CN112163191A - Education resource sharing method and system based on national secret block chain - Google Patents
Education resource sharing method and system based on national secret block chain Download PDFInfo
- Publication number
- CN112163191A CN112163191A CN202010970449.6A CN202010970449A CN112163191A CN 112163191 A CN112163191 A CN 112163191A CN 202010970449 A CN202010970449 A CN 202010970449A CN 112163191 A CN112163191 A CN 112163191A
- Authority
- CN
- China
- Prior art keywords
- key
- target
- resource
- education
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000012795 verification Methods 0.000 claims description 50
- 238000004891 communication Methods 0.000 claims description 12
- 238000012550 audit Methods 0.000 claims description 6
- 238000012546 transfer Methods 0.000 claims description 5
- 230000004807 localization Effects 0.000 abstract description 6
- 230000008901 benefit Effects 0.000 abstract description 4
- 238000012986 modification Methods 0.000 abstract description 3
- 230000004048 modification Effects 0.000 abstract description 3
- 238000012797 qualification Methods 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 239000013589 supplement Substances 0.000 description 4
- 238000011156 evaluation Methods 0.000 description 3
- 238000000605 extraction Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses an education resource sharing method and system based on a national secret block chain, wherein the education resource is subjected to hash operation by using an SM3 password hash algorithm to generate abstract data, the abstract data is signed by using an SM9 national secret asymmetric signature algorithm, and the education resource is encrypted by using an SM9 national secret asymmetric encryption algorithm, so that the national secret algorithm can be supported, further the national supervision requirement can be adapted, the specific encryption requirement of localization is met, meanwhile, the indelibility modification and the authenticity of the education resource are ensured based on a decentralized block chain architecture, a reliable and efficient shared data admission system is formed in a sharing mode of a union block chain, the difficulty of stealing and selling the education resource and the quality of the education resource are improved, and the benefit requirements of two parties sharing the education resource at present are met.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to an education resource sharing method and system based on a national secret block chain.
Background
Along with the development of computer technology and the improvement of network technology, people have more and more demands on educational resources, and further higher requirements on the quality of the educational resources are provided. However, the current problems of the present society are the irregular and unreasonable allocation of educational resources and the regional inclination of high-quality educational resources. The development momentum of education and technology level in China is limited to a certain extent, and more importantly, the strategic deployment and development targets of 'science and education prosperous' implemented in China are difficult to meet. The rational and reliable acquisition of high quality educational resources is a key to balancing and redistributing educational resources.
In recent years, many colleges and universities have begun to adopt an information-based teaching mode, combine the traditional teaching concept with information technology, and take students as the center, and teachers perform collaborative learning by means of the information technology. On one hand, the working intensity of teachers can be reduced, the education quality and efficiency are improved, on the other hand, students can be guided to learn independently, and the own enthusiasm and activity are fully exerted. In particular, especially during the period of an invariance factor such as epidemic situation in early 2020, online digital education becomes an irreplaceable way, and students in the country can enjoy high-quality education resources by using the online teaching of each famous teacher, which undoubtedly stimulates the development of digital education and digital education sharing.
For example, in the chinese patent "educational resource sharing method, apparatus and electronic device based on block chain" (published japanese 2019.01.01, publication No. CN109118192A), it is disclosed that educational resource sharing between different training institutions is performed by using block chains, so that users can share all educational resources in a platform, and the educational resources can be made to exert maximum value, and the block chains are used to store educational resource information guarantee information to be true and reliable.
However, the existing block chain technology completely uses international algorithms, such as an ECDSA algorithm and the like, cannot adapt to domestic supervision requirements, and cannot meet specific encryption requirements of localization.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides an education resource sharing method and system based on a national secret block chain, which can meet the specific encryption requirement of localization.
In order to solve the technical problems, the technical scheme of the invention is as follows:
the invention discloses a national secret block chain-based educational resource sharing method, which comprises the following steps:
s1: receiving education resources submitted by key nodes which are successfully registered, property information of the education resources and a digital signature request;
s2: verifying the digital signature of the educational resource according to the digital signature request;
s3: if the verification is successful, auditing the education resources and the property information;
s4: if the audit is passed, generating and distributing a unique electronic code of the education resource, generating an intelligent contract used for determining the ownership relationship between the education resource and the key node, and sending the intelligent contract to the key node;
s5: receiving description information of the education resources submitted by the key nodes, wherein the description information comprises general descriptions, education resource types and digital identifications;
s6: distributing an embedding key to cause the key node to embed the digital identification in the form of a digital watermark into the educational resource in accordance with the embedding key;
s7: performing hash operation on the education resources embedded with the digital identifications by using an SM3 password hash algorithm to generate summary data;
s8: distributing a signature private key to enable the key node to sign the summary data by applying an SM9 national secret asymmetric signature algorithm according to the signature private key;
s9: distributing an encrypted public key so that the key node encrypts the education resources embedded with the digital identification by applying an SM9 national password asymmetric encryption algorithm according to the encrypted public key;
s10: storing the signed abstract data and the encrypted educational resources into a shared database corresponding to the key node;
s11: taking the storage address of the educational resource in the shared database, the description information of the educational resource and the unique electronic code of the educational resource as block information, and performing hash operation on the block information by using the SM3 cryptographic hash algorithm to generate block data to be issued to a block chain of a shared alliance, so that all key nodes in the block chain of the shared alliance can achieve common identification;
s12: a blockchain generated from the blockdata is time stamped and linked to the end of the shared federation blockchain.
The second aspect of the present invention discloses an educational resource sharing system based on a national secret block chain, comprising:
the registration unit is used for receiving the education resources submitted by the key nodes which are successfully registered, the property information of the education resources and the digital signature request;
a signature verification unit for verifying the digital signature of the educational resource according to the digital signature request;
the auditing unit is used for auditing the education resources and the property information when the signature verification unit successfully verifies the education resources;
the generating unit is used for generating and distributing a unique electronic code of the education resource when the auditing unit passes the auditing, generating an intelligent contract used for determining the ownership relationship between the education resource and the key node, and sending the intelligent contract to the key node;
the receiving unit is used for receiving the description information of the education resources submitted by the key nodes, and the description information comprises general descriptions, education resource types and digital identifications;
a key center unit for distributing an embedding key to cause the key node to embed the digital identification in the form of a digital watermark into the educational resource in accordance with the embedding key;
the hash operation unit is used for carrying out hash operation on the education resources embedded with the digital identifications by using an SM3 password hash algorithm so as to generate abstract data;
the key center unit is further used for distributing a signature private key so that the key node signs the digest data according to the signature private key by using an SM9 cryptographic asymmetric signature algorithm;
the key center unit is further used for distributing an encrypted public key, so that the key node encrypts the education resources embedded with the digital identification by applying an SM9 national key asymmetric encryption algorithm according to the encrypted public key;
the storage unit is used for storing the signed abstract data and the encrypted educational resources into a shared database corresponding to the key node;
the block chain unit is used for taking the storage address of the educational resource in the shared database, the description information of the educational resource and the unique electronic code of the educational resource as block information, and performing hash operation on the block information by using the SM3 password hash algorithm to generate block data to be issued to a shared alliance block chain, so that all key nodes in the shared alliance block chain on the block data chain can achieve consensus;
and the time stamping unit is used for stamping a block chain generated according to the block data and linking the block chain to the tail part of the block chain of the sharing alliance.
Compared with the prior art, the technical scheme of the invention has the beneficial effects that: the invention discloses an education resource sharing method and system based on a national secret block chain, wherein the education resource is subjected to hash operation by using an SM3 password hash algorithm to generate summary data, the summary data is signed by using an SM9 national secret asymmetric signature algorithm, and the education resource is encrypted by using an SM9 national secret asymmetric encryption algorithm, so that the national secret algorithm can be supported, further the national supervision requirement can be adapted, and the specific encryption requirement of localization is met; meanwhile, the digital identification is hidden in the educational resources in a watermark form, the propagation process of the educational resources can be tracked, a powerful guarantee is provided for the copyright protection of the educational resources, the non-tamper-proof property and the authenticity of the educational resources are guaranteed based on a decentralized block chain architecture, a reliable and efficient shared data admission system is formed in a sharing mode of an alliance block chain, the difficulty of stealing and selling the educational resources and the quality of the educational resources are improved, and the benefit requirements of two sharing parties in the current educational resources are met.
Drawings
FIG. 1 is a flowchart of the educational resource sharing method based on the national confidential block chain of example 1;
FIG. 2 is a schematic structural diagram of an educational resource sharing system based on a national secret block chain in example 2;
FIG. 3 is a schematic diagram of a chain structure of a block chain according to an embodiment of the disclosure;
fig. 4 is a signal flow diagram of the SM9 cryptographic asymmetric signature algorithm disclosed in the embodiment of the present invention;
fig. 5 is a signal flow diagram of an SM9 cryptographic asymmetric encryption algorithm disclosed in the embodiment of the present invention;
wherein: 201. a registration unit; 202. a signature verification unit; 203. an auditing unit; 204. a generating unit; 205. a receiving unit; 206. a key center unit; 207. a hash operation unit; 208. a storage unit; 209. a block chain unit; 210. and a time stamp unit.
Detailed Description
The drawings are for illustrative purposes only and are not to be construed as limiting the patent;
the technical solution of the present invention is further described below with reference to the accompanying drawings and examples.
Example 1
As shown in fig. 1, the present embodiment provides a method for sharing educational resources based on a national secret block chain, which includes the following steps:
s1: and receiving the education resources submitted by the key nodes with successful registration, the property information of the education resources and the digital signature request.
In this embodiment of the present invention, the block chain may specifically be a federation block chain, and based on a resource sharing mode of the federation chain, the federation block chain may include a supervision center node, a key node, and a common node, and an execution subject of the education resource sharing method based on the national secret block chain disclosed in this embodiment may be the supervision center node. The supervision center node is an initial key node of the block chain of the alliance, is uniformly planned and managed by an education administration (such as the national education department or each city education bureau), and can bring other key nodes and common nodes into the alliance chain through the authority possessed by the supervision center node.
The registered users of the key nodes are nationwide universities and institutions legally registered in the national education department, and the common nodes are individual users which can be students or teachers. Alternatively, the authority of the common node and the authority of the key node may be set differently. For example, the common node is only given the right to download, inquire and evaluate the educational resources, the key node is given the right to upload, download, inquire and evaluate the educational resources, and when new block data is broadcasted to the block chain of the shared alliance, only the monitoring center node and the key node can participate in the consensus certification of the block data. The nodes are divided into a supervision center node, a key node and a common node according to the division of the authority from high to low.
It should be noted that, in the embodiment of the present invention, the generation algorithm of the digest data is an SM3 cryptographic hash algorithm that is issued in 2016 and meets the national cryptographic industry standard (GB/T32905-. Wherein, the input of the SM3 cryptographic hash algorithm is length l (l)<264) The message m of the bit is filled and compressed in an iterative way to generate a hash value with the fixed length of 256 bits.
As shown in fig. 3, the block chain includes a plurality of blocks, each block includes a block header and a block body, and the block header of block N +1 includes a hash value, a timestamp, a Merkle root, a random number, and the like of the digest data of the previous block N. The block body of the block N +1 mainly comprises data generated by a plurality of transactions, each data is subjected to SM 3-based cryptographic hash algorithm to obtain a hash value according to a generation rule of the Merkle tree, and then the hash values of every two data are subjected to hash operation until the Merkle tree is formed, the last hash value is obtained and used as the hash value of the block N +1, and the hash value of the block N +1 is linked to the block head of the next block N +2, so that the chain structure of the block chain is embodied.
Optionally, the monitoring center node may also receive a registration request sent by the individual user or the school user before executing step S1. On one hand, the individual user can perform registration operation through the individual registration entrance, fill in individual user registration information and send the individual user registration information to the supervision center node to complete registration processing, then the supervision center node performs retrieval query in the shared alliance block chain according to the individual user registration information, and if account information in the same individual user registration information is not retrieved, registration success information is fed back; and if the same account information in the personal user registration information is retrieved, feeding back registration failure information and requiring to register again. The personal user registration information includes a school name, a belonged family, a read specialty, a school number, a registration account number, a password and the like.
On the other hand, the school user can perform registration operation through the school registration entrance, fill in the school user registration information and send the school user registration information to the supervision center node to complete registration processing, then the supervision center node performs retrieval query in the shared alliance block chain according to the school user registration information, and if account information in the same school user registration information is not retrieved, registration success information is fed back; and if the same account information in the school user registration information is retrieved, feeding back registration failure information and requiring to register again. The school user registration information includes a school location area, school code information, a school name, a registration account, a password, and the like.
Further optionally, the monitoring center node may receive an identity verification audit request sent by a common node or a key node, verify the identity of an individual user or a school user to prove the authenticity of the identity of the user, and after the verification is successful, associate real-name authentication information of the user with registration information to form a user identity record and generate a block, broadcast the block to the block chain, and after all key nodes reach consensus, stamp and link to the tail of the block chain of the shared alliance, bring the user into a node on the block chain.
On one hand, after the individual user successfully registers through the individual registration entrance, the supervision center node sends real-name authentication prompt information to the individual user. The individual user who does not complete the real-name authentication will not be able to perform the sharing operation of the educational resources. And after receiving the real-name authentication prompt information, the individual user fills in the real-name authentication information and submits the real-name authentication information to the supervision center node. The real-name authentication information includes a name, a birth date, a certificate number, and the like. Then, the supervision center node checks the real-name authentication information of the individual user, and if the real-name authentication information of the individual user does not pass the supervision center node, a warning that the check does not pass is sent to the individual user, and the individual user is required to continuously supplement new real-name authentication information; if the individual user is brought into one common node in the sharing alliance block chain, the common node can be in communication connection with any number of common nodes on the block chain, and can also be in communication connection with any key node on the block chain, so that the sharing database of the key node can be accessed. After the monitoring center node associates real-name authentication prompt information of an individual user with individual user registration information to be user identity records, the user identity records are operated based on a SM3 hash algorithm to generate identity abstract information, the identity abstract information is issued to a block chain of a sharing alliance as block data to enable all key nodes in the block chain of the sharing alliance to achieve consensus, and the block chain generated according to the identity abstract information is time-stamped and linked to the tail of the block chain of the sharing alliance.
On the other hand, after the school user successfully performs the registration operation through the school registration entrance, the supervision center node sends qualification verification prompt information to the school user. School users who do not complete qualification audit will not be able to share educational resources. After receiving the qualification audit prompt message, the school user fills in qualification certification information and submits the qualification certification information to the supervision center node. The qualification certification information includes a school name, a school code, and a school qualification certificate issued by the education administration (e.g., a license approval). Then, the supervision center node checks the qualification certification information of the school user, and if the qualification certification information does not pass the supervision center node, a warning that the checking does not pass is sent to the school user to request the school user to continuously supplement new qualification certification information; if the school user is brought into one key node in the sharing alliance block chain, the key node can establish communication connection with any node on the block chain. After the monitoring center node associates the qualification certification prompt information of the school user and the registration information of the school user into a user identity record, the user identity record is operated based on a SM3 hash algorithm to generate identity summary information, the identity summary information is issued to a block chain of the shared alliance as block data to enable all key nodes in the block chain of the shared alliance to achieve consensus, and a timestamp is printed on the block chain generated according to the identity summary information and is linked to the tail of the block chain of the shared alliance.
Optionally, the key node may further set a download score corresponding to the education resource, configure a score of a certain amount that can be used for downloading and evaluating the education resource for each common node, and preset an intelligent contract for score transfer processing on the shared alliance block chain, and by using the intelligent contract for score transfer processing, when the common node downloads or evaluates the education resource, transfer a corresponding score deducted from an account of the common node to the account of the key node.
S2: the digital signature of the educational resource is verified according to the digital signature request.
The digital signature request can be formed by the key node by using a signature private key of the education resource, after the supervision center node receives the education resource, the property right information of the education resource and the digital signature request sent by the key node, the correctness of the digital signature is verified by using a signature verification public key of the education resource, if the verification is unsuccessful, the education resource is discarded, and the key node is waited to resend the digital signature request; and if the verification is successful, further auditing the content and the property information of the education resources. Wherein, the property information comprises school names and property certificates of education resources.
S3: and if the verification is successful, auditing the education resources and the property right information.
Wherein, the property information of the education resources at least comprises the names of schools to which the education resources belong.
S4: and if the audit is passed, generating and distributing the unique electronic code of the educational resource.
If the verification fails, sending feedback information to the key node, and requiring school users corresponding to the key node to supplement more property information; and if the verification is passed, generating a candidate electronic code of the education resource, judging whether the candidate electronic code has uniqueness or not, if so, taking the candidate electronic code as the unique electronic code of the education resource, distributing the candidate electronic code, and generating an intelligent contract for determining the ownership relationship between the education resource and the key node and sending the intelligent contract to the key node.
Further optionally, the manner of determining whether the candidate electronic code is specific and unique may specifically be:
querying the database whether an existing electronic code identical to the candidate electronic code already exists; if not, judging the specific uniqueness of the candidate electronic code; and if so, generating new candidate electronic codes again according to the educational resources until the new candidate electronic codes have uniqueness.
S5: and receiving the description information of the educational resources submitted by the key nodes.
And after the candidate electronic code is used as the unique electronic code of the education resource and is distributed, sending prompt information for indicating that the school user corresponding to the key node adds the description information of the education resource, and receiving the description information of the education resource submitted by the key node. Wherein the description information includes a general description, an educational resource type, and a numerical identification.
Optionally, the digital identifier includes, but is not limited to, an electronic code, a two-dimensional code, or a text description information, and the digital identifier may be determined according to specific business requirements, for example, may be determined according to the educational resource and the title information of the educational resource.
S6: the embedding key is distributed such that the key node embeds the digital identification in the form of a digital watermark into the educational resource in accordance with the embedding key.
The digital watermarking technology based on information hiding can ensure that the quality of the educational resources is not influenced, and simultaneously hide the digital identification in the educational resources in a watermarking form, so that the propagation process of the educational resources can be tracked, and the copyright protection of the educational resources is provided with powerful guarantee.
Alternatively, step S6 may include: distributing the embedded key so that the key node converts the digital identifier into binary data; and, carry on the combination operation to the binary data, produce the digital watermark information; and generating the education resource embedded with the digital identification through a watermark embedding algorithm according to the digital watermark information, the embedding key and the education resource. The binarized data may be a binary sequence or a binary image, among others.
Furthermore, after the key node generates the education resource embedded with the digital identifier, the digital watermark information can be extracted from the education resource embedded with the digital identifier according to the watermark extraction key by using a watermark extraction algorithm, and the existence of the digital watermark information is verified.
S7: and carrying out hash operation on the education resources embedded with the digital identifications by using an SM3 password hash algorithm to generate summary data.
It should be noted that, because there are many types of educational resources and the data size of the educational resources is very large or very small, the SM3 cryptographic hash algorithm may be used to perform the hash operation on the educational resources before signing, so as to compress the data size of the educational resources, further improve the signing efficiency of the educational resources, and output the hash value with a fixed length.
S8: and distributing the signature private key so that the key node signs the summary data by using the SM9 national secret asymmetric signature algorithm according to the signature private key. Wherein the signature private key may be generated from the first master key pair of the supervision center node and the unique electronic code of the educational resource.
It should be noted that the SM9 national cryptographic algorithm is an identity-based cryptographic algorithm constructed by using bilinear pairs on elliptic curves in a finite field, and the algorithm is published in 2015 and meets the national cryptographic industry standard (GM/T0044-2016). The algorithm can generate public and private key pairs based on the identity without the need for traditional digital certificates, certificate libraries or key libraries. It can generate a public and private key pair based on the identification (such as unique electronic code) of the educational resource, wherein the key length is 256 bits. The algorithm comprises a digital signature algorithm, a key exchange protocol, a key package and a public key encryption algorithm. The identity-based cryptographic algorithm constructed by utilizing bilinear pairs on the elliptic curve comprises a digital signature generation algorithm and a signature verification algorithm.
Referring to fig. 4, fig. 4 is a signal flow diagram of the SM9 cryptographic asymmetric signature algorithm. As shown in FIG. 4, a signer (i.e. a key node) of an educational resource I holds summary data M of the educational resource I and a unique electronic code ID, and a supervision center node performs supervision according to a first random factor K1And a unique electronic code ID to generate a first master key pair (s, P)pub) Wherein the first master key pair (s, P)pub) Comprising a master private key s and a master public key PpubThe supervising central node then couples the first master key pair (s, P)pub) Sent to the signer, who, on the basis of the unique electronic code ID and the first master key pair (s, P)pub) Generating a private signature key dAThe signer can sign the private key dAAfter the summary data M is signed, the signed summary data M with the signature (h, S) at the head is generated’And sending the data to a verifier, and the verifier extracts the signed abstract data M’The signature (h, S) of the header is based on the master public key P sent by the supervision center nodepubGenerating a signature verification public key Q with a unique electronic code IDAAnd verifying the public key Q from the signatureASignature the digest data M to generate (h)’S'), then judges the signature (h, S) and verifies the signature (h)’And S') whether the two are consistent, if so, the signature verification is successful, and the reliability of the signature can be further verified, namely the authenticity and the integrity of the educational resources and the identity of the sender are verified.
Optionally, a SM3 cryptographic hash algorithm may be used to perform the hash algorithm to compress the data volume before generating the signature and performing signature verification.
S9: and distributing the encrypted public key so that the key node encrypts the education resource embedded with the digital identifier by using the SM9 national password asymmetric encryption algorithm according to the encrypted public key.
Wherein the encrypted public key may be generated from the second master key pair of the supervising central node and the unique electronic code of the educational resource.
Referring to fig. 5, fig. 5 is a signal flow diagram of the SM9 cryptographic asymmetric encryption algorithm. As shown in fig. 5, the supervising central node depends on a second random factor K2Generating a second master key pair (s, P) by presetting a public parameter and a unique electronic code ID of the educational resource Ipub) And sent to the encryptor (i.e. the key node) and the decryptor (i.e. the other key node or the common node), respectively, wherein the second master key pair (s, P)pub) Comprising a master private key s and a master public key PpubThe encryptor then bases its distribution on the second master key pair (s, P) of the supervision centre nodepub) Generating an encrypted public key Q with a unique electronic code IDBThen according to the encrypted public key QBThe educational resource I is encrypted to generate an encrypted educational resource C, when other key nodes or common nodes download the educational resource, the educational resource C can be transmitted to a decrypter through a point-to-point network transmission channel, and the decrypter transmits the educational resource C to the decrypter according to a second master key pair (s, P) distributed by the supervision center nodepub) Generating a decryption private key d with a unique electronic code IDBThen based on the decryption private key dBThe encrypted educational resource C is decrypted.
S10: and storing the signed abstract data and the encrypted educational resources into a shared database corresponding to the key node.
S11: the storage address of the educational resource in the shared database, the description information of the educational resource and the unique electronic code of the educational resource are used as block information, and the SM3 cryptographic hash algorithm is used for carrying out hash operation on the block information to generate block data to be issued to the block chain of the shared alliance, so that all key nodes in the block chain of the shared alliance on the block data chain can be identified.
S12: the blockchain generated from the blockdata is time stamped and linked to the end of the shared federation blockchain.
Optionally, after step S12, the following steps may be further included: receiving revocation request information which is submitted by a key node and aims at the educational resources, wherein the revocation request information comprises a unique electronic number of the educational resources, educational resource names, description information and property right information, and then auditing the revocation request information; if the verification is passed, closing and invalidating an intelligent contract used for determining the ownership relationship between the educational resources and the key nodes, taking revocation request information as block information, performing hash operation on the block information by using an SM3 cryptographic hash algorithm to generate block data, issuing the block data to the block chain of the shared alliance, so that all the key nodes in the block chain of the shared alliance on the block data chain can achieve consensus, and synchronously deleting or hiding the revoked educational resources in a shared database corresponding to the key nodes; if the verification fails, the revocation failing information is fed back to the key node, and the user of the key node is prompted to supplement more revocation request information.
As an alternative embodiment, after step S12, the method may further include the following steps:
s13: and inquiring the block data traversing all the blocks on the shared alliance block chain according to the received inquiry request information of the common node aiming at the target education resource so as to obtain the key information of the target education resource. The key information comprises a target unique electronic code, a target education resource name, target description information, target property information and a target storage address.
Alternatively, before performing step S13, the supervising central node may receive the query request information of the general node for the target educational resource, and may first determine whether the query request meets the query condition, and if so, perform step S13.
It should be noted that the target educational resource can be any educational resource on the shared federation blockchain. The common nodes or the key nodes can inquire the education resources on the block chain of the shared alliance, so that the education resources are shared, and the reality, transparency and reliability of data are guaranteed.
Optionally, the shared alliance block chain may query, in addition to the educational resources, personal user information or school user information, and when receiving query request information of a common node for any target personal user, query the shared alliance block chain to obtain target personal user information of the target personal user and return the target personal user information to the common node; when receiving the query request information of the common node for any target school user, querying on the sharing alliance block chain to obtain the target school user information of the target school user, and returning the target school user information to the common node. The target individual user information comprises user identity records, education resource sharing records, education resource evaluation information and the like, and the target school user information comprises user identity records, education resource sharing records, published education resource sharing information and the like.
S14: and if receiving the downloading request information aiming at the target education resources, which is input by the common node, establishing point-to-point network communication connection between the common node and a target shared database corresponding to the target education resources according to the target storage address.
Alternatively, if receiving download request information for the target educational resource input by the common node, the download request information for the target educational resource may be forwarded to a target key node corresponding to the target educational resource, and then when receiving approval information of the user of the target key node for the download request information, the communication connection between the common node and a target shared database corresponding to the target educational resource is established according to the target storage address.
S15: and generating a signature verification public key and a decryption private key of the target education resource, and sending the target education resource, the signature verification public key and the decryption private key to the common node point to point so that the common node can perform signature verification and decryption on the target resource information according to the signature verification public key and the decryption private key.
Optionally, the target education resource, the signature verification public key and the decryption private key may be sent to the common node in a point-to-point manner based on the P2P network technology, after receiving the target education resource, the signature verification public key and the decryption private key, the common node decrypts the target resource information according to the decryption private key by using the SM9 national password asymmetric decryption algorithm, and performs signature verification by using the SM9 national password asymmetric signature verification algorithm according to the signature verification public key distributed by the supervision center node.
Further optionally, if the signature verification is successful, taking the current shared record as block information, and performing hash operation on the block information by using an SM3 cryptographic hash algorithm to generate block data and issue the block data to the block chain of the shared alliance, so that all key nodes in the block chain of the shared alliance achieve consensus; and if the signature verification fails, submitting a verification failure report, and waiting for the supervision center node to redistribute the signature verification public key until the target education resources are successfully verified. And if the decryption fails, submitting a decryption failure report, and waiting for the supervision center node to redistribute the decryption private key until the target education resources are successfully decrypted.
Optionally, if downloading request information aiming at the target educational resource and input by the common node is received, generating an intelligent contract for restricting both parties of the downloading transaction according to the downloading request information, and respectively sending the intelligent contract for restricting both parties of the downloading transaction to a target key node and the common node corresponding to the target educational resource; according to the intelligent contract for restricting the downloading transaction parties, judging whether the residual integral amount on the user account of the common node is larger than or equal to the integral amount corresponding to the target education resource; if the total amount of the education resources is larger than or equal to the total amount of the education resources, deducting the integral amount corresponding to the target education resources from the user account of the common node and transferring the integral amount to the user account of the target key node; and if the total number of the points is less than the preset value, canceling downloading and feeding back prompt information for representing insufficient points to the common node.
Optionally, after the common user downloads the target education resource, the common user can enjoy the user sharing the target key node of the target education resource, and specifically, receives evaluation information and a reward point value for the target education resource uploaded by the common node; deducting the integral amount corresponding to the integral value from the user account of the common node according to the reward integral value, transferring the integral amount to the user account of the target key node, using the evaluation information as block information, performing hash operation on the block information by using an SM3 cryptographic hash algorithm to generate block data, issuing the block data to the block chain of the sharing alliance so as to enable all key nodes in the block chain of the sharing alliance to achieve consensus, and stamping a time stamp on a new block generated according to the block data and linking the new block to the tail part of the block chain of the sharing alliance.
The embodiment provides an education resource sharing method based on a national secret block chain, wherein a SM3 password hash algorithm is used for carrying out hash operation on education resources to generate summary data, an SM9 national secret asymmetric signature algorithm is used for signing the summary data, and an SM9 national secret asymmetric encryption algorithm is used for encrypting the education resources, so that the national secret algorithm can be supported, further the national supervision requirement can be adapted, and the specific encryption requirement of localization is met; meanwhile, the digital identification is hidden in the educational resources in a watermark form, the propagation process of the educational resources can be tracked, a powerful guarantee is provided for the copyright protection of the educational resources, the non-tamper-proof property and the authenticity of the educational resources are guaranteed based on a decentralized block chain architecture, a reliable and efficient shared data admission system is formed in a sharing mode of an alliance block chain, the difficulty of stealing and selling the educational resources and the quality of the educational resources are improved, and the benefit requirements of two sharing parties in the current educational resources are met. In addition, based on an education resource alliance chain formed by all user nodes including a supervision center node, a key node and a common node, the rich strategy control mechanism combines identity authentication and access control, the management cost is not greatly increased along with the larger order of magnitude of education resources, and low cost, high efficiency and convenient operation are effectively realized.
Example 2
As shown in fig. 2, the present embodiment provides a system for sharing educational resources based on a national secret block chain, which includes a registration unit 201, a signature verification unit 202, an auditing unit 203, a generation unit 204, a receiving unit 205, a key center unit 206, a hash operation unit 207, a storage unit 208, a block chain unit 209, and a timestamp unit 210, wherein:
a registration unit 201, configured to receive an education resource, title information of the education resource, and a digital signature request submitted by a key node that is successfully registered;
a signature verification unit 202 for verifying the digital signature of the educational resource according to the digital signature request;
the auditing unit 203 is used for auditing the education resources and the property right information when the signature verification unit successfully verifies the education resources;
the generating unit 204 is used for generating and distributing a unique electronic code of the education resource when the auditing unit 203 passes the auditing, generating an intelligent contract used for determining the ownership relationship between the education resource and the key node, and sending the intelligent contract to the key node;
a receiving unit 205, configured to receive description information of the educational resource submitted by the key node, where the description information includes a general description, an educational resource type, and a numeric identifier;
a key center unit 206 for distributing the embedding key to cause the key node to embed the digital identification in the form of a digital watermark into the educational resource in accordance with the embedding key;
a hash operation unit 207, configured to perform a hash operation on the educational resource with the embedded digital identifier by using an SM3 cryptographic hash algorithm to generate digest data;
the key center unit 206 is further configured to distribute a private signature key, so that the key node signs the digest data according to the private signature key by using an SM9 cryptographic asymmetric signature algorithm;
the key center unit 206 is further configured to distribute the encrypted public key, so that the key node encrypts the educational resource with the embedded digital identifier according to the encrypted public key by using an SM9 national key asymmetric encryption algorithm;
the storage unit 208 is configured to store the signed summary data and the encrypted educational resources into a shared database corresponding to the key node;
the block chain unit 209 is configured to use the storage address of the educational resource in the shared database, the description information of the educational resource, and the unique electronic code of the educational resource as block information, and perform a hash operation on the block information by using an SM3 cryptographic hash algorithm to generate block data, and issue the block data to the block chain of the sharing alliance, so that all key nodes in the block chain of the sharing alliance on the block data chain can achieve consensus;
a time stamping unit 210, configured to time stamp and link a blockchain generated from the blockdata to the tail of the shared federation blockchain.
Optionally, the system for sharing educational resources based on the national secret block chain further comprises:
the query unit is used for querying block data traversing all the blocks on the shared alliance block chain according to the received query request information of the common node aiming at the target education resource so as to obtain key information of the target education resource; the key information comprises a target unique electronic code, a target education resource name, target description information, target property information and a target storage address;
the communication connection unit is used for establishing point-to-point network communication connection between the common node and a target sharing database corresponding to the target education resource according to the target storage address after receiving the downloading request information aiming at the target education resource input by the common node;
and the key center unit is also used for generating a signature verification public key and a decryption private key of the target education resource, and sending the target education resource, the signature verification public key and the decryption private key to the common node so that the common node can perform signature verification and decryption on the target resource information according to the signature verification public key and the decryption private key.
Optionally, the system for sharing educational resources based on the national secret block chain further comprises:
the contract control unit is used for generating an intelligent contract for restricting both sides of the downloading transaction according to the downloading request information when the communication connection unit receives the downloading request information aiming at the target education resource and input by the common node;
the sending unit is used for respectively sending the intelligent contracts for restricting the downloading transaction parties to a target key node and a common node corresponding to the target education resource;
and the point transfer unit is used for deducting the point amount corresponding to the target education resource from the user account of the common node and transferring the point amount to the user account of the target key node according to the intelligent contract for restricting the downloading transaction parties.
Optionally, the educational resource sharing system based on the national secret block chain further comprises a key node, configured to convert the digital identifier into binary data after receiving the embedded key distributed by the key center unit; and, carry on the combination operation to the binary data, produce the digital watermark information; and generating the education resource embedded with the digital identification through a watermark embedding algorithm according to the digital watermark information, the embedding key and the education resource.
Optionally, the signature private key is generated according to a first master key pair of the supervision center node and the unique electronic code of the educational resource, and the encryption public key is generated according to a second master key pair of the supervision center node and the unique electronic code of the educational resource.
The embodiment provides an education resource sharing system based on a national secret block chain, wherein a SM3 password hash algorithm is used for carrying out hash operation on education resources to generate summary data, an SM9 national secret asymmetric signature algorithm is used for signing the summary data, and an SM9 national secret asymmetric encryption algorithm is used for encrypting the education resources, so that the national secret algorithm can be supported, further the national supervision requirement can be adapted, and the specific encryption requirement of localization is met; meanwhile, the digital identification is hidden in the educational resources in a watermark form, the propagation process of the educational resources can be tracked, a powerful guarantee is provided for the copyright protection of the educational resources, the non-tamper-proof property and the authenticity of the educational resources are guaranteed based on a decentralized block chain architecture, a reliable and efficient shared data admission system is formed in a sharing mode of an alliance block chain, the difficulty of stealing and selling the educational resources and the quality of the educational resources are improved, and the benefit requirements of two sharing parties in the current educational resources are met. In addition, based on an education resource alliance chain formed by all user nodes including a supervision center node, a key node and a common node, the rich strategy control mechanism combines identity authentication and access control, the management cost is not greatly increased along with the larger order of magnitude of education resources, and low cost, high efficiency and convenient operation are effectively realized.
It should be understood that the above-described embodiments of the present invention are merely examples for clearly illustrating the present invention, and are not intended to limit the embodiments of the present invention. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the claims of the present invention.
Claims (10)
1. A method for sharing education resources based on a national secret block chain is characterized by comprising the following steps:
s1: receiving education resources submitted by key nodes which are successfully registered, property information of the education resources and a digital signature request;
s2: verifying the digital signature of the educational resource according to the digital signature request;
s3: if the verification is successful, auditing the education resources and the property information;
s4: if the audit is passed, generating and distributing a unique electronic code of the education resource, generating an intelligent contract used for determining the ownership relationship between the education resource and the key node, and sending the intelligent contract to the key node;
s5: receiving description information of the education resources submitted by the key nodes, wherein the description information comprises general descriptions, education resource types and digital identifications;
s6: distributing an embedding key to cause the key node to embed the digital identification in the form of a digital watermark into the educational resource in accordance with the embedding key;
s7: performing hash operation on the education resources embedded with the digital identifications by using an SM3 password hash algorithm to generate summary data;
s8: distributing a signature private key to enable the key node to sign the summary data by applying an SM9 national secret asymmetric signature algorithm according to the signature private key;
s9: distributing an encrypted public key so that the key node encrypts the education resources embedded with the digital identification by applying an SM9 national password asymmetric encryption algorithm according to the encrypted public key;
s10: storing the signed abstract data and the encrypted educational resources into a shared database corresponding to the key node;
s11: taking the storage address of the educational resource in the shared database, the description information of the educational resource and the unique electronic code of the educational resource as block information, and performing hash operation on the block information by using the SM3 cryptographic hash algorithm to generate block data to be issued to a block chain of a shared alliance, so that all key nodes in the block chain of the shared alliance can achieve common identification;
s12: a block generated from the block data is time stamped and linked to the end of the shared federation block chain.
2. The method for sharing educational resources based on national cipher block chain according to claim 1, further comprising the following steps after step S12:
s13: according to received query request information of a common node for a target education resource, querying block data traversing all blocks on the shared alliance block chain to obtain key information of the target education resource; the key information comprises a target unique electronic code, a target education resource name, target description information, target property information and a target storage address;
s14: if the downloading request information aiming at the target education resources and input by the common node is received, establishing point-to-point network communication connection between the common node and a target sharing database corresponding to the target education resources according to the target storage address;
s15: and generating a signature verification public key and a decryption private key of the target education resource, and sending the target education resource, the signature verification public key and the decryption private key to the common node point to point so that the common node can perform signature verification and decryption on the target resource information according to the signature verification public key and the decryption private key.
3. The method of claim 2, further comprising the steps of:
if receiving the downloading request information aiming at the target educational resource input by the common node, generating an intelligent contract for restricting both parties of the downloading transaction according to the downloading request information;
respectively sending the intelligent contracts for restricting the downloading transaction parties to a target key node and the common node corresponding to the target educational resource;
and according to the intelligent contracts for restricting the downloading of both parties of the transaction, deducting the integral amount corresponding to the target education resource from the user account of the common node and transferring the integral amount to the user account of the target key node.
4. The method for sharing educational resources based on national cipher block chain according to claim 1, wherein in step S6, the key node converts the digital identifier into binary data after receiving the distributed embedded key; and, carry on the combination operation to the said binary data, produce the digital watermark information; and generating the education resource embedded with the digital identification through a watermark embedding algorithm according to the digital watermark information, the embedding key and the education resource.
5. The method as claimed in any one of claims 1 to 4, wherein the private signature key is generated from a first master key pair of a supervision center node and the unique electronic code of the education resource, and the public encryption key is generated from a second master key pair of the supervision center node and the unique electronic code of the education resource.
6. A system for sharing educational resources based on a national block cipher chain, comprising:
the registration unit is used for receiving the education resources submitted by the key nodes which are successfully registered, the property information of the education resources and the digital signature request;
a signature verification unit for verifying the digital signature of the educational resource according to the digital signature request;
the auditing unit is used for auditing the education resources and the property information when the signature verification unit successfully verifies the education resources;
the generating unit is used for generating and distributing a unique electronic code of the education resource when the auditing unit passes the auditing, generating an intelligent contract used for determining the ownership relationship between the education resource and the key node, and sending the intelligent contract to the key node;
the receiving unit is used for receiving the description information of the education resources submitted by the key nodes, and the description information comprises general descriptions, education resource types and digital identifications;
a key center unit for distributing an embedding key to cause the key node to embed the digital identification in the form of a digital watermark into the educational resource in accordance with the embedding key;
the hash operation unit is used for carrying out hash operation on the education resources embedded with the digital identifications by using an SM3 password hash algorithm so as to generate abstract data;
the key center unit is further used for distributing a signature private key so that the key node signs the digest data according to the signature private key by using an SM9 cryptographic asymmetric signature algorithm;
the key center unit is further used for distributing an encrypted public key, so that the key node encrypts the education resources embedded with the digital identification by applying an SM9 national key asymmetric encryption algorithm according to the encrypted public key;
the storage unit is used for storing the signed abstract data and the encrypted educational resources into a shared database corresponding to the key node;
the block chain unit is used for taking the storage address of the educational resource in the shared database, the description information of the educational resource and the unique electronic code of the educational resource as block information, and performing hash operation on the block information by using the SM3 password hash algorithm to generate block data to be issued to a shared alliance block chain, so that all key nodes in the shared alliance block chain on the block data chain can achieve consensus;
and the time stamping unit is used for stamping a block chain generated according to the block data and linking the block chain to the tail part of the block chain of the sharing alliance.
7. The system of claim 6, further comprising:
the query unit is used for querying block data traversing all the blocks on the shared alliance block chain according to the received query request information of the common node for the target education resource so as to obtain key information of the target education resource; the key information comprises a target unique electronic code, a target education resource name, target description information, target property information and a target storage address;
the communication connection unit is used for establishing point-to-point network communication connection between the common node and a target shared database corresponding to the target education resource according to the target storage address after receiving the downloading request information aiming at the target education resource and input by the common node;
the key center unit is further configured to generate a signature verification public key and a decryption private key of the target education resource, and send the target education resource, the signature verification public key and the decryption private key to the common node point to point, so that the common node performs signature verification and decryption on the target resource information according to the signature verification public key and the decryption private key.
8. The system of claim 7, further comprising:
the contract control unit is used for generating an intelligent contract for restricting both sides of the downloading transaction according to the downloading request information when the communication connection unit receives the downloading request information aiming at the target educational resource and input by the common node;
the sending unit is used for respectively sending the intelligent contracts for restricting the downloading and trading parties to the target key node and the common node corresponding to the target education resource;
and the point transfer unit is used for deducting the point amount corresponding to the target education resource from the user account of the common node and transferring the point amount to the user account of the target key node according to the intelligent contract for restricting the downloading transaction parties.
9. The system according to claim 6, further comprising the key node, for converting the digital identifier into binary data after receiving the embedded key distributed by the key center unit; and, carry on the combination operation to the said binary data, produce the digital watermark information; and generating the education resource embedded with the digital identification through a watermark embedding algorithm according to the digital watermark information, the embedding key and the education resource.
10. The system according to any one of claims 6 to 9, wherein the private signature key is generated from a first master key pair of a supervision center node and the unique electronic code of the educational resource, and the public encryption key is generated from a second master key pair of the supervision center node and the unique electronic code of the educational resource.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010970449.6A CN112163191A (en) | 2020-09-15 | 2020-09-15 | Education resource sharing method and system based on national secret block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010970449.6A CN112163191A (en) | 2020-09-15 | 2020-09-15 | Education resource sharing method and system based on national secret block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112163191A true CN112163191A (en) | 2021-01-01 |
Family
ID=73858707
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010970449.6A Pending CN112163191A (en) | 2020-09-15 | 2020-09-15 | Education resource sharing method and system based on national secret block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112163191A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112818379A (en) * | 2021-01-11 | 2021-05-18 | 北京信息科技大学 | Aviation gravity data security access control method and system based on block chain |
CN113392162A (en) * | 2021-07-14 | 2021-09-14 | 上海旺链信息科技有限公司 | Information sharing method, device, equipment and storage medium |
CN113709096A (en) * | 2021-06-24 | 2021-11-26 | 北京农业信息技术研究中心 | Livestock asset management identity authentication method and system |
CN114357534A (en) * | 2022-03-18 | 2022-04-15 | 中科互联科技(广州)有限公司 | Classroom training platform construction method, device, equipment and medium based on block chain |
CN115484104A (en) * | 2022-09-16 | 2022-12-16 | 航天信息股份有限公司 | Ticket data information safety transaction method, device and related equipment |
CN116881949A (en) * | 2023-09-05 | 2023-10-13 | 中国民航信息网络股份有限公司 | Data processing method and system based on block chain |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108462568A (en) * | 2018-02-11 | 2018-08-28 | 西安电子科技大学 | A kind of secure file storage and sharing method based on block chain |
CN108734576A (en) * | 2018-04-04 | 2018-11-02 | 深圳大学 | A kind of shared education resources method and system based on block chain |
CN108768607A (en) * | 2018-05-14 | 2018-11-06 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of voting method, device, equipment and medium based on block chain |
CN109326337A (en) * | 2018-09-06 | 2019-02-12 | 西安电子科技大学 | Electronic medical record storage and shared model and method based on block chain |
CN109377198A (en) * | 2018-12-24 | 2019-02-22 | 上海金融期货信息技术有限公司 | A kind of signing system known together in many ways based on alliance's chain |
US10417219B1 (en) * | 2018-03-28 | 2019-09-17 | Macrogen, Inc. | Data sharing method based on plurality of blockchains |
US20190318067A1 (en) * | 2016-12-07 | 2019-10-17 | Lamark | Method for recording a multimedia content, method for detecting a watermark within a multimedia content, corresponding devices and computer programs |
CN110493220A (en) * | 2019-08-16 | 2019-11-22 | 腾讯科技(深圳)有限公司 | A kind of data sharing method based on block chain, equipment and storage medium |
US20200244440A1 (en) * | 2019-07-18 | 2020-07-30 | Alibaba Group Holding Limited | Blockchain-based data evidence storage method and apparatus |
US20200344069A1 (en) * | 2019-07-11 | 2020-10-29 | Alibaba Group Holding Limited | Shared blockchain data storage |
-
2020
- 2020-09-15 CN CN202010970449.6A patent/CN112163191A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190318067A1 (en) * | 2016-12-07 | 2019-10-17 | Lamark | Method for recording a multimedia content, method for detecting a watermark within a multimedia content, corresponding devices and computer programs |
CN108462568A (en) * | 2018-02-11 | 2018-08-28 | 西安电子科技大学 | A kind of secure file storage and sharing method based on block chain |
US10417219B1 (en) * | 2018-03-28 | 2019-09-17 | Macrogen, Inc. | Data sharing method based on plurality of blockchains |
CN108734576A (en) * | 2018-04-04 | 2018-11-02 | 深圳大学 | A kind of shared education resources method and system based on block chain |
CN108768607A (en) * | 2018-05-14 | 2018-11-06 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of voting method, device, equipment and medium based on block chain |
CN109326337A (en) * | 2018-09-06 | 2019-02-12 | 西安电子科技大学 | Electronic medical record storage and shared model and method based on block chain |
CN109377198A (en) * | 2018-12-24 | 2019-02-22 | 上海金融期货信息技术有限公司 | A kind of signing system known together in many ways based on alliance's chain |
US20200344069A1 (en) * | 2019-07-11 | 2020-10-29 | Alibaba Group Holding Limited | Shared blockchain data storage |
US20200244440A1 (en) * | 2019-07-18 | 2020-07-30 | Alibaba Group Holding Limited | Blockchain-based data evidence storage method and apparatus |
CN110493220A (en) * | 2019-08-16 | 2019-11-22 | 腾讯科技(深圳)有限公司 | A kind of data sharing method based on block chain, equipment and storage medium |
Non-Patent Citations (5)
Title |
---|
付杨等: "基于区块链的视频版权存储架构", 《计算机系统应用》 * |
杨洵等: "基于国密算法的区块链架构", 《计算机系统应用》 * |
梁艳丽、凌捷: "基于区块链的云存储加密数据共享方案", 《计算机工程与应用》 * |
王秀利等: "应用区块链的数据访问控制与共享模型", 《软件学报》 * |
王跃虎: "基于区块链的信息资源共享系统研究", 《图书情报导刊》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112818379A (en) * | 2021-01-11 | 2021-05-18 | 北京信息科技大学 | Aviation gravity data security access control method and system based on block chain |
CN112818379B (en) * | 2021-01-11 | 2023-04-25 | 北京信息科技大学 | Aviation gravity data security access control method and system based on blockchain |
CN113709096A (en) * | 2021-06-24 | 2021-11-26 | 北京农业信息技术研究中心 | Livestock asset management identity authentication method and system |
CN113709096B (en) * | 2021-06-24 | 2023-08-04 | 北京农业信息技术研究中心 | Livestock asset management identity authentication method and system |
CN113392162A (en) * | 2021-07-14 | 2021-09-14 | 上海旺链信息科技有限公司 | Information sharing method, device, equipment and storage medium |
CN113392162B (en) * | 2021-07-14 | 2022-09-23 | 上海旺链信息科技有限公司 | Information sharing method, device, equipment and storage medium |
CN114357534A (en) * | 2022-03-18 | 2022-04-15 | 中科互联科技(广州)有限公司 | Classroom training platform construction method, device, equipment and medium based on block chain |
CN114357534B (en) * | 2022-03-18 | 2022-06-03 | 中科互联科技(广州)有限公司 | Classroom training platform construction method, device, equipment and medium based on block chain |
CN115484104A (en) * | 2022-09-16 | 2022-12-16 | 航天信息股份有限公司 | Ticket data information safety transaction method, device and related equipment |
CN116881949A (en) * | 2023-09-05 | 2023-10-13 | 中国民航信息网络股份有限公司 | Data processing method and system based on block chain |
CN116881949B (en) * | 2023-09-05 | 2023-12-22 | 中国民航信息网络股份有限公司 | Data processing method and system based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112163191A (en) | Education resource sharing method and system based on national secret block chain | |
CN110309634B (en) | Credible advertisement data management system based on block chain | |
CN107682308B (en) | Electronic evidence preservation system based on block chain latent channel technology | |
CN108092982B (en) | Data storage method and system based on alliance chain | |
CN106357396B (en) | Digital signature method and system and quantum key card | |
JP6608256B2 (en) | Electronic data existence certification program and existence certification server | |
CN109409122A (en) | File memory method and its electronic equipment, storage medium | |
CN103107996B (en) | Digital certificate download online method and system, digital certificate are provided platform | |
JP6275302B2 (en) | Existence proof device, existence proof method, and program therefor | |
CN109614802B (en) | Anti-quantum-computation signature method and signature system | |
CN112487778A (en) | Multi-user online signing system and method | |
CN101183439A (en) | Electronic bill processing system and processing method | |
WO2005029292A1 (en) | Server-based digital signature | |
CN108924167B (en) | Block chain-based network question setting and answering method incapable of being tampered | |
CN109560935B (en) | Anti-quantum-computation signature method and signature system based on public asymmetric key pool | |
CN102143178A (en) | Network teaching management system | |
CN112839046A (en) | Traceable anonymous crowdsourcing method and system based on block chain | |
CN109962777A (en) | The key in block catenary system is permitted to generate, obtain the method and apparatus of key | |
CN115345618B (en) | Block chain transaction verification method and system based on mixed quantum digital signature | |
CN114584316A (en) | Decentralized DID identity aggregation verification method and device for Internet of things | |
CN115442047A (en) | Electronic signature method and system for business management file | |
CN108777673A (en) | One kind carrying out Bidirectional identity authentication method in block chain | |
CN117574447B (en) | Data storage evidence and traceability system based on blockchain technology | |
JP2010050608A (en) | Electronic seal embedding method and system | |
CN109462470A (en) | A kind of news release, method of calibration and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210101 |