CN113722684A - Data tracing method and device, electronic equipment and computer readable storage medium - Google Patents

Data tracing method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN113722684A
CN113722684A CN202110331418.0A CN202110331418A CN113722684A CN 113722684 A CN113722684 A CN 113722684A CN 202110331418 A CN202110331418 A CN 202110331418A CN 113722684 A CN113722684 A CN 113722684A
Authority
CN
China
Prior art keywords
data
target data
target
digital watermark
provider
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110331418.0A
Other languages
Chinese (zh)
Inventor
宋捷
童军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110331418.0A priority Critical patent/CN113722684A/en
Publication of CN113722684A publication Critical patent/CN113722684A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Multimedia (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention relates to the technical field of block chains, and discloses a data tracing method, a data tracing device, electronic equipment and a computer-readable storage medium. The method comprises the following steps: acquiring a data directory of a data provider, and storing the data directory to a block chain; acquiring a data request of a data demand party for target data associated with a target data directory, and determining a target data provider according to the data request and the target data directory; determining a plurality of storage positions of target data according to the intelligent contract, and respectively acquiring target data fragments from the plurality of storage positions; generating target data according to target data fragmentation, and adding a digital watermark to the generated target data; sending the target data added with the digital watermark to a data demand party; after the source tracing request is obtained, the digital watermark in the target data to be traced is extracted, and the source tracing of the target data to be traced is carried out according to the extracted digital watermark. Through the mode, the embodiment of the invention realizes accurate tracing of the leakage data.

Description

Data tracing method and device, electronic equipment and computer readable storage medium
Technical Field
The embodiment of the invention relates to the technical field of block chains, in particular to a data tracing method and device, electronic equipment and a computer readable storage medium.
Background
Data transaction refers to a transaction between a data demander and a data provider. With the continuous development of the big data industry, the demand for data transaction is more and more common. The data transaction can be directly carried out by the data provider and the data demander, and can also be carried out through a third-party platform.
During data transaction, there may be risks of data leakage and data tampering. In the related art, a digital fingerprint is added to data, and the type of data modification and the modification time are recorded by the digital fingerprint. When data leakage or data tampering occurs, tracing the data through the digital fingerprint to determine leakage personnel or tampering personnel and the like related to the data leakage or data tampering. However, in implementing the embodiments of the present invention, the inventors found that: the digital fingerprint technology in the related technology is not mature, and when the digital fingerprint technology is attacked, the digital fingerprint technology cannot accurately trace the source of the data.
Disclosure of Invention
In view of the foregoing problems, embodiments of the present invention provide a data tracing method, an apparatus, an electronic device, and a computer-readable storage medium, which are used to solve the problem of inaccurate data tracing in the prior art.
According to an aspect of the embodiments of the present invention, there is provided a data tracing method, including:
acquiring a data directory of a data provider, and storing the data directory to a block chain;
acquiring a data request of a data demand party for target data associated with a target data directory, and determining a target data provider according to the data request and the target data directory;
determining a plurality of storage positions of the target data according to the intelligent contract related to the target data directory, and respectively obtaining target data fragments at the plurality of storage positions;
generating the target data according to the target data fragments, and adding a digital watermark to the generated target data, wherein the digital watermark at least comprises an identifier of the data demand party and an identifier of the data supply party;
sending the target data added with the digital watermark to the data demand party;
after a source tracing request of target data to be traced is obtained, a digital watermark in the target data to be traced is extracted, and the target data to be traced is traced according to the extracted digital watermark.
In an optional manner, before the determining, according to the intelligent contract associated with the target data directory, a plurality of storage locations of the target data and obtaining target data fragments at the plurality of storage locations respectively, the method includes:
Uploading the data request to a block chain so that all block chain link points execute the data request;
after the data provider monitors the data request through the block link point, acquiring response information uploaded by the data provider through the block link point;
and if the data requester is judged to be authorized according to the response information, the data requester is identified as an authorized requester in the intelligent contract.
In an optional manner, the adding a digital watermark to the generated target data includes:
acquiring the identifier of the data demand party, the identifier of the data provider and the identifier of the target data;
generating a digital watermark according to the identifier of the data demand party, the identifier of the data supply party and the identifier of the target data;
and adding the generated digital watermark to the target data.
In an optional manner, before the obtaining the identification of the data demander, the identification of the data provider and the identification of the target data, the method includes:
after the target data are obtained, carrying out hash algorithm processing on the target data to generate a hash value of the target data;
And determining the hash value of the target data as the identification of the target data.
In an optional manner, after obtaining the data directory of the data provider and saving the data directory to the blockchain, the method includes:
acquiring electronic data which is uploaded by a data provider and is associated with the data catalog, and generating a plurality of electronic data fragments which are associated with the electronic data;
after the storage position of each electronic data fragment in the blockchain is determined, each electronic data fragment is stored to the corresponding storage position respectively.
In an optional manner, the acquiring electronic data associated with the data catalog uploaded by the data provider and generating a plurality of electronic data fragments associated with the electronic data includes:
acquiring electronic data which is uploaded by a data provider and is associated with the data catalog, wherein the electronic data is encrypted by a public key of the data provider;
decrypting the electronic data with a private key of a data provider;
a plurality of electronic data fragments associated with the decrypted electronic data are generated.
In an optional manner, the sending the target data added with the digital watermark to the data demander includes:
Encrypting the target data added with the watermark by using a public key of a data demand party;
and sending the encrypted target data added with the watermark to a data demand party.
According to another aspect of the embodiments of the present invention, there is provided a data tracing apparatus, including:
the storage module is used for acquiring a data directory of a data provider and storing the data directory to a block chain;
the determining module is used for acquiring a data request of a data demand party for target data associated with a target data directory and determining a target data provider according to the data request and the target data directory;
the acquisition module is used for determining a plurality of storage positions of the target data according to the intelligent contract related to the target data directory and respectively acquiring target data fragments from the plurality of storage positions;
an adding module, configured to generate the target data according to the target data fragment, and add a digital watermark to the generated target data, where the digital watermark includes at least an identifier of the data demanding party and an identifier of the data providing party;
the sending module is used for sending the target data added with the digital watermark to the data demand party;
And the source tracing module is used for extracting the digital watermark in the target data to be traced after the source tracing request of the target data is acquired, and tracing the source of the target data according to the extracted digital watermark.
According to another aspect of the embodiments of the present invention, there is provided an electronic device including: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction enables the processor to execute the operation of the data tracing method.
According to another aspect of the embodiments of the present invention, there is provided a computer-readable storage medium, in which at least one executable instruction is stored, and when the executable instruction is executed on an electronic device, the electronic device is caused to perform the operations of the data tracing method.
Before target data is sent to a data demander, a plurality of storage positions of the target data are determined through an intelligent contract related to a target data directory, target data fragments are respectively obtained from the plurality of storage positions, the target data are generated according to the target data fragments, and digital watermarks are added to the generated target data, wherein the added digital watermarks at least comprise an identifier of the data demander and an identifier of a data provider; after the target data added with the digital watermark is sent to a data demand side, after a source tracing request of the target data to be traced is obtained, the digital watermark in the target data to be traced is extracted, and the source tracing of the target data to be traced is carried out according to the extracted digital watermark. The digital watermark can accurately record the provider and the demander of the target data, so the embodiment of the invention can accurately trace the source of the data.
The foregoing description is only an overview of the technical solutions of the embodiments of the present invention, and the embodiments of the present invention can be implemented according to the content of the description in order to make the technical means of the embodiments of the present invention more clearly understood, and the detailed description of the present invention is provided below in order to make the foregoing and other objects, features, and advantages of the embodiments of the present invention more clearly understandable.
Drawings
The drawings are only for purposes of illustrating embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a schematic flow chart illustrating a data tracing method according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating an authorization and authentication process provided by an embodiment of the present invention;
FIG. 3 is a diagram illustrating a data query and data usage process provided by an embodiment of the invention;
FIG. 4 is a schematic diagram illustrating a data transaction process provided by an embodiment of the invention;
fig. 5 is a schematic structural diagram illustrating a data tracing apparatus according to an embodiment of the present invention;
fig. 6 shows a schematic structural diagram of an electronic device provided in an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein.
Fig. 1 shows a flowchart of a data tracing method according to an embodiment of the present invention, where the method is performed by an electronic device, and the electronic device may be a computer device, such as a personal computer, a terminal, a server, a cloud service platform, a block chain, and the like. The memory of the electronic device stores at least one executable instruction, and the executable instruction enables the processor of the electronic device to execute the operation of the data tracing method.
As shown in fig. 1, the method comprises the steps of:
step 110: and acquiring a data directory of a data provider, and storing the data directory to a block chain.
The data catalog is generated by a data provider and is used for describing the data type, the data size, the data price and the like of data which can be provided by the data provider. The data provider may be a seller in the data transaction and may provide electronic data with usage requirements. After the data catalog of the data provider is obtained, the data catalog may be saved to the blockchain. It should be noted that the number of data providers is generally multiple, and each data provider corresponds to a different data directory. After the data directory is stored in the block chain, the data demand side can view the data directory through any node of the block chain.
In an optional manner, after step 110, the embodiment of the present invention may further include:
step 111: and acquiring electronic data uploaded by a data provider and associated with the data catalog, generating a plurality of electronic data fragments associated with the electronic data, and storing each electronic data fragment to a corresponding storage position after determining the storage position of each electronic data fragment in the blockchain.
Wherein the data provider can upload electronic data associated with the data catalog. After the electronic data associated with the data directory uploaded by the data provider is obtained, the electronic data uploaded by the data provider can be saved to the blockchain. Further, a plurality of electronic data fragments related to the electronic data uploaded by the data provider can be generated, the storage position of each electronic data fragment in the block chain is determined, and each electronic data fragment is stored to the corresponding storage position of the block chain. The electronic data uploaded by the data provider can be segmented into a plurality of electronic data fragments based on a data segmentation algorithm, and the plurality of electronic data fragments can be restored into the electronic data according to a data merging algorithm.
In an alternative manner, before uploading the electronic data associated with the data directory, the data provider may encrypt the electronic data in advance using a public key of the data provider and upload the encrypted electronic data. Therefore, after electronic data associated with a data directory is encrypted by a public key of a data provider, the electronic data can be decrypted by a private key of the data provider, the electronic data can be decrypted by the private key of the data provider, a plurality of electronic data fragments associated with the decrypted electronic data can be generated, and then the plurality of electronic data fragments associated with the decrypted electronic data can be respectively stored to corresponding storage positions.
Step 120: and acquiring a data request of a data demand party for target data associated with a target data directory, and determining a target data provider according to the data request and the target data directory.
The data demand side acquires target data according to the data request. The target data is the data that the data demander wishes to obtain. The target data directory associated with the data request and an identification of the target data associated with the target data directory may be determined by the data request of the data requestor. Therefore, after acquiring the data request of the data demander for the target data associated with the target data directory, the target data provider can be determined according to the data request and the target data directory. The target data provider is a data provider that provides the target data.
In an optional manner, after step 120, the embodiment of the present invention may further include:
step 121: uploading the data request to a block chain so that all block chain nodes execute the data request, acquiring response information uploaded by the data provider through the block chain nodes after the data provider monitors the data request through the block chain nodes, and identifying the data requester as an authorized requester in an intelligent contract if the data requester is judged to be authorized according to the response information.
Before sending the target data to the data demander, the data demander needs to be authenticated to determine whether the data demander has the authority to acquire the target data. After uploading the data request to the blockchain, all blockchain nodes may be caused to execute the data request. After the data provider monitors the data request through any one of the blockchain nodes, response information can be generated and uploaded to the blockchain network. Whether the data demand side is already granted the authority to acquire the target data can be determined through the response information. After response information uploaded by a data provider through the block chain link point is acquired, if the data requester is judged to acquire authorization according to the response information, the data requester is identified as an authorized requester in the intelligent contract, a new block is generated according to the authorization information, and the generated new block is added to the block chain. The authorized requester is a data requester having a right to acquire the target data.
As shown in fig. 2, in an alternative manner, the data tracing method according to the embodiment of the present invention may be applied to a data transaction process performed by a data transaction mechanism. The data demander A, the data demander B and the data demander C respectively initiate data requests, and the data demander A, the data demander B and the data demander C need to be authenticated to respectively determine whether the data demander A, the data demander B and the data demander C have the right to acquire target data. The user A can authorize the data provider, and the authorization information of the user A is sent to the data provider, so that the data provider can obtain the authorization information of the user A. And the user B can authorize the data provider and send the authorization information of the user B to the data provider, so that the data provider can acquire the authorization information of the user B. Further, the authorization information of the user A and the authorization information of the user B received by the data provider can be obtained, and the authorization information of the user A and the authorization information of the user B are stored in an authorization information chain. And determining whether the data demander A, the data demander B and the data demander C have the authority to acquire the target data according to the authorization information stored in the authorization information chain. The authorization information chain is a block chain network for recording authorization information.
Step 130: and determining a plurality of storage positions of the target data according to the intelligent contract associated with the target data directory, and respectively acquiring target data fragments at the plurality of storage positions.
The intelligent contract is a pre-agreed execution rule protocol in the block chain. In this embodiment, a plurality of storage locations of the target data may be determined according to the intelligent contract associated with the target data directory, and the target data fragments may be obtained at the plurality of storage locations, respectively.
Step 140: and generating the target data according to the target data fragments, and adding a digital watermark to the generated target data, wherein the digital watermark at least comprises an identifier of the data demand party and an identifier of the data supply party.
Wherein the target data may be generated from a plurality of target data slices. The digital watermark is identification information, and the digital watermark is added into the electronic data, so that the purposes of version protection, secret communication, file authenticity identification, product identification and the like can be achieved. Adding a digital watermark to the generated target data can record the operation information of the target data. The digital watermark may include at least an identification of the data consumer and an identification of the data supply, and may also include a time when the data consumer is authorized to use the target data.
In an optional manner, after the target data is acquired, hash algorithm processing is performed on the target data to generate a hash value of the target data, and the hash value of the target data is determined as an identifier of the target data. When adding the digital watermark to the generated target data, the identifier of the data demander, the identifier of the data provider and the identifier of the target data can be acquired, the digital watermark is generated according to the identifier of the data demander, the identifier of the data provider and the identifier of the target data, and the generated digital watermark is added to the target data.
The generated digital watermark is added into the target data, so that the use of the target data is not influenced, and the digital watermark in the target data is not easy to identify and tamper. And generating a digital watermark according to the identification of the data demand side, the identification of the data supply side and the identification of the target data, and adding the generated digital watermark to the target data to finish marking the target data. Further, a digital watermark can be extracted from the marked target data, and information such as an identifier of a data demand side, an identifier of a data supply side, an identifier of the target data and the like can be determined according to the extracted digital watermark. If the marked target data is leaked, auxiliary judgment can be carried out on leaked personnel according to the identification of the data demand side and the identification of the data supply side. In addition, whether the target data is tampered or not can be judged according to the identification of the target data. For example, when the identifier of the target data is a hash value of the target data, a hash value of the target data that may be tampered may be generated, and the target data may be determined to be tampered if the hash value of the target data that may be tampered does not match the hash value of the target data determined from the digital watermark.
In a data transaction scenario, a digital watermark may be generated according to copyright information, authorization information, trade contract information, order information, delivery information, transaction state information, usage process information, usage result information, timestamp information, and the like of target data, and the digital watermark is added to the target data, so that after the digital watermark is extracted from the target data, copyright information, authorization information, trade contract information, order information, delivery information, transaction state information, usage process information, usage result information, and timestamp information associated with the target data may be determined. Therefore, in a data transaction scene, the target data can be subjected to full-life-cycle management by using the characteristics of difficult tampering and easy traceability of the block chain, so that the target data is traced, and evidence is obtained when notarization is needed.
Step 150: and sending the target data added with the digital watermark to the data demand party.
After the generated digital watermark is added to the target data, the target data added with the digital watermark can be sent to a data demand party so that the data demand party can obtain the target data added with the digital watermark.
In an optional manner, in order to improve security during data transmission, the target data added with the watermark may be encrypted by using a public key of the data demanding party, and the encrypted target data added with the watermark is sent to the data demanding party. After the data demand party acquires the target data added with the watermark, the encrypted target data is decrypted through a private key of the data demand party, and then the target data can be used. After the target data added with the digital watermark is sent to the data demand side, the target data on the block chain can be destroyed, so that the target data can be prevented from continuously occupying the storage space of the block chain network.
As shown in fig. 3, in an alternative manner, the data tracing method according to the embodiment of the present invention may be applied to a data tracing system based on a blockchain. The data tracing system based on the blockchain completes the transmission of the target data provided by the data provider to the data demander through seven steps. The method comprises the following steps: and acquiring a data directory of a data provider, and storing the data directory to the block chain. Step two: and acquiring a data request of a data demand party for target data associated with the target data directory, and determining a target data provider according to the data request and the target data directory. Step three: the data demand side and the data supply side are enabled to sign an intelligent contract and negotiate a secret key through the blockchain network. Step four: and acquiring target data provided by a data provider, encrypting the target data, and storing the encrypted target data to the blockchain network. Step five: processing the target data through an intelligent contract, generating a processing operation record according to a processing process, generating a new block according to the processing operation record, and adding the newly generated block to the tail of the original block chain. Step six: and sending the encrypted target data to a data demand party, so that the data demand party decrypts the target data according to a result of key negotiation with the data provider to use the decrypted target data. Step seven: and destroying the target data on the block chain to save the storage space of the block chain network.
In an optional manner, before the target data added with the digital watermark is sent to the data demanding party, data processing may be performed on the target data added with the digital watermark, so that the data demanding party obtains the target data after the data processing, and original content of the target data is prevented from being directly disclosed to the data demanding party.
Step 160: after a source tracing request of target data to be traced is obtained, a digital watermark in the target data to be traced is extracted, and the target data to be traced is traced according to the extracted digital watermark.
After the tracing request of the target data to be traced is obtained, the digital watermark in the target data to be traced can be extracted, the use information and the modification information of the target data are determined according to the extracted digital watermark, and the target data to be traced is traced according to the use information and the modification information of the target data.
As shown in fig. 4, in an alternative manner, the data tracing method according to the embodiment of the present invention may be applied to the data query and data use process. In the process of data query and data use, a user can interact with the access server to perform data query and data use, and the access server can send a data request of the user to the query server. If the target data requested by the user is on the blockchain, the query server can interact with the blockchain network to obtain the request result of the user, and the request result of the user is sent to the access server, so that the access server sends the request result of the user to the corresponding user. If the target data requested by the user is not stored in the block chain, the query server can interact with a memory under the chain to obtain a request result of the user, and the request result of the user is sent to the access server, so that the access server sends the request result of the user to the corresponding user. If the data request of the user is query data, the access server can return the query result to the user through the processing process; if the data request of the user is the use data, the access server may return the data result set to the user through the foregoing processing procedure. Further, the usage record of the target data by the user may be encrypted with a preset public key and saved to the blockchain network after adding the time stamp, and the modification record of the target data by the user may be encrypted with a preset public key and saved to the blockchain network after adding the time stamp. After the tracing request of the target data to be traced is obtained, the use record and the modification record of the target data to be traced can be obtained from the blockchain network, and the target data to be traced is traced according to the modification record and the use record.
Before target data is sent to a data demander, a plurality of storage positions of the target data are determined through an intelligent contract related to a target data directory, target data fragments are respectively obtained from the plurality of storage positions, the target data are generated according to the target data fragments, and digital watermarks are added to the generated target data, wherein the added digital watermarks at least comprise an identifier of the data demander and an identifier of a data provider; after the target data added with the digital watermark is sent to a data demand side, after a source tracing request of the target data to be traced is obtained, the digital watermark in the target data to be traced is extracted, and the source tracing of the target data to be traced is carried out according to the extracted digital watermark. The digital watermark can accurately record the provider and the demander of the target data, so the embodiment of the invention can accurately trace the source of the data.
Fig. 5 is a schematic structural diagram of a data tracing apparatus according to an embodiment of the present invention. As shown in fig. 5, the apparatus 300 includes: a save module 310, a determine module 320, an obtain module 330, an add module 340, a send module 350, and a source module 360.
The storage module 310 is configured to obtain a data directory of a data provider, and store the data directory to a block chain;
The determining module 320 is configured to obtain a data request of a data demander for target data associated with a target data directory, and determine a target data provider according to the data request and the target data directory;
an obtaining module 330, configured to determine multiple storage locations of the target data according to the intelligent contract associated with the target data directory, and obtain target data fragments at the multiple storage locations respectively;
an adding module 340, configured to generate the target data according to the target data fragment, and add a digital watermark to the generated target data, where the digital watermark includes at least an identifier of the data demander and an identifier of the data provider;
a sending module 350, configured to send the target data added with the digital watermark to the data demander;
the source tracing module 360 is configured to extract a digital watermark in target data to be traced after obtaining a source tracing request for the target data, and trace the source of the target data according to the extracted digital watermark.
In an optional manner, the apparatus 300 further includes an identification module, configured to upload the data request to a block chain, so that all block nodes execute the data request, obtain response information uploaded by the data provider through the block nodes after the data provider monitors the data request through the block nodes, and identify the data requester as an authorized requester in an intelligent contract if it is determined that the data requester is authorized according to the response information.
In an alternative manner, the adding module 340 is configured to: and acquiring the identifier of the data demander, the identifier of the data provider and the identifier of the target data, generating a digital watermark according to the identifier of the data demander, the identifier of the data provider and the identifier of the target data, and adding the generated digital watermark to the target data.
In an alternative manner, the adding module 340 is configured to: and after the target data is acquired, carrying out hash algorithm processing on the target data to generate a hash value of the target data, and determining the hash value of the target data as the identifier of the target data.
In an alternative manner, the saving module 310 is configured to: acquiring electronic data which is uploaded by a data provider and is associated with the data catalog, and generating a plurality of electronic data fragments which are associated with the electronic data; after the storage position of each electronic data fragment in the blockchain is determined, each electronic data fragment is stored to the corresponding storage position respectively.
In an alternative manner, the obtaining module 330 is configured to: and acquiring electronic data uploaded by a data provider and associated with the data catalog, wherein the electronic data is encrypted by a public key of the data provider, and decrypting the electronic data by using a private key of the data provider to generate a plurality of electronic data fragments associated with the decrypted electronic data.
In an alternative manner, the sending module 350 is configured to: and encrypting the target data added with the watermark by using a public key of the data demanding party, and sending the encrypted target data added with the watermark to the data demanding party.
Before target data is sent to a data demander, a plurality of storage positions of the target data are determined through an intelligent contract related to a target data directory, target data fragments are respectively obtained from the plurality of storage positions, the target data are generated according to the target data fragments, and digital watermarks are added to the generated target data, wherein the added digital watermarks at least comprise an identifier of the data demander and an identifier of a data provider; after the target data added with the digital watermark is sent to a data demand side, after a source tracing request of the target data to be traced is obtained, the digital watermark in the target data to be traced is extracted, and the source tracing of the target data to be traced is carried out according to the extracted digital watermark. The digital watermark can accurately record the provider and the demander of the target data, so the embodiment of the invention can accurately trace the source of the data.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and a specific implementation of the electronic device is not limited in the specific embodiment of the present invention.
As shown in fig. 6, the electronic device may include: a processor (processor)402, a Communications Interface 404, a memory 406, and a Communications bus 408.
Wherein: the processor 402, communication interface 404, and memory 406 communicate with each other via a communication bus 408. A communication interface 404 for communicating with network elements of other devices, such as clients or other servers. The processor 402 is configured to execute the program 410, and may specifically execute the relevant steps in the data tracing method embodiment described above.
In particular, program 410 may include program code comprising computer-executable instructions.
The processor 402 may be a central processing unit CPU or an application Specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention. The electronic device comprises one or more processors, which can be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 406 for storing a program 410. Memory 406 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 410 may specifically be invoked by the processor 402 to cause the electronic device to perform the following operations:
acquiring a data directory of a data provider, and storing the data directory to a block chain;
acquiring a data request of a data demand party for target data associated with a target data directory, and determining a target data provider according to the data request and the target data directory;
determining a plurality of storage positions of the target data according to the intelligent contract related to the target data directory, and respectively obtaining target data fragments at the plurality of storage positions;
generating the target data according to the target data fragments, and adding a digital watermark to the generated target data, wherein the digital watermark at least comprises an identifier of the data demand party and an identifier of the data supply party;
sending the target data added with the digital watermark to the data demand party;
after a source tracing request of target data to be traced is obtained, a digital watermark in the target data to be traced is extracted, and the target data to be traced is traced according to the extracted digital watermark.
In an alternative, the program 410 may specifically be invoked by the processor 402 to cause the electronic device to perform the following operations:
Uploading the data request to a block chain so that all block chain link points execute the data request;
after the data provider monitors the data request through the block link point, acquiring response information uploaded by the data provider through the block link point;
and if the data requester is judged to be authorized according to the response information, the data requester is identified as an authorized requester in the intelligent contract.
In an alternative, the program 410 may specifically be invoked by the processor 402 to cause the electronic device to perform the following operations:
acquiring the identifier of the data demand party, the identifier of the data provider and the identifier of the target data;
generating a digital watermark according to the identifier of the data demand party, the identifier of the data supply party and the identifier of the target data;
and adding the generated digital watermark to the target data.
In an alternative, the program 410 may specifically be invoked by the processor 402 to cause the electronic device to perform the following operations:
after the target data are obtained, carrying out hash algorithm processing on the target data to generate a hash value of the target data;
and determining the hash value of the target data as the identification of the target data.
In an alternative, the program 410 may specifically be invoked by the processor 402 to cause the electronic device to perform the following operations:
acquiring electronic data which is uploaded by a data provider and is associated with the data catalog, and generating a plurality of electronic data fragments which are associated with the electronic data;
after the storage position of each electronic data fragment in the blockchain is determined, each electronic data fragment is stored to the corresponding storage position respectively.
In an alternative, the program 410 may specifically be invoked by the processor 402 to cause the electronic device to perform the following operations:
acquiring electronic data which is uploaded by a data provider and is associated with the data catalog, wherein the electronic data is encrypted by a public key of the data provider;
decrypting the electronic data with a private key of a data provider;
a plurality of electronic data fragments associated with the decrypted electronic data are generated.
In an alternative, the program 410 may specifically be invoked by the processor 402 to cause the electronic device to perform the following operations:
encrypting the target data added with the watermark by using a public key of a data demand party;
and sending the encrypted target data added with the watermark to a data demand party.
Before target data is sent to a data demander, a plurality of storage positions of the target data are determined through an intelligent contract related to a target data directory, target data fragments are respectively obtained from the plurality of storage positions, the target data are generated according to the target data fragments, and digital watermarks are added to the generated target data, wherein the added digital watermarks at least comprise an identifier of the data demander and an identifier of a data provider; after the target data added with the digital watermark is sent to a data demand side, after a source tracing request of the target data to be traced is obtained, the digital watermark in the target data to be traced is extracted, and the source tracing of the target data to be traced is carried out according to the extracted digital watermark. The digital watermark can accurately record the provider and the demander of the target data, so the embodiment of the invention can accurately trace the source of the data.
An embodiment of the present invention provides a computer-readable storage medium, where the storage medium stores at least one executable instruction, and when the executable instruction runs on an electronic device, the electronic device is enabled to execute a data tracing method in any method embodiment described above.
The embodiment of the invention provides a data tracing device, which is used for executing the data tracing method.
Embodiments of the present invention provide a computer program, where the computer program can be called by a processor to enable an electronic device to execute a data tracing method in any of the above method embodiments.
Embodiments of the present invention provide a computer program product, where the computer program product includes a computer program stored on a computer-readable storage medium, and the computer program includes program instructions, when the program instructions are run on a computer, the computer is caused to execute the data tracing method in any of the above method embodiments.
The algorithms or displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the invention and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names. The steps in the above embodiments should not be construed as limiting the order of execution unless specified otherwise.

Claims (10)

1. A data tracing method is characterized by comprising the following steps:
acquiring a data directory of a data provider, and storing the data directory to a block chain;
Acquiring a data request of a data demand party for target data associated with a target data directory, and determining a target data provider according to the data request and the target data directory;
determining a plurality of storage positions of the target data according to the intelligent contract related to the target data directory, and respectively obtaining target data fragments at the plurality of storage positions;
generating the target data according to the target data fragments, and adding a digital watermark to the generated target data, wherein the digital watermark at least comprises an identifier of the data demand party and an identifier of the data supply party;
sending the target data added with the digital watermark to the data demand party;
after a source tracing request of target data to be traced is obtained, a digital watermark in the target data to be traced is extracted, and the target data to be traced is traced according to the extracted digital watermark.
2. The method of claim 1, wherein prior to said determining a plurality of storage locations for the target data according to the smart contract associated with the target data directory and obtaining target data fragments at the plurality of storage locations, respectively, the method comprises:
Uploading the data request to a block chain so that all block chain link points execute the data request;
after the data provider monitors the data request through the block link point, acquiring response information uploaded by the data provider through the block link point;
and if the data requester is judged to be authorized according to the response information, the data requester is identified as an authorized requester in the intelligent contract.
3. The method of claim 1 or 2, wherein the adding the digital watermark to the generated target data comprises:
acquiring the identifier of the data demand party, the identifier of the data provider and the identifier of the target data;
generating a digital watermark according to the identifier of the data demand party, the identifier of the data supply party and the identifier of the target data;
and adding the generated digital watermark to the target data.
4. The method of claim 3, wherein prior to said obtaining the identification of the data consumer, the identification of the data provider, and the identification of the target data, the method comprises:
after the target data are obtained, carrying out hash algorithm processing on the target data to generate a hash value of the target data;
And determining the hash value of the target data as the identification of the target data.
5. The method of claim 1, wherein after obtaining the data directory of the data provider and saving the data directory to the blockchain, the method comprises:
acquiring electronic data which is uploaded by a data provider and is associated with the data catalog, and generating a plurality of electronic data fragments which are associated with the electronic data;
after the storage position of each electronic data fragment in the blockchain is determined, each electronic data fragment is stored to the corresponding storage position respectively.
6. The method of claim 5, wherein obtaining electronic data associated with the data catalog uploaded by a data provider and generating a plurality of electronic data shards associated with the electronic data comprises:
acquiring electronic data which is uploaded by a data provider and is associated with the data catalog, wherein the electronic data is encrypted by a public key of the data provider;
decrypting the electronic data with a private key of a data provider;
a plurality of electronic data fragments associated with the decrypted electronic data are generated.
7. The method of claim 1, wherein sending the target data with the digital watermark added thereto to the data demander comprises:
encrypting the target data added with the watermark by using a public key of a data demand party;
and sending the encrypted target data added with the watermark to a data demand party.
8. A data tracing apparatus, said apparatus comprising:
the storage module is used for acquiring a data directory of a data provider and storing the data directory to a block chain;
the determining module is used for acquiring a data request of a data demand party for target data associated with a target data directory and determining a target data provider according to the data request and the target data directory;
the acquisition module is used for determining a plurality of storage positions of the target data according to the intelligent contract related to the target data directory and respectively acquiring target data fragments from the plurality of storage positions;
an adding module, configured to generate the target data according to the target data fragment, and add a digital watermark to the generated target data, where the digital watermark includes at least an identifier of the data demanding party and an identifier of the data providing party;
The sending module is used for sending the target data added with the digital watermark to the data demand party;
and the source tracing module is used for extracting the digital watermark in the target data to be traced after the source tracing request of the target data is acquired, and tracing the source of the target data according to the extracted digital watermark.
9. An electronic device, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation of the data tracing method according to any one of claims 1-7.
10. A computer-readable storage medium having stored therein at least one executable instruction, which when executed on an electronic device, causes the electronic device to perform the operations of the data tracing method according to any one of claims 1 to 7.
CN202110331418.0A 2021-03-29 2021-03-29 Data tracing method and device, electronic equipment and computer readable storage medium Pending CN113722684A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110331418.0A CN113722684A (en) 2021-03-29 2021-03-29 Data tracing method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110331418.0A CN113722684A (en) 2021-03-29 2021-03-29 Data tracing method and device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN113722684A true CN113722684A (en) 2021-11-30

Family

ID=78672646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110331418.0A Pending CN113722684A (en) 2021-03-29 2021-03-29 Data tracing method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113722684A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107798650A (en) * 2017-09-18 2018-03-13 众安信息技术服务有限公司 A kind of digital asset infringement decision method and device based on block chain
CN109165190A (en) * 2018-07-11 2019-01-08 南京邮电大学 A kind of electronic data based on block chain intelligence contract deposits card method
CN109241708A (en) * 2018-10-10 2019-01-18 北京金烁恒丰网络科技有限公司 A kind of method and device of Tracing Control identification file duplication
CN109711120A (en) * 2018-12-17 2019-05-03 浙江大学 A kind of digital resource infringement method for tracing and system based on block chain digital watermarking
CN110099114A (en) * 2019-04-30 2019-08-06 普华云创科技(北京)有限公司 Block chain and the file memory method of IPFS agreement, system, terminal and storage medium
CN110177092A (en) * 2019-05-22 2019-08-27 南京邮电大学 A kind of electronic data based on block chain is credible method for down loading
CN111090837A (en) * 2019-12-06 2020-05-01 上海科乐宜信息科技有限公司 Intelligent tracking method based on block chain technology
US20200159889A1 (en) * 2018-11-15 2020-05-21 International Business Machines Corporation Preventing fraud in digital content licensing and distribution using distributed ledgers
US20200159890A1 (en) * 2018-11-15 2020-05-21 International Business Machines Corporation Securely storing digital content using a distributed ledger
CN111338841A (en) * 2018-12-19 2020-06-26 北京京东尚科信息技术有限公司 Data processing method, device, equipment and storage medium
CN111538784A (en) * 2020-04-21 2020-08-14 全球能源互联网研究院有限公司 Block chain-based digital asset transaction method and device and storage medium
CN111680330A (en) * 2020-04-17 2020-09-18 航天云网科技发展有限责任公司 Traceability system and traceability method based on block chain data exchange

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107798650A (en) * 2017-09-18 2018-03-13 众安信息技术服务有限公司 A kind of digital asset infringement decision method and device based on block chain
CN109165190A (en) * 2018-07-11 2019-01-08 南京邮电大学 A kind of electronic data based on block chain intelligence contract deposits card method
CN109241708A (en) * 2018-10-10 2019-01-18 北京金烁恒丰网络科技有限公司 A kind of method and device of Tracing Control identification file duplication
US20200159889A1 (en) * 2018-11-15 2020-05-21 International Business Machines Corporation Preventing fraud in digital content licensing and distribution using distributed ledgers
US20200159890A1 (en) * 2018-11-15 2020-05-21 International Business Machines Corporation Securely storing digital content using a distributed ledger
CN109711120A (en) * 2018-12-17 2019-05-03 浙江大学 A kind of digital resource infringement method for tracing and system based on block chain digital watermarking
CN111338841A (en) * 2018-12-19 2020-06-26 北京京东尚科信息技术有限公司 Data processing method, device, equipment and storage medium
CN110099114A (en) * 2019-04-30 2019-08-06 普华云创科技(北京)有限公司 Block chain and the file memory method of IPFS agreement, system, terminal and storage medium
CN110177092A (en) * 2019-05-22 2019-08-27 南京邮电大学 A kind of electronic data based on block chain is credible method for down loading
CN111090837A (en) * 2019-12-06 2020-05-01 上海科乐宜信息科技有限公司 Intelligent tracking method based on block chain technology
CN111680330A (en) * 2020-04-17 2020-09-18 航天云网科技发展有限责任公司 Traceability system and traceability method based on block chain data exchange
CN111538784A (en) * 2020-04-21 2020-08-14 全球能源互联网研究院有限公司 Block chain-based digital asset transaction method and device and storage medium

Similar Documents

Publication Publication Date Title
CN109697365B (en) Information processing method, block chain node and electronic equipment
US20210182871A1 (en) Post-processing method and device based on copyright registration information, apparatus, and medium
WO2020233373A1 (en) Application configuration file management method and device
CN107948152B (en) Information storage method, information acquisition method, information storage device, information acquisition device and information acquisition equipment
EP2924916A1 (en) Security scheme for authenticating digital entities and aggregate object origins
CN112751852A (en) Data transmission method and related equipment
CN111292041A (en) Electronic contract generating method, device, equipment and storage medium
EP3552131B1 (en) Password security
US20090210694A1 (en) Information transmission apparatus and method, information reception apparatus and method, and information-providing system
CN112948851A (en) User authentication method, device, server and storage medium
CN111488372A (en) Data processing method, device and storage medium
EP4092984A1 (en) Data processing method and apparatus, device and medium
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
CN112286872A (en) Medical image data sharing method and system based on block chain technology and interplanetary file system and readable storage medium
CN112800392A (en) Authorization method and device based on soft certificate and storage medium
CN111291420B (en) Distributed off-link data storage method based on block chain
CN114500093A (en) Safe interaction method and system for message information
CN110266653B (en) Authentication method, system and terminal equipment
CN114745373A (en) File transmission method, device, equipment and storage medium
CN114785524A (en) Electronic seal generation method, device, equipment and medium
CN107133517B (en) Data recovery method based on data encryption and calculation in memory
WO2024011863A1 (en) Communication method and apparatus, sim card, electronic device, and terminal device
US8755521B2 (en) Security method and system for media playback devices
CN113722684A (en) Data tracing method and device, electronic equipment and computer readable storage medium
CN114398678A (en) Registration verification method and device for preventing electronic file from being tampered, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination