CN113034138A - Privacy protection method based on block chain - Google Patents

Privacy protection method based on block chain Download PDF

Info

Publication number
CN113034138A
CN113034138A CN202110269073.0A CN202110269073A CN113034138A CN 113034138 A CN113034138 A CN 113034138A CN 202110269073 A CN202110269073 A CN 202110269073A CN 113034138 A CN113034138 A CN 113034138A
Authority
CN
China
Prior art keywords
block chain
node
transaction
data
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110269073.0A
Other languages
Chinese (zh)
Inventor
关涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sany Intelligent Manufacturing Shenzhen Co ltd
Original Assignee
Sany Intelligent Manufacturing Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sany Intelligent Manufacturing Shenzhen Co ltd filed Critical Sany Intelligent Manufacturing Shenzhen Co ltd
Priority to CN202110269073.0A priority Critical patent/CN113034138A/en
Publication of CN113034138A publication Critical patent/CN113034138A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a privacy protection method based on a block chain, which receives inquiry transaction aiming at target privacy data initiated by an inquirer; encrypting the private data by a private key, calculating a HASH value of the private data, packaging the private data after information packaging, information confirmation and block chain consensus, bringing the private data into a block, and storing the private data at the link point of the block in a distributed manner; comparing the HASH value of the applied privacy authentication information with the corresponding HASH value on the block chain, and returning a comparison result; and under the condition that the query condition of the returned comparison result is met, reading target privacy data into the trusted execution environment of the block chain node for decryption so that the inquirer acquires corresponding decrypted data, and performing decrement update on the query quota. The existing privacy authentication mode of the invention needs to pay higher cost, but the privacy authentication authorization cost by adopting the block chain technology is almost ignored, and the penetration type supervision of the block chain system is realized.

Description

Privacy protection method based on block chain
Technical Field
The invention relates to a privacy protection method based on a block chain, and belongs to the technical field of artificial intelligence.
Background
Blockchains are a term of art in information technology. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect. Many public chain transactions exist that are publicly transparent, such as: bitcoin, etherhouse, EOS, etc. Although the public chain transaction account is anonymous, the amount of the transaction is public and transparent due to the initiator and the receiver of each transaction, the specific person of the anonymous account corresponding to the real world can be inquired in an indirect mode by searching the transaction record, and particularly, the traditional privacy authentication information is submitted to a third-party service platform in a clear text, so that privacy leakage is easily caused. Therefore, a privacy protection method based on a block chain is urgently needed to solve the problem existing in the prior art.
In order to solve the technical problems, a new technical scheme is especially provided.
Disclosure of Invention
The present invention is directed to a privacy protection method based on a block chain, so as to solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a privacy protection method based on a blockchain, the method comprising the steps of:
receiving a query transaction aiming at target privacy data initiated by a query party;
encrypting the private data through a private key, calculating a HASH value of the private data, packaging and incorporating the private data into a block after information packaging, information confirmation and block chain consensus are completed, and storing the private data at the link points of the block in a distributed mode;
step three, comparing the HASH value of the applied privacy authentication information with the corresponding HASH value on the block chain, and returning a comparison result;
reading target privacy data into a trusted execution environment of the block chain node for decryption under the condition that a query condition of a returned comparison result is met, so that the inquirer acquires corresponding decrypted data, and performing decrement updating on the query quota;
step five, registering a messagebase account on the application of each connection block chain node; the messagebase is a message address;
and step six, carrying out application message communication between the same block chain nodes or message communication between different block chain nodes by adopting the registered new messagebase, wherein the content of the message communication is provided with a selective uplink chain, so that the evidence is convenient to retain.
Preferably, the first step of auditing the query transaction of the private data after the query transaction, wherein the auditing mode includes:
step 1, the auditing node decrypts and verifies the private transaction Tx-AB, signs the transaction hash value HAB after the verification is passed, and then sends the signature to A;
step 2, the node A encrypts the transaction by using the same AES key in the S1, encrypts the AES key by using the public key of the node B, and sends the encrypted private transaction, the hash value of the transaction and the encrypted AES key to the node B;
step 3, after receiving the privacy transaction Tx-AB, the node B sends confirmation information to the node A;
step 4, the node A broadcasts the hash value of Tx-AB and the signature of the auditing node;
step 5, other nodes directly pack the hash value of the privacy transaction and the signature of the auditing node into a block after receiving the hash value and the signature;
and 6, after receiving the block containing the Tx-AB, the node A and the node B decrypt the transaction, execute the transaction and update the private state.
Preferably, the step four data query condition includes that the query quota has not been exhausted.
Preferably, the information package is a complete data block combined by a data block encrypted by an asymmetric encryption algorithm and the personal signature information.
Compared with the prior art, the invention has the beneficial effects that: the existing privacy authentication mode needs to pay higher cost, but the privacy authentication authorization cost by adopting the block chain technology is almost ignored, and the penetration supervision of the block chain system is realized. The supervision node can monitor the health state of the blockchain system in real time, and audit on private transactions, private data and behaviors of other nodes is achieved.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a technical scheme that: a privacy protection method based on a blockchain, the method comprising the steps of:
receiving a query transaction aiming at target privacy data initiated by a query party;
encrypting the private data through a private key, calculating a HASH value of the private data, packaging and incorporating the private data into a block after information packaging, information confirmation and block chain consensus are completed, and storing the private data at the link points of the block in a distributed mode;
step three, comparing the HASH value of the applied privacy authentication information with the corresponding HASH value on the block chain, and returning a comparison result;
reading target privacy data into a trusted execution environment of the block chain node for decryption under the condition that a query condition of a returned comparison result is met, so that the inquirer acquires corresponding decrypted data, and performing decrement updating on the query quota;
step five, registering a messagebase account on the application of each connection block chain node; the messagebase is a message address;
and step six, carrying out application message communication between the same block chain nodes or message communication between different block chain nodes by adopting the registered new messagebase, wherein the content of the message communication is provided with a selective uplink chain, so that the evidence is convenient to retain.
Preferably, the first step of auditing the query transaction of the private data after the query transaction, wherein the auditing mode includes:
step 1, the auditing node decrypts and verifies the private transaction Tx-AB, signs the transaction hash value HAB after the verification is passed, and then sends the signature to A;
step 2, the node A encrypts the transaction by using the same AES key in the S1, encrypts the AES key by using the public key of the node B, and sends the encrypted private transaction, the hash value of the transaction and the encrypted AES key to the node B;
step 3, after receiving the privacy transaction Tx-AB, the node B sends confirmation information to the node A;
step 4, the node A broadcasts the hash value of Tx-AB and the signature of the auditing node;
step 5, other nodes directly pack the hash value of the privacy transaction and the signature of the auditing node into a block after receiving the hash value and the signature;
and 6, after receiving the block containing the Tx-AB, the node A and the node B decrypt the transaction, execute the transaction and update the private state.
Preferably, the step four data query condition includes that the query quota has not been exhausted.
Preferably, the information package is a complete data block combined by a data block encrypted by an asymmetric encryption algorithm and the personal signature information.
When the system is used, the existing privacy authentication mode needs to pay higher cost, but the privacy authentication authorization cost by adopting the block chain technology is almost ignored, and the penetration supervision of the block chain system is realized. The supervision node can monitor the health state of the blockchain system in real time, and audit on private transactions, private data and behaviors of other nodes is achieved.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (4)

1. A privacy protection method based on a blockchain, the method comprising the steps of:
receiving a query transaction aiming at target privacy data initiated by a query party;
encrypting the private data through a private key, calculating a HASH value of the private data, packaging and incorporating the private data into a block after information packaging, information confirmation and block chain consensus are completed, and storing the private data at the link points of the block in a distributed mode;
step three, comparing the HASH value of the applied privacy authentication information with the corresponding HASH value on the block chain, and returning a comparison result;
reading target privacy data into a trusted execution environment of the block chain node for decryption under the condition that a query condition of a returned comparison result is met, so that the inquirer acquires corresponding decrypted data, and performing decrement updating on the query quota;
step five, registering a messagebase account on the application of each connection block chain node; the messagebase is a message address;
and step six, carrying out application message communication between the same block chain nodes or message communication between different block chain nodes by adopting the registered new messagebase, wherein the content of the message communication is provided with a selective uplink chain, so that the evidence is convenient to retain.
2. The block chain based privacy protection method of claim 1, wherein: and after the transaction is inquired in the first step, auditing of inquiry transaction of private data is carried out, wherein the auditing mode comprises the following steps:
step 1, the auditing node decrypts and verifies the private transaction Tx-AB, signs the transaction hash value HAB after the verification is passed, and then sends the signature to A;
step 2, the node A encrypts the transaction by using the same AES key in the S1, encrypts the AES key by using the public key of the node B, and sends the encrypted private transaction, the hash value of the transaction and the encrypted AES key to the node B;
step 3, after receiving the privacy transaction Tx-AB, the node B sends confirmation information to the node A;
step 4, the node A broadcasts the hash value of Tx-AB and the signature of the auditing node;
step 5, other nodes directly pack the hash value of the privacy transaction and the signature of the auditing node into a block after receiving the hash value and the signature;
and 6, after receiving the block containing the Tx-AB, the node A and the node B decrypt the transaction, execute the transaction and update the private state.
3. The block chain based privacy protection method of claim 1, wherein: the step four data query condition comprises that the query quota is not exhausted.
4. The block chain based privacy protection method of claim 2, wherein: the information packaging is a complete data block formed by combining a data block encrypted by an asymmetric encryption algorithm and personal signature information.
CN202110269073.0A 2021-03-12 2021-03-12 Privacy protection method based on block chain Pending CN113034138A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110269073.0A CN113034138A (en) 2021-03-12 2021-03-12 Privacy protection method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110269073.0A CN113034138A (en) 2021-03-12 2021-03-12 Privacy protection method based on block chain

Publications (1)

Publication Number Publication Date
CN113034138A true CN113034138A (en) 2021-06-25

Family

ID=76470123

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110269073.0A Pending CN113034138A (en) 2021-03-12 2021-03-12 Privacy protection method based on block chain

Country Status (1)

Country Link
CN (1) CN113034138A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598554A (en) * 2022-05-09 2022-06-07 山东省计算中心(国家超级计算济南中心) Method and system for protecting user privacy data in application program
CN115085905A (en) * 2022-07-15 2022-09-20 上汽通用五菱汽车股份有限公司 Transaction data evidence checking method, device, equipment and medium based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472601A (en) * 2018-11-21 2019-03-15 北京蓝石环球区块链科技有限公司 The block chain framework of privacy transaction can be supervised
CN110309663A (en) * 2019-06-25 2019-10-08 湖南搜云网络科技股份有限公司 Privacy authenticating method and system based on block chain
CN110365773A (en) * 2019-07-17 2019-10-22 湖南智慧政务区块链科技有限公司 Information communication method based on block chain message addresses
CN111222157A (en) * 2019-10-30 2020-06-02 支付宝(杭州)信息技术有限公司 Method and device for inquiring block chain private data
CN111475829A (en) * 2019-11-08 2020-07-31 支付宝(杭州)信息技术有限公司 Private data query method and device based on block chain account

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472601A (en) * 2018-11-21 2019-03-15 北京蓝石环球区块链科技有限公司 The block chain framework of privacy transaction can be supervised
CN110309663A (en) * 2019-06-25 2019-10-08 湖南搜云网络科技股份有限公司 Privacy authenticating method and system based on block chain
CN110365773A (en) * 2019-07-17 2019-10-22 湖南智慧政务区块链科技有限公司 Information communication method based on block chain message addresses
CN111222157A (en) * 2019-10-30 2020-06-02 支付宝(杭州)信息技术有限公司 Method and device for inquiring block chain private data
CN111475829A (en) * 2019-11-08 2020-07-31 支付宝(杭州)信息技术有限公司 Private data query method and device based on block chain account

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114598554A (en) * 2022-05-09 2022-06-07 山东省计算中心(国家超级计算济南中心) Method and system for protecting user privacy data in application program
CN115085905A (en) * 2022-07-15 2022-09-20 上汽通用五菱汽车股份有限公司 Transaction data evidence checking method, device, equipment and medium based on block chain

Similar Documents

Publication Publication Date Title
CN113489733B (en) Content center network privacy protection method based on block chain
CN111181720B (en) Service processing method and device based on trusted execution environment
CN107425982B (en) Method and block chain for realizing intelligent contract data encryption
US10491384B2 (en) Device for secure multi-party cryptographic authorization
CN107911216A (en) A kind of block chain transaction method for secret protection and system
CN114499895B (en) Data trusted processing method and system fusing trusted computing and block chain
CN103107995B (en) A kind of cloud computing environment date safety storing system and method
Li et al. Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage
CN113988863B (en) Supervision-capable online payment privacy protection method and device and electronic equipment
CN109561110B (en) Cloud platform audit log protection method based on SGX
US20110161671A1 (en) System and method for securing data
US9215070B2 (en) Method for the cryptographic protection of an application
CN114866323B (en) User-controllable privacy data authorization sharing system and method
CN111274599A (en) Data sharing method based on block chain and related device
US20230362002A1 (en) Systems and methods for block data security for digital communications from a physical device
CN102299793A (en) Certificate authentication system based on trusted computing password support platform
CN113034138A (en) Privacy protection method based on block chain
US11783091B2 (en) Executing entity-specific cryptographic code in a cryptographic coprocessor
CN111159257A (en) Tax certification query method and system based on block chain
Kroll et al. Secure protocols for accountable warrant execution
CN109995715A (en) Private data encipher-decipher method, device, equipment and the storage medium of block chain
CN111327419A (en) Method and system for resisting quantum computation block chain based on secret sharing
CN114866289B (en) Privacy credit data security protection method based on alliance chain
CN112364370B (en) Privacy protection cloud auditing method based on block chain
CN113326529A (en) Decentralized architecture unifying method based on trusted computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210625