CN113302612B - 一种用于跨链和跨网络数据传输的计算机实现方法、系统及装置 - Google Patents
一种用于跨链和跨网络数据传输的计算机实现方法、系统及装置 Download PDFInfo
- Publication number
- CN113302612B CN113302612B CN202080009091.9A CN202080009091A CN113302612B CN 113302612 B CN113302612 B CN 113302612B CN 202080009091 A CN202080009091 A CN 202080009091A CN 113302612 B CN113302612 B CN 113302612B
- Authority
- CN
- China
- Prior art keywords
- data
- blockchain
- network
- ciphertext
- chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6272—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Virology (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/131412 WO2022109850A1 (fr) | 2020-11-25 | 2020-11-25 | Plate-forme de confiance basée sur une chaîne de blocs |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113302612A CN113302612A (zh) | 2021-08-24 |
CN113302612B true CN113302612B (zh) | 2022-12-20 |
Family
ID=77318845
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202080009091.9A Active CN113302612B (zh) | 2020-11-25 | 2020-11-25 | 一种用于跨链和跨网络数据传输的计算机实现方法、系统及装置 |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP4066439A4 (fr) |
CN (1) | CN113302612B (fr) |
WO (1) | WO2022109850A1 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113852469B (zh) * | 2021-09-24 | 2024-03-22 | 成都质数斯达克科技有限公司 | 区块链节点间数据传输方法、装置、设备及可读存储介质 |
CN115174126B (zh) * | 2022-09-08 | 2022-12-09 | 山东省计算中心(国家超级计算济南中心) | 基于区块链和sgx的外包数据密文搜索方法及系统 |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018162789A1 (fr) * | 2017-03-06 | 2018-09-13 | Nokia Technologies Oy | Système de nom de domaine décentralisé sécurisé |
US10761877B2 (en) * | 2017-07-21 | 2020-09-01 | Intel Corporation | Apparatuses, methods, and systems for blockchain transaction acceleration |
US20190288833A1 (en) * | 2018-03-16 | 2019-09-19 | Walmart Apollo, Llc | System and Method for Securing Private Keys Behind a Biometric Authentication Gateway |
CN110088793B (zh) * | 2018-12-19 | 2023-10-20 | 创新先进技术有限公司 | 区块链网络中的数据隔离 |
CN109873808A (zh) * | 2019-01-11 | 2019-06-11 | 平安科技(深圳)有限公司 | 区块链节点之间的通信方法及装置、存储介质及电子设备 |
US11487886B2 (en) * | 2019-05-03 | 2022-11-01 | International Business Machines Corporation | Database private document sharing |
US10929570B2 (en) * | 2019-05-17 | 2021-02-23 | Advanced New Technologies Co., Ltd. | Method, apparatus, and electronic device for blockchain-based infringement evidence storage |
CN110266655B (zh) * | 2019-05-30 | 2021-11-12 | 中国工商银行股份有限公司 | 一种基于区块链的跨链互联方法、设备以及系统 |
US10805069B1 (en) * | 2019-11-12 | 2020-10-13 | Xage Security, Inc. | Multi-layer ledgers for multi-party secure data governance |
CN110912937B (zh) * | 2019-12-23 | 2021-09-07 | 杭州中科先进技术研究院有限公司 | 一种基于区块链的数字存证平台和存证方法 |
SG11202013213UA (en) * | 2020-02-03 | 2021-01-28 | Alipay Hangzhou Inf Tech Co Ltd | Blockchain-Based Trustable Guarantees |
CN111418184B (zh) * | 2020-02-03 | 2022-09-09 | 支付宝(杭州)信息技术有限公司 | 基于区块链的可信保函 |
CN111447174A (zh) * | 2020-02-19 | 2020-07-24 | 江苏荣泽信息科技股份有限公司 | 一种基于区块链的数据加密方法 |
CN111416808B (zh) * | 2020-03-13 | 2021-04-13 | 财付通支付科技有限公司 | 跨区块链的数据互存方法、装置、设备及存储介质 |
CN111917865B (zh) * | 2020-07-29 | 2022-09-20 | 成都质数斯达克科技有限公司 | 区块链网络系统、网关以及组网方法 |
-
2020
- 2020-11-25 EP EP20962741.3A patent/EP4066439A4/fr active Pending
- 2020-11-25 WO PCT/CN2020/131412 patent/WO2022109850A1/fr unknown
- 2020-11-25 CN CN202080009091.9A patent/CN113302612B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
EP4066439A4 (fr) | 2022-12-14 |
WO2022109850A1 (fr) | 2022-06-02 |
CN113302612A (zh) | 2021-08-24 |
EP4066439A1 (fr) | 2022-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11360963B2 (en) | Tracking and verification of physical assets | |
US20210091960A1 (en) | Tracking and verification of physical assets | |
US11734259B2 (en) | Anonymous database rating update | |
US11580240B2 (en) | Protecting sensitive data | |
US11569996B2 (en) | Anonymous rating structure for database | |
CN113302610B (zh) | 基于区块链的可信平台 | |
WO2022109851A1 (fr) | Plateforme de confiance à base de chaînes de blocs | |
AU2021210206B2 (en) | Index structure for blockchain ledger | |
US11949794B2 (en) | Data anonymization of blockchain-based processing pipeline | |
US11924348B2 (en) | Honest behavior enforcement via blockchain | |
US20220329411A1 (en) | Blockchain processing offload to network device | |
WO2020169129A2 (fr) | Services de messagerie basés sur une chaîne de blocs pour des événements sensibles au temps | |
CN113302612B (zh) | 一种用于跨链和跨网络数据传输的计算机实现方法、系统及装置 | |
JP2023530594A (ja) | 分散型データベースにおける許可されたイベント処理 | |
WO2022109848A1 (fr) | Plateforme de confiance basée sur une chaîne de blocs | |
WO2020169128A2 (fr) | Gestion de stockage basée sur une rétroaction de message | |
CN113491090B (zh) | 基于区块链的可信平台 | |
JP2023098847A (ja) | 装置、方法、コンピュータプログラム(プライバシー保護ブロックチェーンの選択的監査プロセス) | |
WO2023046409A1 (fr) | Plate-forme d'actifs numériques avec vérification hsm | |
CN112016118B (zh) | 用于匿名数据库评级更新的方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |