises:
and the node registration unit is used for registering the node in the block chain before sending the data sharing requirement to the first node.
An embodiment of the present application further provides a data sharing device, please refer to fig. 8, which shows a schematic structural diagram of the data sharing device, where the device may include: at least one processor 801, at least one communication interface 802, at least one memory 803, and at least one communication bus 804;
in the embodiment of the present application, the number of the processor 801, the communication interface 802, the memory 803, and the communication bus 804 is at least one, and the processor 801, the communication interface 802, and the memory 803 complete communication with each other through the communication bus 804;
the processor 801 may be a central processing unit CPU, or an Application Specific Integrated Circuit ASIC (Application Specific Integrated Circuit), or one or more Integrated circuits configured to implement embodiments of the present invention, etc.;
the memory 803 may include a high-speed RAM memory, and may further include a non-volatile memory (non-volatile memory) or the like, such as at least one disk memory;
the memory stores programs, and the processor can execute the programs stored in the memory to realize the data sharing method provided by the embodiment of the application, and the method comprises the following steps:
a data sharing method is applied to a first node in an industrial Internet identification analysis system and comprises the following steps:
acquiring a data sharing requirement sent by a second node, wherein the data sharing requirement comprises an industrial internet identifier of shared data;
initiating consensus of shared information to nodes in a blockchain, the nodes in the blockchain including the second node, the shared information comprising: the associated industrial internet identity of the first node, the industrial internet identity of the second node, and the identity of the shared data; the identification of the shared data is determined according to the industrial Internet identification of the shared data;
and after obtaining the consensus feedback of the block chain on the shared information, sending the ciphertext of the shared data to the second node.
Optionally, the identification of shared data comprises:
a hash value of the industrial internet identity of the shared data.
Optionally, before the sending the ciphertext of the shared data to the second node, the method further includes:
acquiring a random number and a public key of the second node;
encrypting the locally stored shared data by using the random number to obtain intermediate data;
and encrypting the intermediate data signature by using the public key to obtain a ciphertext of the shared data.
Optionally, the sharing information further includes:
the random number; and the random number is stored in the block chain, and the hash value is used as a storage space of an address.
Optionally, before the acquiring the data sharing requirement sent by the second node, the method further includes:
registering to the blockchain to become a node in the blockchain;
the initiating of the consensus of the shared information to the nodes in the blockchain comprises:
and triggering nodes in the block chain to recognize the shared information.
Optionally, the first node is not on the blockchain;
the initiating the consensus of the shared information to the nodes in the blockchain comprises:
selecting a corresponding node of the first node from the nodes on the block chain according to the physical addresses or IP addresses of the first node and the nodes on the block chain;
sending the shared information to the corresponding node to trigger the block chain to identify the shared information;
the associated industrial internet identification of the first node comprises: and the industrial Internet identification of the corresponding node.
A data sharing method is applied to an industrial Internet identification analysis system, a second node for acquiring shared data from a first node comprises the following steps:
sending a data sharing requirement to the first node, wherein the data sharing requirement comprises an industrial internet identifier of shared data;
receiving a ciphertext of the shared data sent by the first node; the ciphertext initiates consensus of shared information to nodes in a block chain at the first node, and sends out the consensus feedback of the block chain to the shared information after the consensus feedback is obtained, wherein the nodes in the block chain comprise the second node; the shared information includes: the associated industrial internet identity of the first node, the industrial internet identity of the second node, and the identity of the shared data; the identification of the shared data is determined according to the industrial Internet identification of the shared data;
acquiring a first secret key from the block chain by using the identifier of the shared data as a storage space of an address;
decrypting ciphertext of the shared data using a key, the key comprising the first key.
Optionally, the identification of shared data comprises:
a hash value of the industrial internet identity of the shared data.
Optionally, the first key comprises:
a random number;
the shared information further comprises: the random number;
the random number is stored in a storage space on the block chain with the hash value as an address.
Optionally, decrypting the ciphertext of the shared data using the key includes:
decrypting the ciphertext of the shared data by using the private key of the second node to obtain intermediate data;
and decrypting the intermediate data by using the first secret key to obtain the shared data.
Optionally, before the sending the data sharing requirement to the first node, the method further includes:
registering with the blockchain as a node in the blockchain.
An embodiment of the present application further provides a readable storage medium, where the readable storage medium may store a computer program suitable for being executed by a processor, and when the computer program is executed by the processor, the data sharing method provided in the embodiment of the present application is implemented, as follows:
a data sharing method is applied to a first node in an industrial Internet identification analysis system and comprises the following steps:
acquiring a data sharing requirement sent by a second node, wherein the data sharing requirement comprises an industrial internet identifier of shared data;
initiating consensus of shared information to nodes in a blockchain, the nodes in the blockchain including the second node, the shared information comprising: the associated industrial internet identity of the first node, the industrial internet identity of the second node, and the identity of the shared data; the identification of the shared data is determined according to the industrial Internet identification of the shared data;
and after obtaining the consensus feedback of the block chain on the shared information, sending a ciphertext of the shared data to the second node.
Optionally, the identification of shared data comprises:
a hash value of the industrial internet identity of the shared data.
Optionally, before the sending the ciphertext of the shared data to the second node, the method further includes:
acquiring a random number and a public key of the second node;
encrypting the locally stored shared data by using the random number to obtain intermediate data;
and encrypting the intermediate data signature by using the public key to obtain a ciphertext of the shared data.
Optionally, the sharing information further includes:
the random number; and the random number is stored in the block chain, and the hash value is used as the storage space of the address.
Optionally, before the acquiring the data sharing requirement sent by the second node, the method further includes:
registering to the blockchain to become a node in the blockchain;
the initiating the consensus of the shared information to the nodes in the blockchain comprises:
and triggering nodes in the block chain to commonly identify the shared information.
Optionally, the first node is not on the blockchain;
the initiating the consensus of the shared information to the nodes in the blockchain comprises:
selecting a corresponding node of the first node from the nodes on the block chain according to the physical addresses or IP addresses of the first node and the nodes on the block chain;
sending the shared information to the corresponding node to trigger the block chain to identify the shared information;
the associated industrial internet identification of the first node comprises: and the industrial Internet identification of the corresponding node.
A data sharing method is applied to an industrial Internet identification analysis system, a second node for acquiring shared data from a first node comprises the following steps:
sending a data sharing requirement to the first node, wherein the data sharing requirement comprises an industrial internet identifier of shared data;
receiving a ciphertext of the shared data sent by the first node; the ciphertext initiates consensus of shared information to nodes in a block chain at the first node, and sends out the consensus feedback of the block chain to the shared information after the consensus feedback is obtained, wherein the nodes in the block chain comprise the second node; the shared information includes: the associated industrial internet identity of the first node, the industrial internet identity of the second node, and the identity of the shared data; the identification of the shared data is determined according to the industrial Internet identification of the shared data;
acquiring a first secret key from the block chain by using the identifier of the shared data as a storage space of an address;
decrypting ciphertext of the shared data using a key, the key comprising the first key.
Optionally, the identification of shared data comprises:
a hash value of the industrial internet identity of the shared data.
Optionally, the first key comprises:
a random number;
the shared information further comprises: the random number;
the random number is stored in a storage space on the block chain with the hash value as an address.
Optionally, decrypting the ciphertext of the shared data using the key includes:
decrypting the ciphertext of the shared data by using the private key of the second node to obtain intermediate data;
and decrypting the intermediate data by using the first secret key to obtain the shared data.
Optionally, before the sending the data sharing requirement to the first node, the method further includes:
registering with the blockchain to become a node in the blockchain.
Finally, it should also be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (9)

1. A data sharing method is applied to a first node in an industrial Internet identity resolution system and comprises the following steps:
acquiring a data sharing requirement sent by a second node, wherein the data sharing requirement comprises an industrial internet identifier of shared data;
initiating consensus of shared information to nodes in a blockchain, the nodes in the blockchain including the second node, the shared information comprising: the associated industrial internet identity of the first node, the industrial internet identity of the second node, and the identity of the shared data; the identification of the shared data is determined according to the industrial Internet identification of the shared data;
after obtaining consensus feedback of the block chain on the shared information, sending a ciphertext of the shared data to the second node;
the identification of the shared data comprises:
a hash value of an industrial internet identity of the shared data;
before the sending of the ciphertext of the shared data to the second node, further comprising:
acquiring a random number and a public key of the second node;
encrypting the locally stored shared data by using the random number to obtain intermediate data;
encrypting the intermediate data signature by using the public key to obtain a ciphertext of the shared data;
the shared information further includes:
the random number; and the random number is stored in a storage space with the hash value as an address in the block chain.
2. The method of claim 1, wherein before the obtaining the data sharing requirement sent by the second node, the method further comprises:
registering to the blockchain to become a node in the blockchain;
the initiating the consensus of the shared information to the nodes in the blockchain comprises:
and triggering nodes in the block chain to commonly identify the shared information.
3. The method of claim 1, wherein the first node is not on the blockchain;
the initiating the consensus of the shared information to the nodes in the blockchain comprises:
selecting a corresponding node of the first node from the nodes on the block chain according to the physical addresses or the IP addresses of the first node and the nodes on the block chain;
sending the shared information to the corresponding node to trigger the block chain to identify the shared information;
the associated industrial internet identification of the first node comprises: and the industrial Internet identification of the corresponding node.
4. A data sharing method is applied to a second node which acquires shared data from a first node in an industrial Internet identification analysis system, and comprises the following steps:
sending a data sharing requirement to the first node, wherein the data sharing requirement comprises an industrial internet identifier of shared data;
receiving a ciphertext of the shared data sent by the first node; the ciphertext initiates consensus of shared information to nodes in a block chain at the first node, and sends out the consensus feedback of the block chain to the shared information after the consensus feedback is obtained, wherein the nodes in the block chain comprise the second node; the shared information includes: the associated industrial internet identity of the first node, the industrial internet identity of the second node, and the identity of the shared data; the identification of the shared data is determined according to the industrial Internet identification of the shared data;
acquiring a first secret key from a storage space with the identifier of the shared data as an address on the block chain;
decrypting ciphertext of the shared data using a key, the key comprising the first key;
the identification of the shared data comprises:
a hash value of an industrial internet identity of the shared data;
the first key comprises:
a random number;
the shared information further comprises: the random number;
the random number is stored in a storage space with the hash value as an address on the block chain;
the decrypting the ciphertext of the shared data using the key comprises:
decrypting the ciphertext of the shared data by using the private key of the second node to obtain intermediate data;
and decrypting the intermediate data by using the first secret key to obtain the shared data.
5. The method of claim 4, wherein prior to said sending data sharing requirements to said first node, further comprising:
registering with the blockchain as a node in the blockchain.
6. A data sharing device is applied to a first node in an industrial Internet identity resolution system, and comprises:
the demand acquisition module is used for acquiring a data sharing demand sent by a second node, wherein the data sharing demand comprises an industrial internet mark of shared data;
a consensus initiating module, configured to initiate consensus of shared information to nodes in a blockchain, where the nodes in the blockchain include the second node, and the shared information includes: the associated industrial internet identity of the first node, the industrial internet identity of the second node, and the identity of the shared data; the identification of the shared data is determined according to the industrial Internet identification of the shared data;
the ciphertext sending module is used for sending the ciphertext of the shared data to the second node after acquiring the consensus feedback of the block chain on the shared information;
the identification of the shared data comprises: a hash value of an industrial internet identity of the shared data;
an encryption module to: before sending the ciphertext of the shared data to the second node, acquiring a random number and a public key of the second node; encrypting the locally stored shared data by using a random number to obtain intermediate data; encrypting the intermediate data signature by using a public key to obtain a ciphertext of the shared data;
the shared information further includes:
the random number; and the random number is stored in a storage space with the hash value as an address in the block chain.
7. A data sharing device is applied to a second node for acquiring shared data from a first node in an industrial Internet identity resolution system, and comprises:
the demand sending module is used for sending a data sharing demand to the first node, wherein the data sharing demand comprises an industrial internet mark of shared data;
the ciphertext receiving module is used for receiving a ciphertext of the shared data sent by the first node; the ciphertext is sent out after the first node initiates consensus of shared information to nodes in a block chain and acquires consensus feedback of the block chain to the shared information, wherein the nodes in the block chain comprise the second node; the shared information includes: the associated industrial internet identity of the first node, the industrial internet identity of the second node, and the identity of the shared data; the identification of the shared data is determined according to the industrial Internet identification of the shared data;
a key obtaining module, configured to obtain a first key from a storage space in which an identifier of the shared data is an address in the block chain;
a decryption module for decrypting a ciphertext of the shared data using a key, the key comprising the first key;
the identification of the shared data comprises:
a hash value of an industrial internet identity of the shared data;
the first key includes:
a random number;
the shared information further comprises: the random number;
the random number is stored in a storage space with the hash value as an address on the block chain;
the decryption module is specifically configured to:
decrypting the ciphertext of the shared data by using the private key of the second node to obtain intermediate data;
and decrypting the intermediate data by using the first key to obtain the shared data.
8. A data sharing device comprising a processor and a memory;
the memory is used for storing programs, and the processor is used for operating the programs and realizing the data sharing method of any one of claims 1-3 or 4-5.
9. A computer-readable storage medium, on which a computer program is stored, which, when run on a computer, implements the data sharing method of any one of claims 1-3 or 4-5.
CN202010898770.8A 2020-08-31 2020-08-31 Data sharing method and related device Active CN112039892B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010898770.8A CN112039892B (en) 2020-08-31 2020-08-31 Data sharing method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010898770.8A CN112039892B (en) 2020-08-31 2020-08-31 Data sharing method and related device

Publications (2)

Publication Number Publication Date
CN112039892A CN112039892A (en) 2020-12-04
CN112039892B true CN112039892B (en) 2022-11-29

Family

ID=73587742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010898770.8A Active CN112039892B (en) 2020-08-31 2020-08-31 Data sharing method and related device

Country Status (1)

Country Link
CN (1) CN112039892B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113486393A (en) * 2021-06-16 2021-10-08 中国联合网络通信集团有限公司 Block chain-based personal information sharing method, node, device and storage medium
CN113486385B (en) * 2021-07-29 2022-03-01 深圳市至诚峰汇科技有限公司 Jewelry sharing method, device, equipment and storage medium based on block chain
CN115658742B (en) * 2022-11-16 2023-04-07 武汉亚为电子科技有限公司 Identification analysis method and system for field-level active identification carrier

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181599A (en) * 2017-07-18 2017-09-19 天津理工大学 The storage of route location data confidentiality and sharing method based on block chain
CN108833385A (en) * 2018-06-01 2018-11-16 深圳崀途科技有限公司 User data anonymity sharing method based on the encryption of alliance's chain
CN109587146A (en) * 2018-12-11 2019-04-05 北京奇虎科技有限公司 Method for managing object and system based on block chain
CN109768987A (en) * 2019-02-26 2019-05-17 重庆邮电大学 A kind of storage of data file security privacy and sharing method based on block chain
JP2020010267A (en) * 2018-07-12 2020-01-16 コニカミノルタ株式会社 Distributed medical information sharing system, medical information provision server, and program
CN111327426A (en) * 2020-01-21 2020-06-23 腾讯科技(深圳)有限公司 Data sharing method and related device, equipment and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181599A (en) * 2017-07-18 2017-09-19 天津理工大学 The storage of route location data confidentiality and sharing method based on block chain
CN108833385A (en) * 2018-06-01 2018-11-16 深圳崀途科技有限公司 User data anonymity sharing method based on the encryption of alliance's chain
JP2020010267A (en) * 2018-07-12 2020-01-16 コニカミノルタ株式会社 Distributed medical information sharing system, medical information provision server, and program
CN109587146A (en) * 2018-12-11 2019-04-05 北京奇虎科技有限公司 Method for managing object and system based on block chain
CN109768987A (en) * 2019-02-26 2019-05-17 重庆邮电大学 A kind of storage of data file security privacy and sharing method based on block chain
CN111327426A (en) * 2020-01-21 2020-06-23 腾讯科技(深圳)有限公司 Data sharing method and related device, equipment and system

Also Published As

Publication number Publication date
CN112039892A (en) 2020-12-04

Similar Documents

Publication Publication Date Title
CN112039892B (en) Data sharing method and related device
CN105553951B (en) Data transmission method and device
CN110190955B (en) Information processing method and device based on secure socket layer protocol authentication
JP2021500832A5 (en)
US11210658B2 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN108347419A (en) Data transmission method and device
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
CN110100422B (en) Data writing method and device based on block chain intelligent contract and storage medium
Symeonidis et al. Sepcar: A secure and privacy-enhancing protocol for car access provision
CN113268715A (en) Software encryption method, device, equipment and storage medium
JP2009529832A (en) Undiscoverable, ie secure data communication using black data
JP6012888B2 (en) Device certificate providing apparatus, device certificate providing system, and device certificate providing program
TWI522841B (en) Anonymity authentication method in multi-server environments
CA3178180A1 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN108964896B (en) Kerberos identity authentication system and method based on group key pool
US20110320359A1 (en) secure communication method and device based on application layer for mobile financial service
CN108347404A (en) A kind of identity identifying method and device
WO2018220693A1 (en) Information processing device, verification device, information processing system, information processing method, and recording medium
CN111245834B (en) Internet of things cross-domain access control method based on virtual identification
US20180139040A1 (en) Communication system
CN113722749A (en) Data processing method and device for block chain BAAS service based on encryption algorithm
CN112948883B (en) Method, device and system for multiparty joint modeling of privacy data protection
CN114499837A (en) Method, device, system and equipment for preventing leakage of message
Ahmad Abusukhon et al. A novel network security algorithm based on encrypting text into a white-page image
CN110708155B (en) Copyright information protection method, copyright information protection system, copyright confirming method, copyright confirming device, copyright confirming equipment and copyright confirming medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant