CN113591104A - Method, device and system for protecting data privacy in alliance chain cross-chain - Google Patents

Method, device and system for protecting data privacy in alliance chain cross-chain Download PDF

Info

Publication number
CN113591104A
CN113591104A CN202110729874.0A CN202110729874A CN113591104A CN 113591104 A CN113591104 A CN 113591104A CN 202110729874 A CN202110729874 A CN 202110729874A CN 113591104 A CN113591104 A CN 113591104A
Authority
CN
China
Prior art keywords
chain
user
cross
alliance
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110729874.0A
Other languages
Chinese (zh)
Inventor
毛岱山
肖苗苗
刘群华
柯亚萍
林元敏
王超博
麦佩雨
王洪龙
陈意斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Entropy Chain Technology Fujian Co ltd
Original Assignee
Entropy Chain Technology Fujian Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Entropy Chain Technology Fujian Co ltd filed Critical Entropy Chain Technology Fujian Co ltd
Priority to CN202110729874.0A priority Critical patent/CN113591104A/en
Publication of CN113591104A publication Critical patent/CN113591104A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method for protecting data privacy in alliance chain cross-chain, which comprises the following steps: the first user public key is linked up to the first alliance chain, and a second member on the second alliance chain is used as a target to trigger chain crossing; the first user public key is linked to a second union chain in a cross mode; monitoring and acquiring a first user public key from a cross-link to a second union link by a second user; the second user encrypts the data by adopting the first user public key to form a ciphertext, the ciphertext is linked to the second alliance chain, and the first user on the first alliance chain is used as a target to trigger chain spanning; cross-chaining the ciphertext to a first federation chain; the first user monitors and obtains the ciphertext; the first user decrypts the ciphertext through the private key of the first user, and the cross-link transmission of the encrypted data is completed. The invention can establish an encrypted cross-link communication channel by simply interacting the two alliance chains, and has high safety, convenience and rapidness.

Description

Method, device and system for protecting data privacy in alliance chain cross-chain
Technical Field
The invention relates to the technical field, in particular to a method, a device and a system for protecting data privacy in alliance chain cross-chain.
Background
A federation chain is between a public chain and a private chain and is a block chain in which multiple organizations or institutions participate. That is, a federation chain is a block chain that is commonly established by a plurality of organizations, a block chain that is commonly managed by a plurality of organizations, and each organization or organization manages one or more nodes whose data only allows different organizations within the system to read, write, and transmit. In a federation chain, participants are entities, such as businesses or institutions, that are authenticated by real names.
Since the data on the federation chain is the actual operation data, the requirement on privacy is high. The current data operation mode is generally uplink after hash or uplink after encryption, but the procedure is cumbersome. For two users respectively located on two alliance chains, for example, a first alliance chain and a second alliance chain are included, the first alliance chain is in communication connection with the first user, the second alliance chain is in communication connection with the second user, and under the situation, how to establish an encrypted cross-chain communication channel through the on-chain communication is a problem to be further solved at present.
Disclosure of Invention
In order to solve the problems, the technical scheme of the invention is as follows:
the invention provides a method for protecting data privacy in a coalition chain cross-chain, which comprises the following steps:
the first user public key is linked up to the first alliance chain, and a second member on the second alliance chain is used as a target to trigger chain crossing;
the first user public key is linked to a second union chain in a cross mode;
monitoring and acquiring a first user public key from a cross-link to a second union link by a second user;
the second user encrypts the data by adopting the first user public key to form a ciphertext, the ciphertext is linked to the second alliance chain, and the first user on the first alliance chain is used as a target to trigger chain spanning;
cross-chaining the ciphertext to a first federation chain;
the first user monitors and obtains the ciphertext;
the first user decrypts the ciphertext through the private key of the first user, and the cross-link transmission of the encrypted data is completed.
Further, the chain crossing mode of the first alliance chain and the second alliance chain is one of a notary mode and a relay mode.
It is further provided that the first user public key locally generates a public key of a public-private key pair for encryption or of a public-private key pair using its account.
The second aspect of the present invention provides a method for protecting data privacy in a federation chain across chains, which is called encryption and includes the following steps:
exchanging public keys between a first user and a second user;
negotiating a common symmetric key through the first user public key and the second user public key;
the second user encrypts the data by adopting the symmetric key to form a ciphertext, links the ciphertext to the second alliance chain, and triggers chain crossing by taking the first user on the first alliance chain as a target;
cross-chaining the ciphertext to a first federation chain;
the first user monitors and obtains the ciphertext;
and the first user decrypts the ciphertext through the symmetric key to complete the cross-link transmission of the encrypted data.
A third aspect of the present invention provides a computer-readable storage medium having stored therein instructions that, when executed on a terminal device, cause the terminal device to perform a method for protecting data privacy in federation chain cross-chaining as described in the first aspect or the second aspect.
The fourth aspect of the present invention provides an apparatus for implementing federation chain cross-link communication, including: a memory, a processor, and a computer program stored on the memory and executable on the processor, when executing the computer program, implementing a method of protecting data privacy in a federation chain cross-chain as described in the first aspect or the second aspect.
The fifth aspect of the present invention provides an apparatus for implementing federation chain cross-chain communication, which is applied to the method for protecting data privacy in federation chain cross-chain described in the first aspect, and the apparatus includes:
the first monitoring unit is used for monitoring and acquiring data sent by a user corresponding to the alliance chain;
a first transmitting unit; used for sending data to the corresponding user of the alliance chain;
the verification unit is used for verifying the accuracy of the uplink public key of the user corresponding to the alliance chain;
the second monitoring unit is used for cross-chain monitoring to obtain data of other alliance chains;
and the second sending unit is used for sending the data of the local alliance chain to other alliance chains in a cross-chain mode.
A sixth aspect of the present invention provides a system for implementing federation chain cross-chain communication, which is applied to the method for protecting data privacy in federation chain cross-chain in the first aspect, where the system includes a first federation chain and a second federation chain;
the first alliance chain is used for carrying out information interaction and uplink inspection with users on the first alliance chain and communicating with the second alliance chain through a cross chain;
the second alliance chain is used for carrying out information interaction and uplink inspection with users on the second alliance chain and communicating with the first alliance chain through a cross chain;
and realizing public key encryption transmission data through the interaction of the first alliance chain and the second alliance chain so as to finish cross-chain encryption data transmission.
The beneficial effects of the invention are as follows:
through interaction of a first alliance chain and a second alliance chain, under an asymmetric encryption method, a public key is exchanged between a first user and a second user, the second user encrypts transmission data through the public key of the first user, and the first user decrypts the transmission data through a private key of the first user to complete cross-chain encrypted data transmission; under the symmetric encryption method, public keys are exchanged between the first user and the second user to obtain symmetric keys in a quotient, and then the data transmission is encrypted and decrypted through the symmetric keys to complete the cross-link encrypted data transmission. Compared with the prior art, the method can establish the encrypted cross-link communication channel by simply interacting the two alliance links, and is high in safety, convenient and fast.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention.
Wherein:
FIG. 1 is a schematic diagram of a first embodiment of the present invention;
FIG. 2 is a block flow diagram of a first embodiment of the present invention;
FIG. 3 is a block flow diagram of a second embodiment of the present invention;
FIG. 4 is a block diagram of the fourth embodiment of the present invention;
FIG. 5 is a block diagram of the fifth embodiment of the present invention;
fig. 6 is a schematic view of a sixth embodiment of the present invention.
Detailed Description
In order to make the technical problems, technical solutions and advantageous effects to be solved by the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The first embodiment is as follows:
referring to fig. 1-2, the present invention provides a method for protecting data privacy in a federation chain across chains, the method comprising the steps of:
s1, linking the first user public key to the first alliance chain, and triggering chain crossing by taking the second member on the second alliance chain as a target;
s2, the first user public key is crossed and linked to the second union chain;
s3, the second user monitors and acquires the first user public key from the cross-link to the second union link;
s4, the second user encrypts the data by adopting the first user public key to form a ciphertext, links the ciphertext to the second alliance chain, and triggers chain crossing by taking the first user on the first alliance chain as a target;
s5, cross-linking the ciphertext to the first alliance chain;
s6, the first user monitors and obtains the ciphertext;
and S7, the first user decrypts the ciphertext through the private key of the first user to complete the cross-chain transmission of the encrypted data of the first user by the second user.
It should be noted that the above method steps are unidirectional transmission, but the method is also applicable to bidirectional transmission, that is, the second user public key is linked up to the second federation chain, the first member on the first federation chain is used as a target to trigger the cross-chaining, the first user encrypts data by using the second user public key to form a ciphertext, and the second user decrypts the ciphertext by using its private key to complete the cross-chaining transmission of the encrypted data of the second user by the first user.
In this embodiment, the chain crossing manner of the first federation chain and the second federation is one of a notary mode and a relay mode, and in this embodiment, the notary mode is used for explanation, that is, a notary approved by all users is determined, the notary is connected to the two chains at the same time, and both chains have read-write permission. In actual work, the notary including but not limited to reading from the second alliance chain to the transaction needing cross-chain, taking down the notary and submitting the notary to the first alliance chain.
Further, the first user or the second user needs to monitor and acquire the public key or the ciphertext of the corresponding federation chain, the monitoring and acquisition mode is still in a notary mode, a notary has the reading permission of the two chains, and when a cross-chain request transaction occurs, a common federation chain directly sends a notification. The notary only needs to monitor and obtain the notification and then take out the specific transaction according to the notification.
Further configured, said chaining the first user public key to the first federation chain comprises: verifying the accuracy of the first user public key through the user certificate; or the first user public key locally generates a public-private key pair for encryption or a public-private key pair using an account number thereof.
The working principle of the embodiment is as follows:
compared with the prior art, the method has the advantages that the encrypted cross-link communication channel can be established simply through interaction of the two alliance chains, safety is high, convenience and rapidness are achieved.
Referring to fig. 3, the second embodiment is as follows:
s1, exchanging public keys between the first user and the second user;
s2, negotiating out a common symmetric key through the first user public key and the second user public key;
s3, the second user encrypts the data by adopting the symmetric key to form a ciphertext, links the ciphertext to the second alliance chain, and triggers the cross-chain by taking the first user on the first alliance chain as a target;
s4, cross-linking the ciphertext to the first alliance chain;
s5, the first user monitors and obtains the ciphertext;
and S6, the first user decrypts the ciphertext through the symmetric key to finish the cross-link transmission of the encrypted data.
The working principle of the embodiment is as follows:
public keys between the first user and the second user are exchanged firstly, a symmetric key is obtained through the quotient, then the data transmission is encrypted and decrypted through the symmetric key, the cross-link encrypted data transmission is completed, and then the symmetric key is used for both the data encryption and the data decryption of the communication. Benefits compared to current solutions: if a large amount of data is to be transmitted between the first user and the second user, symmetric encryption may initially spend more time negotiating the symmetric key, but may save more transmission content than asymmetric encryption, reducing the amount of data across the chain.
The third embodiment is as follows:
the invention provides a computer-readable storage medium, which stores instructions that, when executed on a terminal device, cause the terminal device to execute the method for protecting data privacy in federation chain cross-chaining according to the first embodiment or the second embodiment.
The fourth embodiment is as follows:
referring to fig. 4, the present invention provides an apparatus for implementing federation chain cross-chain communication, including: the processor executes the computer program to implement the method for protecting data privacy in the federation chain cross-link described in the first embodiment or the second embodiment.
The fifth embodiment is as follows:
referring to fig. 5, the present invention provides an apparatus for implementing federation chain cross-chain communication, which is applied to the method for protecting data privacy in federation chain cross-chain of the first embodiment, and the apparatus includes:
the first monitoring unit is used for monitoring and acquiring data sent by a user corresponding to the alliance chain, for example, monitoring and acquiring a public key uploaded by the user in the alliance chain;
a first transmitting unit; the method is used for sending data to a user corresponding to the federation chain, such as sending public keys of members on other federation chains;
the verification unit is used for verifying the accuracy of the uplink public key of the user corresponding to the alliance chain, namely when the public key is uploaded by the user of the alliance chain, the public key is detected to be the user, and the specific implementation mode is verified through a certificate;
the second monitoring unit is used for monitoring and acquiring data of other alliance chains in a cross-chain mode, such as monitoring and acquiring public keys or ciphertexts of other alliance chains;
and the second sending unit is used for sending the data of the local alliance chain to other alliance chains in a cross-chain mode, such as sending a public key or a ciphertext of the local alliance chain.
In this embodiment, the two communication devices are a first device and a second device, which have the same structure and are only applied to different users; the first device monitors and acquires the public key uploaded by the corresponding user through a first monitoring unit of the first device, performs accuracy test through a verification unit, and then realizes chain crossing with the second device through a second sending unit of the first device; a second monitoring unit of the second device monitors and acquires public key information of a user on the first device, the public key information is transmitted to a corresponding user through a first transmitting unit of the second device, then the public key returned by the user is monitored and acquired through the first monitoring unit of the second device, accuracy test is carried out through a verification unit, and then the second monitoring unit of the second device and the first device are linked; the first device monitors and acquires the public key information of the user on the second device through the second monitoring unit, transmits the public key information to the corresponding user through the first transmitting unit, monitors and acquires a ciphertext returned by the user through the first monitoring unit, wherein the ciphertext is encrypted data obtained based on the public key information of the user on the second device, and then realizes chain crossing with the second device through the second transmitting unit; and a second monitoring unit of the second device monitors and acquires the ciphertext of the user on the first device, the ciphertext is sent to a corresponding user through a first sending unit of the second device, and the user reads the ciphertext through a private key of the user.
The sixth embodiment is as follows:
referring to fig. 6, the present invention provides a system for implementing federation chain cross-chain communication, which is applied to the method for protecting data privacy in federation chain cross-chain of the first embodiment, where the system includes a first federation chain and a second federation chain;
the first alliance chain is used for carrying out information interaction and uplink check with the user on the alliance chain, for example, monitoring and acquiring a public key or a ciphertext of the user on the alliance chain, sending a public key of a target user on other alliance chains to the user on the alliance chain, checking the accuracy of the public key of the user on the alliance chain, and carrying out communication with the second alliance chain through chain crossing;
the second alliance chain is used for carrying out information interaction and uplink check with the user on the alliance chain, for example, monitoring and acquiring a public key or a ciphertext of the user on the alliance chain, sending a public key of a target user on other alliance chains to the user on the alliance chain, checking the accuracy of the public key of the user on the alliance chain, and carrying out communication with the first alliance chain through chain crossing;
because the chain-crossing mode of the first alliance chain and the second alliance chain is not limited, any chain-crossing mode can be adopted, such as a notary mode, for example, a main chain (not shown) mode is adopted, and the first alliance chain and the second alliance chain have read-write capability on the main chain.
Through the interaction of the first alliance chain and the second alliance chain, the public key encryption transmission of data is realized, so that the cross-chain encryption data transmission is completed.
The invention has been described above with reference to the accompanying drawings, it is obvious that the invention is not limited to the specific implementation in the above-described manner, and it is within the scope of the invention to apply the inventive concept and solution to other applications without substantial modification.

Claims (8)

1. A method for protecting data privacy in a federation chain across chains is characterized in that the method is asymmetric encryption and comprises the following steps:
the first user public key is linked up to the first alliance chain, and a second member on the second alliance chain is used as a target to trigger chain crossing;
the first user public key is linked to a second union chain in a cross mode;
monitoring and acquiring a first user public key from a cross-link to a second union link by a second user;
the second user encrypts the data by adopting the first user public key to form a ciphertext, the ciphertext is linked to the second alliance chain, and the first user on the first alliance chain is used as a target to trigger chain spanning;
cross-chaining the ciphertext to a first federation chain;
the first user monitors and obtains the ciphertext;
the first user decrypts the ciphertext through the private key of the first user, and the cross-link transmission of the encrypted data is completed.
2. The method for protecting data privacy in federation chain across-chain as claimed in claim 1, wherein the first federation chain and the second federation chain across-chain mode is one of notary mode and trunk mode.
3. A method of protecting data privacy in a federation chain across chains as recited in claim 1, wherein the first user public key locally generates a public key of a public-private key pair used for encryption or a public-private key pair using its account.
4. A method for protecting data privacy in a federation chain across chains is characterized in that the method is symmetric encryption and comprises the following steps:
exchanging public keys between a first user and a second user;
negotiating a common symmetric key through the first user public key and the second user public key;
the second user encrypts the data by adopting the symmetric key to form a ciphertext, links the ciphertext to the second alliance chain, and triggers chain crossing by taking the first user on the first alliance chain as a target;
cross-chaining the ciphertext to a first federation chain;
the first user monitors and obtains the ciphertext;
and the first user decrypts the ciphertext through the symmetric key to complete the cross-link transmission of the encrypted data.
5. A computer-readable storage medium having stored therein instructions that, when executed on a terminal device, cause the terminal device to perform a method of protecting data privacy in a federation chain cross-chain as recited in any one of claims 1-4.
6. An apparatus for implementing federation chain cross-chain communication, comprising: memory, a processor, and a computer program stored on the memory and executable on the processor, when executing the computer program, implementing a method of protecting data privacy in a federation chain cross-chain as recited in any one of claims 1-4.
7. An apparatus for implementing federation chain cross-chain communication, applied to the method for protecting data privacy in federation chain cross-chain of any one of claims 1 to 3, the apparatus comprising:
the first monitoring unit is used for monitoring and acquiring data sent by a user corresponding to the alliance chain;
a first transmitting unit; used for sending data to the corresponding user of the alliance chain;
the verification unit is used for verifying the accuracy of the uplink public key of the user corresponding to the alliance chain;
the second monitoring unit is used for cross-chain monitoring to obtain data of other alliance chains;
and the second sending unit is used for sending the data of the local alliance chain to other alliance chains in a cross-chain mode.
8. A system for implementing alliance chain cross-chain communication, which is applied to the method for protecting data privacy in alliance chain cross-chain as claimed in any one of claims 1-3, wherein, the system comprises a first alliance chain and a second alliance chain;
the first alliance chain is used for carrying out information interaction and uplink inspection with users on the first alliance chain and communicating with the second alliance chain through a cross chain;
the second alliance chain is used for carrying out information interaction and uplink inspection with users on the second alliance chain and communicating with the first alliance chain through a cross chain;
through the interaction of the first alliance chain and the second alliance chain, the public key encryption transmission of data is realized, so that the cross-chain encryption data transmission is completed.
CN202110729874.0A 2021-06-29 2021-06-29 Method, device and system for protecting data privacy in alliance chain cross-chain Pending CN113591104A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110729874.0A CN113591104A (en) 2021-06-29 2021-06-29 Method, device and system for protecting data privacy in alliance chain cross-chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110729874.0A CN113591104A (en) 2021-06-29 2021-06-29 Method, device and system for protecting data privacy in alliance chain cross-chain

Publications (1)

Publication Number Publication Date
CN113591104A true CN113591104A (en) 2021-11-02

Family

ID=78245211

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110729874.0A Pending CN113591104A (en) 2021-06-29 2021-06-29 Method, device and system for protecting data privacy in alliance chain cross-chain

Country Status (1)

Country Link
CN (1) CN113591104A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115967583A (en) * 2023-03-16 2023-04-14 安羚科技(杭州)有限公司 Key management system and method based on alliance chain
CN117034356A (en) * 2023-10-09 2023-11-10 成都乐超人科技有限公司 Privacy protection method and device for multi-operation flow based on hybrid chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110266655A (en) * 2019-05-30 2019-09-20 中国工商银行股份有限公司 A kind of across chain interconnected method, equipment and system based on block chain
CN111327415A (en) * 2018-12-13 2020-06-23 航天信息股份有限公司 Alliance link data protection method and device
CN111404950A (en) * 2020-03-23 2020-07-10 腾讯科技(深圳)有限公司 Information sharing method and device based on block chain network and related equipment
CN111429233A (en) * 2020-04-15 2020-07-17 广东洪心创业服务有限公司 Leasing system and method based on block chain
CN111600908A (en) * 2020-06-17 2020-08-28 杭州云链趣链数字科技有限公司 Data processing method, system, computer device and readable storage medium
CN112435024A (en) * 2020-11-17 2021-03-02 浙江大学 Alliance chain cross-chain privacy protection method based on group signature and CA multi-party authentication
CN112994892A (en) * 2020-12-17 2021-06-18 中国工商银行股份有限公司 Cross-chain interaction method, device and system and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111327415A (en) * 2018-12-13 2020-06-23 航天信息股份有限公司 Alliance link data protection method and device
CN110266655A (en) * 2019-05-30 2019-09-20 中国工商银行股份有限公司 A kind of across chain interconnected method, equipment and system based on block chain
CN111404950A (en) * 2020-03-23 2020-07-10 腾讯科技(深圳)有限公司 Information sharing method and device based on block chain network and related equipment
CN111429233A (en) * 2020-04-15 2020-07-17 广东洪心创业服务有限公司 Leasing system and method based on block chain
CN111600908A (en) * 2020-06-17 2020-08-28 杭州云链趣链数字科技有限公司 Data processing method, system, computer device and readable storage medium
CN112435024A (en) * 2020-11-17 2021-03-02 浙江大学 Alliance chain cross-chain privacy protection method based on group signature and CA multi-party authentication
CN112994892A (en) * 2020-12-17 2021-06-18 中国工商银行股份有限公司 Cross-chain interaction method, device and system and electronic equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115967583A (en) * 2023-03-16 2023-04-14 安羚科技(杭州)有限公司 Key management system and method based on alliance chain
CN117034356A (en) * 2023-10-09 2023-11-10 成都乐超人科技有限公司 Privacy protection method and device for multi-operation flow based on hybrid chain
CN117034356B (en) * 2023-10-09 2024-01-05 成都乐超人科技有限公司 Privacy protection method and device for multi-operation flow based on hybrid chain

Similar Documents

Publication Publication Date Title
CN108282459B (en) Data transmission method and system based on intelligent contract
CN104660602B (en) A kind of quantum key transfer control method and system
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN108768988A (en) Block chain access control method, equipment and computer readable storage medium
CN108650082A (en) The encryption and verification method of information to be verified, relevant apparatus and storage medium
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
CN113591104A (en) Method, device and system for protecting data privacy in alliance chain cross-chain
CN107172056A (en) A kind of channel safety determines method, device, system, client and server
CN110535641A (en) Key management method and device, computer equipment and storage medium
CN107743067A (en) Awarding method, system, terminal and the storage medium of digital certificate
CN104243452B (en) A kind of cloud computing access control method and system
CN109040055A (en) The method for realizing Web secure access using domestic password
CN110493162A (en) Identity identifying method and system based on wearable device
US20100316218A1 (en) Personal information managing device for falsification prevention of personal information and non repudiation of personal information circulation
CN102624710A (en) Sensitive information transmission method and sensitive information transmission system
CN106204034B (en) Using the mutual authentication method and system of interior payment
CN114003955A (en) Block chain-based security credit worthiness control method and related equipment
CN107135228B (en) Authentication system and authentication method based on central node
CN107872794A (en) Channel connection control method and device
CN109587149A (en) A kind of safety communicating method and device of data
CN106169990A (en) A kind of encrypt data on flows monitoring method, Apparatus and system
CN106257859A (en) A kind of password using method
CN102594564A (en) Equipment for traffic guidance information security management
CN107040920A (en) Data transmission system and data transmission method
CN107181739A (en) Data safety exchange method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination