CN113112354A - Transaction processing method of block chain network, block chain network and storage medium - Google Patents

Transaction processing method of block chain network, block chain network and storage medium Download PDF

Info

Publication number
CN113112354A
CN113112354A CN202110242133.XA CN202110242133A CN113112354A CN 113112354 A CN113112354 A CN 113112354A CN 202110242133 A CN202110242133 A CN 202110242133A CN 113112354 A CN113112354 A CN 113112354A
Authority
CN
China
Prior art keywords
data
information
node
keyword
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110242133.XA
Other languages
Chinese (zh)
Inventor
向舜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Original Assignee
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuo Erzhi Lian Wuhan Research Institute Co Ltd filed Critical Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority to CN202110242133.XA priority Critical patent/CN113112354A/en
Publication of CN113112354A publication Critical patent/CN113112354A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2471Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Medical Informatics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Development Economics (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computational Linguistics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention discloses a transaction processing method of a block chain network, which comprises the following steps: receiving an information storage proposal from a client, wherein the information storage proposal indicates that information to be stored is confidential information; executing an intelligent contract to obtain first data based on the information storage proposal; carrying out privacy processing on the first data to obtain second data; verifying the validity of the first data; if the first data passes validity verification, storing the first data into a privacy database, and storing the second data into an account book database; the data of the account book database is used for all nodes on the block chain network to inquire, and the data of the privacy database is used for authorized nodes on the block chain network to be granted with inquiry authority to inquire.

Description

Transaction processing method of block chain network, block chain network and storage medium
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a transaction processing method for a blockchain network, and a storage medium.
Background
At present, in a block chain technical scheme based on a hyper-ledger (hyper-ledger) book, through procedures of endorsement, sorting, confirmation and the like, rapid synchronization of data in a block chain can be realized, so that consistency of the data is ensured, and the data is not tampered, that is, all data change operations are recorded by a log system of the hyper-ledger book.
However, in this solution, information is stored at block link points and transmitted between nodes in a plaintext form, which makes it unsuitable for storing information that needs to be kept secret.
Disclosure of Invention
In view of the above, embodiments of the present invention are directed to a transaction processing method for a blockchain network, a blockchain network and a storage medium.
In a first aspect, an embodiment of the present invention provides a transaction processing method for a blockchain network, where the method includes:
receiving an information storage proposal from a client, wherein the information storage proposal indicates that information to be stored is confidential information;
executing an intelligent contract to obtain first data based on the information storage proposal;
carrying out privacy processing on the first data to obtain second data;
verifying the validity of the first data;
if the first data passes validity verification, storing the first data into a privacy database, and storing the second data into an account book database;
the data of the account book database is used for all nodes on the block chain network to inquire, and the data of the privacy database is used for authorized nodes on the block chain network to be granted with inquiry authority to inquire.
In the foregoing solution, the first data includes: a first keyword and target information stored in correspondence with the first keyword, the second data including: a second keyword and encryption information corresponding to the second keyword; the encrypted information is information after the target information is private, and the second keyword and the first keyword meet a preset corresponding relationship.
In the above scheme, the encrypted information is information obtained by performing hash processing on the target information.
In the foregoing solution, the executing an intelligent contract to obtain first data based on the information storage proposal includes:
and executing the intelligent contract to obtain first data based on the information storage proposal through at least one authorization node meeting preset conditions.
In the foregoing solution, the authorized node that meets the preset condition includes at least one of the following:
the authorization nodes meet the preset number of node permission levels;
and randomly selecting the preset number of the authorization nodes.
In a second aspect, an embodiment of the present invention provides a transaction processing method for a blockchain network, where the method includes:
receiving an information query proposal from a client;
executing an intelligent contract to obtain third data based on the information query proposal;
based on the third data, reading first data from a privacy database and reading second data from an account book database respectively;
privacy processing is carried out on the first data to obtain fourth data;
and comparing the second data with the fourth data, and if the comparison result is a first state value, returning the first data to the client, wherein the first state value indicates that the second data and the fourth data meet the data consistency requirement.
In the foregoing solution, the third data includes: a third keyword;
the reading of the first data from the privacy database and the reading of the second data from the ledger database, respectively, based on the third data, includes:
reading target information corresponding to the first keyword successfully matched with the third keyword from a privacy database based on the matching of the third keyword and the first keyword;
and reading the encrypted information corresponding to the second keyword successfully matched with the fourth keyword from the account book database based on the matching of the fourth keyword and the second keyword.
In a third aspect, an embodiment of the present invention provides a blockchain network, including: an endorsement node and a verification node, wherein,
the endorsement node is used for receiving an information storage proposal from a client, wherein the information storage proposal indicates that the information to be stored is confidential information;
the endorsement node is used for executing an intelligent contract to obtain first data based on the information storage proposal;
the endorsement node is also used for carrying out privacy processing on the first data to obtain second data;
the verification node is used for verifying the validity of the first data;
the verification node is further configured to store the first data in a privacy database and store the second data in an account book database if the first data passes validity verification;
the data of the account book database is used for all nodes on the block chain network to inquire, and the data of the privacy database is used for authorized nodes on the block chain network to be granted with inquiry authority to inquire.
In a fourth aspect, an embodiment of the present invention provides a blockchain network, including: an endorsement node and a verification node, wherein,
the endorsement node is used for receiving an information query proposal from a client;
the endorsement node is also used for executing an intelligent contract to obtain third data based on the information query proposal;
the verification node is used for respectively reading first data from a privacy database and second data from an account book database based on the third data;
the endorsement node is further used for carrying out privacy processing on the first data to obtain fourth data;
the endorsement node is further configured to compare the second data with the fourth data, and return the first data to the client if a comparison result is a first state value, where the first state value indicates that the second data and the fourth data meet a data consistency requirement.
In a fifth aspect, an embodiment of the present invention provides a computer storage medium, where a computer program is stored, and the computer program is executed to implement any one of the methods provided above.
According to the embodiment of the invention, for the confidential information to be stored in the block chain network, based on an information storage proposal, plaintext information (namely, first data) obtained by executing an intelligent contract is stored in a privacy database, and corresponding ciphertext information (namely, second data) is stored in an account database, wherein the plaintext information of the privacy database is only inquired by an authorized node which is granted with an inquiry authority on the block chain network, so that the control on the node which can inquire the confidential information in the block chain network is realized, and the privacy requirement of the stored information in the block chain network is protected to the greatest extent.
Drawings
Fig. 1 is a flowchart illustrating a transaction processing method of a first blockchain network according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a transaction processing method of a second blockchain network according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a transaction processing device of a blockchain network according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating a transaction processing method of a third blockchain network according to an embodiment of the present invention.
Detailed Description
The technical solution of the present invention is further described in detail with reference to the drawings and the specific embodiments of the specification.
As shown in fig. 1, a transaction processing method of a blockchain network according to an embodiment of the present invention includes:
step S101: receiving an information storage proposal from a client, wherein the information storage proposal indicates that information to be stored is confidential information;
step S102: executing an intelligent contract to obtain first data based on the information storage proposal;
step S103: carrying out privacy processing on the first data to obtain second data;
step S104: verifying the validity of the first data;
step S105: if the first data passes validity verification, storing the first data into a privacy database, and storing the second data into an account book database;
the data of the account book database is used for all nodes on the block chain network to inquire, and the data of the privacy database is used for authorized nodes on the block chain network to be granted with inquiry authority to inquire.
In the above step S101, an information storage proposal indicating that information to be stored is confidential information is received from the client.
In this embodiment, the client constructs an information storage proposal according to an information storage request of a user, and sends the information storage proposal to the endorsement node, and the endorsement node receives the information storage proposal.
Specifically, when the client constructs the information storage proposal according to the information storage request of the user, firstly, the client receives the information storage request of the user, wherein the information storage request comprises: the information processing method comprises information to be stored and a first secret instruction, wherein the first secret instruction is used for indicating whether the information to be stored is secret information or not. For example, the information to be stored may be library book collection information, and the corresponding first privacy indication indicates that the information to be stored is public information; the information to be stored can be personal tax payment information, and the corresponding first secret indication indicates that the information to be stored is secret information; the information to be stored may be copyright information, the corresponding first security indication indicates that the information to be stored is security information, and so on.
Then, the client constructs an information storage proposal according to the information storage request. The information storage proposal comprises: the method comprises the following steps of obtaining information to be stored, relevant information of the intelligent contract related to the stored information, a client signature and the like, wherein the relevant information of the intelligent contract comprises: intelligent contract identification and contract method, etc.
And finally, the client sends the information storage proposal to at least one preset endorsement node.
In this embodiment, the endorsement node is a node in the blockchain network that undertakes the endorsement task, and the endorsement node performs transaction information verification for blockchain transactions, and declares that the transaction is legal for the transaction that passes the verification.
In one embodiment, the client sends the information storage proposal to at least one preset endorsement node according to the first security indication. For example, if the first privacy indication indicates that the information to be stored is secret information, the client sends the information storage proposal to at least one preset endorsement node, wherein the endorsement node is an authorized node granted with the query authority, so that only the authorized node granted with the query authority can receive the information storage proposal; and if the first security indication indicates that the information to be stored is public information, the client sends the information storage proposal to at least one preset endorsement node, and no requirement is made on whether the endorsement node is an authorized node.
In one embodiment, a system administrator of the blockchain network may grant node query authority, and the node granted the query authority is an authorized node.
In another embodiment, the first security indication is further used for indicating a security level, and the system administrator of the blockchain network further sets a query level authority for the authorized node, so that the authorized node has different query level authorities, and the authorized nodes with different query level authorities can query the security information with the preset corresponding security level. And when the first security indication indicates that the information to be stored is the security information, the client side sends the information storage proposal to at least one preset authorization node with corresponding query level authority according to the security level indicated by the first security indication.
For example, the privacy levels include: class I (secret), class II (secret), class III (internal disclosure), query level permissions include: the method comprises the steps of high-level, medium-level and common, wherein the authorization node with the inquiry level authority as the high level can inquire all the confidential information with the confidentiality levels (I level, II level and III level), the authorization node with the inquiry level authority as the medium level can inquire the confidential information with the confidentiality levels II level and III level, and the authorization node with the inquiry level authority as the common authorization node can inquire the confidential information with the confidentiality level III level.
In the step S102, based on the information storage proposal, the intelligent contract is executed to obtain the first data.
In this embodiment, after receiving the information storage proposal, the endorsement node verifies the client signature, that is, verifies whether the client signature is a legal signature, and if the client signature is a legal signature, the verification is passed.
And after the verification is passed, calling the intelligent contract, inputting the information to be stored as the parameter of the intelligent contract, and executing the intelligent contract to obtain first data.
The intelligent contracts, also called chain codes or application codes, are programs deployed in the nodes of the blockchain network, which carry business logic for performing transactions. For example, an intelligent contract for completing information storage carries business logic for performing information storage; the intelligent contract used for completing the information inquiry carries the service logic for executing the information inquiry.
For example, taking information to be stored as copyright information as an example, an execution process of the intelligent contract is described:
first, it is assumed that copyright information to be stored includes: work name, work category, work right, in this example, work name "spring", work category "art", work right "tension";
then, an intelligent contract for storing copyright information is invoked, in the form of "work name: "spring", the product category: "Art", title of work: "open a star". The intelligent contract is input as the parameter of the intelligent contract, carries out the intelligent contract, obtains first data: key: DP 000001; value: { product name: "spring", the product category: "Art", title of work: "open x" }.
And finally, the endorsement node applies an endorsement signature to the first data and sends the endorsement signature to a first sequencing node, and the first sequencing node sequences the received first data, packages the ordered first data into blocks and sends the blocks to the verification node.
For another example, taking the information to be stored as the transaction information, the execution process of the intelligent contract is described as follows:
first, the information to be stored includes: payer, payment amount, in this example, "wang x", payment amount "50", default units are: element;
then, calling an intelligent contract for storing transaction information, inputting parameters of the intelligent contract by taking a payer as 'wang', a payment amount as '50', and executing the intelligent contract, wherein the current balance read by the intelligent contract is '5050', and the default unit is: and calculating to update the current balance to "5000", thereby obtaining first data as: key: AB 000058; value: { payer: "wang x", balance: "5000"}.
And finally, the endorsement node applies an endorsement signature to the first data and sends the endorsement signature to a first sequencing node, and the first sequencing node sequences the received first data, packages the ordered first data into blocks and sends the blocks to the verification node.
In step S103, the first data is subjected to privacy processing to obtain second data.
In this embodiment, the endorsement node performs privacy processing on the first data to obtain second data.
The data privacy processing may include various processing of the first data to obtain second data that cannot directly obtain the original meaning of the first data.
Data privacy processing herein includes, but is not limited to: data encryption processing is carried out by using a data encryption algorithm; and/or data signature processing using a data signature algorithm.
Here, the privacy processing on the first data may be: the first data is processed using a symmetric encryption algorithm (e.g., DES, 3DES, DESX, Blowfish, IDEA, RC4, RC5, RC6, AES, etc.), an asymmetric encryption algorithm (e.g., RSA, Diffie-Hellman, El Gamal, etc.), or a hash algorithm (e.g., MD2, MD4, MD5, HAVAL, SHA-1, HMAC-MD5, HMAC-SHA1, etc.), etc.
And after the endorsement node carries out privacy processing on the first data and obtains second data, the second data are sent to a second sequencing node.
In the above step S104, the validity of the first data is verified.
In this embodiment, the verifying node performs validity verification on the received first data or the block including the first data, and if the block passes the validity verification, the verifying node sends validity verification passing information to the second sorting node to instruct the second sorting node to send second data corresponding to the first data, for example, a keyword of the first data and a keyword of the second data satisfy a preset corresponding relationship.
Here, the validity verification includes: VSCC (Validation of transaction processing) Validation and MVCC (Multi-Version Concurrency Control) Validation. The VSCC verifies that a corresponding endorsement policy is found according to an intelligent contract in the information storage proposal, and verifies whether an endorsement signature of the information storage proposal is in accordance with the endorsement policy; the MVCC verifies whether the version number of the read-write set (i.e., the first data) is inconsistent with the version number stored in the local state database, and if not, it indicates that the proposal before the information storage proposal has changed data, and the information storage proposal is invalid.
In an embodiment, if the time length of the second data stored in the second sorting node exceeds the preset time length threshold, the second sorting node deletes the second data, so as to prevent the second data from being retained in the second sorting node for a long time when the first data corresponding to the second data is invalid data, which may cause resource waste or even congestion.
In the step S105, if the first data passes validity verification, storing the first data in a privacy database, and storing the second data in an account book database;
here, the data of the ledger database is used for all nodes on the blockchain network to query, and the data of the privacy database is used for authorized nodes on the blockchain network to be granted with query authority to query.
In this embodiment, if the first data passes validity verification, the verification node stores the first data in the privacy database; meanwhile, after the verification node receives the second data or the block including the second data sent by the second sequencing node, the verification node stores the second data to the account book database.
In this embodiment, after the first data passes validity verification, the verification node instructs the second sorting node to send the second data, and stores the second data in the ledger database, so as to ensure consistency between the information stored in the privacy database and the information stored in the ledger database, that is, while the privacy database stores the first data, the ledger database stores the second data corresponding to the first data.
In one embodiment, the first sequencing node comprises a plurality of nodes.
In one embodiment, the second sort node comprises a plurality of nodes.
According to the embodiment of the invention, for the information storage proposal indicating that the information to be stored is confidential information, the plaintext information (namely, first data) obtained by executing the intelligent contract is stored in the privacy database, the ciphertext information (namely, second data) obtained by performing the privacy processing on the first data is stored in the book database, and the information stored in the privacy database can only be inquired by the authorization node granted with the inquiry authority on the blockchain network, so that the active control on the inquired object of the stored information on the blockchain network can be realized, and the privacy of the stored information is protected to the greatest extent.
In one embodiment, the first data includes: a first keyword and target information stored in correspondence with the first keyword, the second data including: a second keyword and encryption information corresponding to the second keyword; the encrypted information is information after the target information is private, and the second keyword and the first keyword meet a preset corresponding relationship.
Here, the encrypted information may be information determined after processing the target information using a symmetric encryption algorithm (e.g., DES, 3DES, DESX, Blowfish, IDEA, RC4, RC5, RC6, AES, etc.), an asymmetric encryption algorithm (e.g., RSA, Diffie-Hellman, El Gamal, etc.), a hash algorithm (e.g., MD2, MD4, MD5, HAVAL, SHA-1, HMAC-MD5, HMAC-SHA1, etc.), or the like.
In the following, some specific examples are listed for the first data and the second data to illustrate the association between the two:
for example, if the first data includes: the first keyword a1 and the target information K1, that is, the first data can be represented as (a1, K1), and the target information K1 is processed by using the MD2 algorithm to obtain L1, and the second data is represented as (a1, L1), where the first keyword and the second keyword are the same, and the encrypted information is obtained by performing MD2 encryption on the target information.
For another example, if the first data includes: the first keyword a2 and the target information K2, that is, the first data may be represented as (a2, K2), the first keyword a2 is shifted to the left by 1 bit to obtain B2, and the MD5 algorithm is used to process the target information K2 to obtain L2, and the second data is (B2, L2), where the second keyword and the first keyword satisfy a preset corresponding relationship, the preset corresponding relationship is shifted to the left by 1 bit, and the encrypted information is obtained by MD5 encryption of the target information.
It will be appreciated that the preset correspondence may also be a correspondence based on other reversible operations, i.e. the second key may be determined by the first key performing the reversible operation, e.g. addition, subtraction, shifting, etc. Here, a reversible operation is used to enable a bidirectional transformation between the first key and the second key.
In another embodiment, the first data includes: the method comprises the following steps of storing a first keyword and target information corresponding to the first keyword, wherein the target information comprises: a plurality of target sub-information; the second data includes: a second keyword and encryption information corresponding to the second keyword, the encryption information including: a plurality of encrypted sub-information; each piece of encrypted sub-information is information after one piece of target information is private, and the second keyword and the first keyword meet a preset corresponding relationship.
For example, if the first data includes: the keyword A3, the first target sub information K3, and the second target sub information M3, that is, the first data is represented as (A3, K3, M3), the target information K3 is processed by using the IDEA algorithm to obtain L3, and the target information M3 is processed by using the MD5 algorithm to obtain N3, and then the second data is represented as (B2, L3, N2).
In one embodiment, the encryption information is information obtained by performing hash processing on the target information.
Specifically, the target information is processed through a hash algorithm to obtain encrypted information.
In one embodiment, said executing the smart contract based on the information storage proposal to obtain the first data comprises:
and executing the intelligent contract to obtain first data based on the information storage proposal through at least one authorization node meeting preset conditions.
Here, the authorized node satisfying the preset condition includes at least one of:
the authorization nodes meet the preset number of node permission levels; for example, N authorization nodes with a high level of query level, which can query all security levels (I, II, and III), are selected, and N is a positive integer.
Randomly selecting the preset number of authorization nodes; for example, N authorization nodes are randomly selected, where N is a positive integer.
As shown in fig. 2, another transaction processing method of a blockchain network according to an embodiment of the present invention includes:
step S201: receiving an information query proposal from a client;
step S202: executing an intelligent contract to obtain third data based on the information query proposal;
step S203: based on the third data, reading first data from a privacy database and reading second data from an account book database respectively;
step S204: privacy processing is carried out on the first data to obtain fourth data;
step S205: and comparing the second data with the fourth data, and if the comparison result is a first state value, returning the first data to the client, wherein the first state value indicates that the second data and the fourth data meet the data consistency requirement.
In step S201, an information storage proposal from the client is received.
In this embodiment, the client constructs an information query proposal according to an information query request of a user, and sends the information query proposal to the endorsement node, and the endorsement node receives the information query proposal.
Specifically, when the client constructs the information query proposal according to the information query request of the user, firstly, the client receives the information query request of the user, where the information query request includes: the information query device comprises information to be queried and a second secret indication, wherein the second secret indication is used for indicating whether the information to be queried is secret information or not. For example, the information to be queried may be library book collection information, and the corresponding second privacy indication indicates that the information to be queried is public information; the information to be inquired can be personal tax payment information, and the corresponding second secret indication indicates that the information to be inquired is secret information; the information to be queried may be copyright information, the corresponding second privacy indication indicates that the information to be queried is privacy information, and so on.
Then, the client constructs an information query proposal according to the information query request. The information inquiry proposal comprises the following steps: the method comprises the following steps of obtaining information to be queried, related information of an intelligent contract related to the information to be queried, client signature and the like, wherein the related information of the intelligent contract comprises: intelligent contract identification and contract method, etc.
And finally, the client sends the information query proposal to at least one preset endorsement node.
In one embodiment, the client sends the information query proposal to at least one preset endorsement node according to the second security instruction. For example, if the second privacy indication indicates that the information to be queried is secret information, the client sends the information query proposal to at least one preset endorsement node, wherein the endorsement node is an authorized node granted with query authority, so that only the authorized node granted with the query authority can receive the information query proposal; and if the second privacy indication indicates that the information to be inquired is public information, the client side sends the information inquiry proposal to at least one preset endorsement node, and no requirement is made on whether the endorsement node is an authorized node.
In another embodiment, the second security indication is further used for indicating a security level, the authorized nodes have different query level authorities, and the authorized nodes with different query level authorities can query the security information with preset corresponding security levels. And when the second secret indication indicates that the information to be inquired is secret information, the client sends the information inquiry proposal to at least one preset authorization node with corresponding inquiry level authority according to the secret level indicated by the second secret indication.
For example, the privacy levels include: class I (secret), class II (secret), class III (internal disclosure), query level permissions include: the method comprises the steps of high-level, medium-level and common, wherein the authorization node with the inquiry level authority as the high level can inquire all the confidential information with the confidentiality levels (I level, II level and III level), the authorization node with the inquiry level authority as the medium level can inquire the confidential information with the confidentiality levels II level and III level, and the authorization node with the inquiry level authority as the common authorization node can inquire the confidential information with the confidentiality level III level.
In the step S202, based on the information query proposal, an intelligent contract is executed to obtain third data.
In this embodiment, after receiving the information query proposal, the endorsement node verifies the client signature, that is, verifies whether the client signature is a legal signature, and if the client signature is a legal signature, the verification is passed.
And after the verification is passed, calling the intelligent contract, inputting the information to be inquired as the parameter of the intelligent contract, and executing the intelligent contract to obtain third data.
The intelligent contracts, also called chain codes or application codes, are programs deployed in the nodes of the blockchain network, which carry business logic for performing transactions. For example, an intelligent contract for completing information storage carries business logic for performing information storage; the intelligent contract used for completing the information inquiry carries the service logic for executing the information inquiry.
Here, taking the query of one piece of copyright information as an example, the execution process of the intelligent contract is explained as follows:
first, the information to be queried may be at least one of a key and/or an information value. For example, the information to be queried is only the keyword "key: DP000001 "; the information to be queried is an information value' value: name of the work: "spring"; the information to be queried is a plurality of information values' value: name of the work: "spring"; the information to be inquired is a combination of keywords and information values, namely' key: DP000001 "and information value" value: name of the work: "spring", the product category: "Art", title of work: "open star" ".
Then, an intelligent contract for querying copyright information is called, for example, the information to be queried is taken as a keyword "key: the DP000001 "is input as a parameter of the intelligent contract, and executes the intelligent contract, and obtains third data as: key: "key: DP000001 "; value: a preset value.
And finally, the endorsement node applies the endorsement signature to the third data and sends the third data to the verification node.
In this embodiment, the verification node performs validity verification on the received third data.
Here, the validity verification includes: VSCC (Validation of transaction processing) Validation and MVCC (Multi-Version Concurrency Control) Validation. The VSCC verifies that a corresponding endorsement policy is found according to an intelligent contract in the information storage proposal, and verifies whether an endorsement signature of the information storage proposal is in accordance with the endorsement policy; the MVCC verifies whether the version number of the read-write set (i.e., the first data) is inconsistent with the version number stored in the local state database, and if not, it indicates that the proposal before the information storage proposal has changed data, and the information storage proposal is invalid.
In the above step S203, based on the third data, the first data is read from the privacy database, and the second data is read from the ledger database, respectively.
In this embodiment, if the third data passes validity verification, the verification node reads the first data from the privacy database and the second data from the ledger database, respectively, based on the third data.
Specifically, the verification node takes all or part of the information of the third data as a keyword, performs matching in the privacy database, and takes the information/record meeting the first preset matching requirement as the first data. Here, satisfying the first preset matching requirement may be: obtaining a matching probability by adopting a calculation method based on the similarity of the character strings, wherein the matching probability is greater than a first preset probability threshold; the method for calculating the similarity of the character strings comprises the following steps: levenshtein distance, affinity gap distance, Jaro distance, Q-gram distance, and the like.
And the verification node takes all or part of the information of the third data as a keyword, matches the keyword in the account book database, and takes the record meeting the second preset matching requirement as the second data. Here, satisfying the second preset matching requirement may be: obtaining a matching probability by adopting a calculation method based on the similarity of the character strings, wherein the matching probability is greater than a second preset probability threshold; the method for calculating the similarity of the character strings comprises the following steps: levenshtein distance, affinity gap distance, Jaro distance, Q-gram distance, and the like.
In this embodiment, the first preset matching requirement and the second preset matching requirement may be the same or different.
In one embodiment, the verification node takes all or part of information of fifth data as a keyword, performs matching in a privacy database, and takes a record meeting a first preset matching requirement as the first data, wherein the fifth data and the third data meet a preset corresponding relationship. Correspondingly, in the encrypted information query process, the third data is processed according to the preset corresponding relation to obtain fifth data, and then the fifth data is used for carrying out information query.
In the step S204, performing privacy processing on the first data to obtain fourth data;
in this embodiment, the verification node performs privacy processing on the first data according to a preset encryption algorithm, where the preset encryption algorithm is the same as an encryption algorithm used when the information is stored in the ledger database.
In one embodiment, the first data includes: processing the first key word and the target information stored corresponding to the first key word by using a symmetric encryption algorithm (such as DES, 3DES, DESX, Blowfish, IDEA, RC4, RC5, RC6, AES and the like), an asymmetric encryption algorithm (such as RSA, Diffie-Hellman, El Gamal and the like) or a hash algorithm (such as MD2, MD4, MD5, HAVAL, SHA-1, HMAC-MD5, HMAC-SHA1 and the like) to obtain encrypted information, and determining a fourth key word according to the first key word according to a preset corresponding relation, so that the fourth data comprises: a fourth key and encryption information.
In the step S205, the second data and the fourth data are compared, and if the comparison result is a first state value, the first data is returned to the client, where the first state value indicates that the second data and the fourth data meet the data consistency requirement.
In this embodiment, comparing the second data and the fourth data includes: and comparing preset fields of the second data and the fourth data, and setting a comparison result as a first state value if the preset fields meet the requirement of consistency so as to indicate that the second data and the fourth data meet the requirement of data consistency.
Specifically, it is assumed that the second data includes: keyword 1 and target information 1, the fourth data comprising: keyword 2 and target information 2, the preset field includes: keywords and target information. Then, comparing the second data with the fourth data includes: and comparing the keyword 1 with the keyword 2, comparing the target information 1 with the target information 2, and setting the comparison result as a first state value if the matching similarity of the keyword 1 and the target information 2 is higher than the corresponding preset consistency threshold.
As shown in fig. 3, an embodiment of the present invention further provides a blockchain network, including: an endorsement node 10 and an authentication node 20, wherein,
the endorsement node 10 is configured to receive an information storage proposal from a client, where the information storage proposal indicates that information to be stored is confidential information;
the endorsement node 10 is configured to execute an intelligent contract to obtain first data based on the information storage proposal;
the endorsement node 10 is further configured to perform privacy processing on the first data to obtain second data;
the verification node 20 is configured to verify validity of the first data;
the verification node 20 is further configured to store the first data in a privacy database and store the second data in an account book database if the first data passes validity verification;
the data of the account book database is used for all nodes on the block chain network to inquire, and the data of the privacy database is used for authorized nodes on the block chain network to be granted with inquiry authority to inquire.
The endorsement node 10 is specifically configured to: and executing the intelligent contract to obtain first data based on the information storage proposal through at least one authorization node meeting preset conditions.
With continued reference to fig. 3, an embodiment of the present invention further provides a blockchain network, including: an endorsement node 10 and an authentication node 20, wherein,
the endorsement node 10 is configured to receive an information query proposal from a client;
the endorsement node 10 is further configured to execute an intelligent contract to obtain third data based on the information query proposal;
the verification node 20 is configured to read the first data from the privacy database and the second data from the ledger database, respectively, based on the third data;
the endorsement node 10 is further configured to perform privacy processing on the first data to obtain fourth data;
the endorsement node 10 is further configured to compare the second data with the fourth data, and if a comparison result is a first state value, return the first data to the client, where the first state value indicates that the second data and the fourth data meet a data consistency requirement.
In one embodiment, the third data comprises: a third keyword;
the verification node 20 is further specifically configured to:
reading target information corresponding to the first keyword successfully matched with the third keyword from a privacy database based on the matching of the third keyword and the first keyword;
and reading the encrypted information corresponding to the second keyword successfully matched with the fourth keyword from the account book database based on the matching of the fourth keyword and the second keyword.
The embodiment of the invention also provides a computer storage medium, and the computer storage medium stores computer executable instructions; the computer-executable instructions, when executed by the processor, can implement the transaction processing method for the blockchain network provided by one or more of the foregoing technical solutions.
The computer storage medium may be: a storage medium such as a removable storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and various media capable of storing program codes may be selected as a non-transitory storage medium.
As shown in fig. 4, a transaction processing method of a blockchain network according to an embodiment of the present invention is described as follows:
according to the scheme, a copyright protection system is constructed on the basis of a bottom layer authentication technology and a data storage technology provided by a super account book block chain system, the system has the functions of user registration, copyright information uploading registration, inquiry and the like, and the copyright information can be efficiently and safely stored and managed.
When the super book block chain system stores data, all data related adding, modifying and deleting operations are converted into 'transactions' in the system, all transactions need to pass through the processes of client proposal, endorsement of endorsement nodes, sequencing of sequencing nodes and confirmation of verification nodes, and then all nodes synchronously change the data.
The scheme is improved and constructed based on the existing super ledger block chain system, and the process of registering or changing the copyright information of the super ledger block chain system is as follows:
s1: receiving and processing an information processing request;
taking the super ledger block chain system for storing digital version information as an example, when a user of the digital copyright system has a request for copyright information registration, copyright information change, or copyright information query, a request is sent to the super ledger block chain system through a client (constructed by sdk of the super ledger). The client end will convert the request into a transaction proposal, and the transaction proposal sends the information such as contract identification, contract method and parameter information, client end signature and the like to be called in the transaction to an endorsement (Endorser) node. For example: if a client wants to register a copyright in the system, the transaction comprises calling a copyright registration contract (all intelligent contracts are deployed in the super ledger system in advance), parameters are id and content information of the copyright to be registered, and whether the copyright information is disclosed in the system or not can be selected.
S2: carrying out endorsement;
if the client performs copyright registration or change operation, when the client selects the public copyright, the data is stored according to the data endorsement, confirmation and data submission operation of the prior art of the super ledger, and the ledger database of each node can check the plaintext data of the copyright content in the mode.
When the client chooses not to open the copyright (i.e. the information storage proposal indicates that the information to be stored is confidential information), an improved storage method of the scheme is adopted, which depends on: firstly, a privacy database is added on the basis of an existing state database (storing a corresponding relation between a read-write set and a world state version number) of a super account book and an account book database (storing a read-write set in a current state), wherein the privacy database is similar to the account book database in data structure and is also constructed on the basis of a levelDB; second, among all nodes of the superbugt blockchain system, a node (i.e., an authorized node) having authority to view plaintext data is selected as an endorsement node for the transaction, and a plurality of nodes are randomly selected from the endorsement nodes as verification nodes (at least one), where the authorized node is usually the highest authority management node, for example, a user creating a digital rights system may be set as a manager.
Specifically, the endorsement process of the improved storage method in the scheme is as follows:
first, after receiving a transaction proposal, the endorsement node performs a simulated transaction to obtain a transaction read-write set (i.e., first data).
Then, hash operations are performed on the kv values of the read-write set to obtain an encrypted read-write set (i.e., second data).
And finally, caching the read-write set plaintext by the endorsement node, sending the read-write set plaintext to the first sequencing node, and sending the encrypted read-write set to the second sequencing node.
S3: confirming the transaction;
and the first sequencing node sequences the read-write set plaintext generated by the endorsement node, packages the ordered read-write set plaintext into blocks after sequencing according to the sequence of the transaction time, and sends the blocks to the selected verification node.
VSCC verification and MVCC verification are needed to be carried out on the verification node, the VSCC verification finds out a corresponding endorsement strategy according to the contract ID in the proposal, and whether the endorsement signature of the proposal is in accordance with the endorsement strategy is verified; the MVCC verifies that whether the version number of the read-write set is inconsistent with the version number stored in the local state database or not, if the version number of the read-write set is inconsistent with the version number stored in the local state database, the fact that the transaction before the transaction changes data is indicated, and the transaction is invalid.
Here, MVCC verification is explained with a specific example: all data are accessed by kv key value pairs, the version number corresponding to k1 is v1 and is expressed as < k1, v1>, two transactions are submitted simultaneously, after the transactions are simulated, the values are v2 and v3 respectively, the endorsement node generates two read-write sets < k1, v1> < k1, v2>, < k1, v1> < k1, v3>, and if the first transaction is confirmed first, the world state version number corresponding to k1 is changed into v 2; the second transaction operates on the basis of k1, v1, and the reading set version number v1 of the second transaction is not equal to the existing world state version number v2, so the second transaction is invalid. This operation is to prevent data collision, for example, the number of one account is 1, two transactions are added with 1 and 2 respectively for the account, and are submitted simultaneously, the simulated transactions are all operated with the current version data, the simulation obtained by the endorsement node is 2 and 3, the first one is executed first, the account number is changed into 2, if the second transaction is confirmed directly, the account number is 3, obviously not according with logic, because the version number of the second operation is not the current data state, the second operation can only be regarded as invalid operation, and the second transaction is returned.
The verification process needs to use the read-write set plaintext in the cache for judgment, the read-write set plaintext is sent to the verification node after verification is passed, and validity verification passing information is sent to the second sequencing node to indicate the second sequencing node to send second data corresponding to the first data to the verification node; if the verification fails, the transaction is invalid and transaction invalid information is directly returned to the client.
S4: storing data;
the verification node stores the encrypted read-write set in an account book database, and confirms block information packaged by the sequencing node, wherein the information of the account book database is synchronous at all nodes; and simultaneously, storing the read-write set in a clear text in a privacy database.
Obviously, the scheme of the application can only check the cached plaintext data when simulating the transaction and verifying the transaction. Correspondingly, after the plaintext storage of the read-write set is completed, the intelligent contract is called to delete all the plaintext read-write sets cached by the endorsement nodes and the verification nodes.
S5: querying data;
the above-mentioned S1-S4 complete the registration and change of data, and at this time, the encrypted transaction read-write set data is stored in the ledger database. When the plaintext needs to be inquired, the endorsement node executes a copyright inquiry contract to generate a read-write set (kv is unchanged before and after the simulation transaction), at the moment, the ordering of the ordering node is not needed, the verification node inquires the stored plaintext information from the privacy database after verifying the signature and the version number of the transaction (confirming the identity of the inquirer), meanwhile, the same encryption algorithm is adopted during data storage to obtain ciphertext information corresponding to the plaintext information, the ciphertext information is compared with the encrypted read-write set read from the account database, and if the data is confirmed to be consistent, the plaintext information is returned to the client.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some ports, indirect coupling or communication connection between devices or units, and may be electrical, mechanical or other.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. A method for transaction processing in a blockchain network, the method comprising:
receiving an information storage proposal from a client, wherein the information storage proposal indicates that information to be stored is confidential information;
executing an intelligent contract to obtain first data based on the information storage proposal;
carrying out privacy processing on the first data to obtain second data;
verifying the validity of the first data;
if the first data passes validity verification, storing the first data into a privacy database, and storing the second data into an account book database;
the data of the account book database is used for all nodes on the block chain network to inquire, and the data of the privacy database is used for authorized nodes on the block chain network to be granted with inquiry authority to inquire.
2. The method of claim 1, wherein the first data comprises: a first keyword and target information stored in correspondence with the first keyword, the second data including: a second keyword and encryption information corresponding to the second keyword; the encrypted information is information after the target information is private, and the second keyword and the first keyword meet a preset corresponding relationship.
3. The method according to claim 2, wherein the encryption information is information after hashing the target information.
4. The method of any of claims 1 to 3, wherein executing an intelligent contract based on the information storage proposal to obtain first data comprises:
and executing the intelligent contract to obtain first data based on the information storage proposal through at least one authorization node meeting preset conditions.
5. The method according to claim 4, wherein the authorized node satisfying the preset condition comprises at least one of:
the authorization nodes meet the preset number of node permission levels;
and randomly selecting the preset number of the authorization nodes.
6. A method for transaction processing in a blockchain network, the method comprising:
receiving an information query proposal from a client;
executing an intelligent contract to obtain third data based on the information query proposal;
based on the third data, reading first data from a privacy database and reading second data from an account book database respectively;
privacy processing is carried out on the first data to obtain fourth data;
and comparing the second data with the fourth data, and if the comparison result is a first state value, returning the first data to the client, wherein the first state value indicates that the second data and the fourth data meet the data consistency requirement.
7. The method of claim 6, wherein the third data comprises: a third keyword;
the reading of the first data from the privacy database and the reading of the second data from the ledger database, respectively, based on the third data, includes:
reading target information corresponding to the first keyword successfully matched with the third keyword from a privacy database based on the matching of the third keyword and the first keyword;
and reading the encrypted information corresponding to the second keyword successfully matched with the fourth keyword from the account book database based on the matching of the fourth keyword and the second keyword.
8. A blockchain network, comprising: an endorsement node and a verification node, wherein,
the endorsement node is used for receiving an information storage proposal from a client, wherein the information storage proposal indicates that the information to be stored is confidential information;
the endorsement node is used for executing an intelligent contract to obtain first data based on the information storage proposal;
the endorsement node is also used for carrying out privacy processing on the first data to obtain second data;
the verification node is used for verifying the validity of the first data;
the verification node is further configured to store the first data in a privacy database and store the second data in an account book database if the first data passes validity verification;
the data of the account book database is used for all nodes on the block chain network to inquire, and the data of the privacy database is used for authorized nodes on the block chain network to be granted with inquiry authority to inquire.
9. A blockchain network, comprising: an endorsement node and a verification node, wherein,
the endorsement node is used for receiving an information query proposal from a client;
the endorsement node is also used for executing an intelligent contract to obtain third data based on the information query proposal;
the verification node is used for respectively reading first data from a privacy database and second data from an account book database based on the third data;
the endorsement node is further used for carrying out privacy processing on the first data to obtain fourth data;
the endorsement node is further configured to compare the second data with the fourth data, and return the first data to the client if a comparison result is a first state value, where the first state value indicates that the second data and the fourth data meet a data consistency requirement.
10. A computer storage medium storing a computer program which, when executed, is capable of implementing a transaction processing method for a blockchain network according to any one of claims 1 to 5 or 6 to 7.
CN202110242133.XA 2021-03-04 2021-03-04 Transaction processing method of block chain network, block chain network and storage medium Pending CN113112354A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110242133.XA CN113112354A (en) 2021-03-04 2021-03-04 Transaction processing method of block chain network, block chain network and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110242133.XA CN113112354A (en) 2021-03-04 2021-03-04 Transaction processing method of block chain network, block chain network and storage medium

Publications (1)

Publication Number Publication Date
CN113112354A true CN113112354A (en) 2021-07-13

Family

ID=76710302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110242133.XA Pending CN113112354A (en) 2021-03-04 2021-03-04 Transaction processing method of block chain network, block chain network and storage medium

Country Status (1)

Country Link
CN (1) CN113112354A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116090020A (en) * 2023-04-13 2023-05-09 中国人民解放军海军潜艇学院 Block chain-based information storage method and device, electronic equipment and storage medium
CN116578586A (en) * 2023-05-06 2023-08-11 重庆翰海睿智大数据科技股份有限公司 Dynamic data query system based on big data

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135186A (en) * 2019-04-11 2019-08-16 浙江工业大学 Medical data transaction and sharing method based on block chain technology
CN110266659A (en) * 2019-05-31 2019-09-20 联想(北京)有限公司 A kind of data processing method and equipment
CN110290094A (en) * 2018-03-19 2019-09-27 华为技术有限公司 A kind of control method and device of data access authority
CN110706106A (en) * 2019-09-26 2020-01-17 联想(北京)有限公司 Information processing method and device
CN110719176A (en) * 2019-10-22 2020-01-21 黑龙江工业学院 Logistics privacy protection method and system based on block chain and readable storage medium
CN110797099A (en) * 2019-10-28 2020-02-14 河北北方学院 Medical data sharing method and system based on block chain
CN110879902A (en) * 2019-11-25 2020-03-13 北京工商大学 Grain, oil and food full supply chain information safety management system and method based on trusted identification and IPFS
CN110995419A (en) * 2019-11-27 2020-04-10 山东爱城市网信息技术有限公司 Symmetric encryption and decryption method, device and medium based on data on link
CN111191286A (en) * 2019-12-28 2020-05-22 南京理工大学 HyperLegger Fabric block chain private data storage and access system and method thereof
CN111291399A (en) * 2020-03-05 2020-06-16 联想(北京)有限公司 Data encryption method, system, computer system and computer readable storage medium
CN111464298A (en) * 2020-03-30 2020-07-28 北京金山云网络技术有限公司 Data processing method and device in block chain and block chain network
CN111506590A (en) * 2020-04-13 2020-08-07 《中国学术期刊(光盘版)》电子杂志社有限公司 Digital work copyright authority confirming and transaction credible record management method
WO2020189846A1 (en) * 2018-12-20 2020-09-24 공주대학교 산학협력단 Method for privacy-preserving data analysis in permissioned blockchain system
CN112287392A (en) * 2020-11-23 2021-01-29 广东科学技术职业学院 Intelligent contract implementation method and system with privacy information protection function

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290094A (en) * 2018-03-19 2019-09-27 华为技术有限公司 A kind of control method and device of data access authority
WO2020189846A1 (en) * 2018-12-20 2020-09-24 공주대학교 산학협력단 Method for privacy-preserving data analysis in permissioned blockchain system
CN110135186A (en) * 2019-04-11 2019-08-16 浙江工业大学 Medical data transaction and sharing method based on block chain technology
CN110266659A (en) * 2019-05-31 2019-09-20 联想(北京)有限公司 A kind of data processing method and equipment
CN110706106A (en) * 2019-09-26 2020-01-17 联想(北京)有限公司 Information processing method and device
CN110719176A (en) * 2019-10-22 2020-01-21 黑龙江工业学院 Logistics privacy protection method and system based on block chain and readable storage medium
CN110797099A (en) * 2019-10-28 2020-02-14 河北北方学院 Medical data sharing method and system based on block chain
CN110879902A (en) * 2019-11-25 2020-03-13 北京工商大学 Grain, oil and food full supply chain information safety management system and method based on trusted identification and IPFS
CN110995419A (en) * 2019-11-27 2020-04-10 山东爱城市网信息技术有限公司 Symmetric encryption and decryption method, device and medium based on data on link
CN111191286A (en) * 2019-12-28 2020-05-22 南京理工大学 HyperLegger Fabric block chain private data storage and access system and method thereof
WO2021128733A1 (en) * 2019-12-28 2021-07-01 南京理工大学 Hyperledger fabric blockchain private data storage and access system and method therefor
CN111291399A (en) * 2020-03-05 2020-06-16 联想(北京)有限公司 Data encryption method, system, computer system and computer readable storage medium
CN111464298A (en) * 2020-03-30 2020-07-28 北京金山云网络技术有限公司 Data processing method and device in block chain and block chain network
CN111506590A (en) * 2020-04-13 2020-08-07 《中国学术期刊(光盘版)》电子杂志社有限公司 Digital work copyright authority confirming and transaction credible record management method
CN112287392A (en) * 2020-11-23 2021-01-29 广东科学技术职业学院 Intelligent contract implementation method and system with privacy information protection function

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
FABRICE BENHAMOUDA 等: "Supporting Private Data on Hyperledger Fabric with", 《IC2E》 *
赵国锋 等: "基于区块链的数字版权登记技术", 《区块链》 *
马娜 等: "基于fabric的出行数据隐私保护方法", 《计算机工程与设计》 *
高梦婕等: "基于区块链的可搜索医疗数据共享方案", 《南京邮电大学学报(自然科学版)》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116090020A (en) * 2023-04-13 2023-05-09 中国人民解放军海军潜艇学院 Block chain-based information storage method and device, electronic equipment and storage medium
CN116090020B (en) * 2023-04-13 2023-06-30 中国人民解放军海军潜艇学院 Block chain-based information storage method and device, electronic equipment and storage medium
CN116578586A (en) * 2023-05-06 2023-08-11 重庆翰海睿智大数据科技股份有限公司 Dynamic data query system based on big data
CN116578586B (en) * 2023-05-06 2023-11-17 重庆翰海睿智大数据科技股份有限公司 Dynamic data query system based on big data

Similar Documents

Publication Publication Date Title
EP3451578B1 (en) Turn-control rewritable blockchain
AU2017269736B2 (en) Multiple-link cryptologic blockchain
US9977918B2 (en) Method and system for verifiable searchable symmetric encryption
CN107342867B (en) Signature verification method and device
US20200119904A1 (en) Tamper-proof privileged user access system logs
Lee et al. Modifiable public blockchains using truncated hashing and sidechains
WO2018187408A1 (en) System for recording ownership of digital works and providing backup copies
CN111327564B (en) Access method and device for alliance chain
WO2020256840A1 (en) Binding of decentralized identifiers to verified claims
CN105518687A (en) Secure data storage
CN109428892A (en) Multistage rewritable block chain
CN111295655A (en) Computer system and method for distributed privacy-preserving shared execution of one or more processes
US20190288833A1 (en) System and Method for Securing Private Keys Behind a Biometric Authentication Gateway
CN111340483A (en) Data management method based on block chain and related equipment
CN113112354A (en) Transaction processing method of block chain network, block chain network and storage medium
CN115668861A (en) Filtering blockchain transactions
CN110914826B (en) System and method for distributed data mapping
WO2019191579A1 (en) System and methods for recording codes in a distributed environment
US20230107805A1 (en) Security System
CN112865981B (en) Token acquisition and verification method and device
CN116982332A (en) Method for authorizing a first participant in a communication network, processor device, motor vehicle and infrastructure device
CN113595731A (en) Protection method and device for shared link and computer readable storage medium
AU2021101878A4 (en) Computerized design model for encryption in blockchain transaction systems
JP2023031804A (en) Device control apparatus, management apparatus, device management system, device control method, and program
CN118337511A (en) Electronic single-certificate verification method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20240112

AD01 Patent right deemed abandoned