CN114626849A - Data protection method and protection device based on block chain - Google Patents

Data protection method and protection device based on block chain Download PDF

Info

Publication number
CN114626849A
CN114626849A CN202210257313.XA CN202210257313A CN114626849A CN 114626849 A CN114626849 A CN 114626849A CN 202210257313 A CN202210257313 A CN 202210257313A CN 114626849 A CN114626849 A CN 114626849A
Authority
CN
China
Prior art keywords
data
blockchain
format
fingerprint
start time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210257313.XA
Other languages
Chinese (zh)
Inventor
肖钢
李剑戈
曹震
周立斌
王岐
杜瑞岭
刘达
李紫超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Securities Co Ltd
Original Assignee
China Securities Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Securities Co Ltd filed Critical China Securities Co Ltd
Priority to CN202210257313.XA priority Critical patent/CN114626849A/en
Publication of CN114626849A publication Critical patent/CN114626849A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data protection method based on a block chain, which comprises the following steps: s1, collecting multi-source heterogeneous data; s2, processing the collected multi-source heterogeneous data into a data stream with a specified format, extracting start time, end time and service type from the data stream, and generating a data fingerprint; s3, assembling the obtained start time, end time, service type and data fingerprint into a message; and S4, storing the generated message on the block chain, wherein the original data is still stored in a local database and/or a local file. The multi-source heterogeneous data is converted into the message only containing the start time, the end time, the service type and the data fingerprint and stored in the block chain, the technical problem that in the prior art, the overhead of computing resources, storage resources and bandwidth resources of the block chain is overlarge due to the fact that all data need to be recorded and linked up one by one is solved, and the problems that interactive data of a client and a security company are easy to delete and tamper and the safety and completeness of the data cannot be guaranteed can be solved.

Description

基于区块链的数据保护方法、保护装置Blockchain-based data protection method and protection device

技术领域technical field

本申请属于信息数据安全技术领域,具体涉及基于区块链的数据保护方法、保护装置。The present application belongs to the technical field of information data security, and specifically relates to a data protection method and protection device based on blockchain.

背景技术Background technique

随着证券公司业务范围越来越广,客户与证券公司的交互数据越来越多,如客户的交易数据、客户的操作行为、客户的浏览记录等。信息系统越来越复杂,电子数据易删除、易篡改,当有纠纷发生客户对数据有异议时,证券公司很难证明自己数据可信,客户的合法权益也很难保障。As the business scope of securities companies becomes wider and wider, there are more and more interactive data between customers and securities companies, such as customer transaction data, customer operation behavior, and customer browsing records. Information systems are becoming more and more complex, and electronic data is easy to delete and tamper with. When a customer disagrees with the data, it is difficult for securities companies to prove that their data is credible, and it is difficult to protect the legitimate rights and interests of customers.

通常情况下,客户与证券公司发生多种交互数据,证券公司直接将交互数据存放在多个业务系统的数据库、本地文件、日志中。但是证券公司集中式存储的方式,数据易丢失、易篡改,无法保证数据的完备性、安全性,缺乏第三方监督。Under normal circumstances, a variety of interactive data occurs between a client and a securities company, and the securities company directly stores the interactive data in the databases, local files, and logs of multiple business systems. However, the centralized storage method of securities companies is easy to lose and tamper with data, cannot guarantee the completeness and security of data, and lacks third-party supervision.

证券公司通常还可以将客户与证券公司的交互数据脱敏后直接上传到公有链或联盟链平台。区块链中记录的服务或者交易信息绝大部分来自于客户,包含客户的个体身份、交易记录、时间地点等相关敏感信息,这些隐私数据如果被非法获取和应用,会极大损害客户自身的权益,带来人身和财产方面的安全风险。尽管区块链账本自身在节点之间共享,且账本记录了整个区块链上的全部服务相关信息,虽然区块链账本上的信息会经过加密等必要的处理,但是仍然有比较大的风险被破解从而造成客户隐私数据泄露。现有方案还有如下两方面的缺陷:一方面,客户与证券公司的交互量大,全部传输到公有链或联盟链上数据量大,同步不及时,另一方面,经营数据容易被其他机构获取,譬如每日活跃客户数,每日点击的数,造成商业秘密的泄漏。Securities companies can usually desensitize the interaction data between customers and securities companies and upload them directly to the public chain or alliance chain platform. Most of the service or transaction information recorded in the blockchain comes from the customer, including the customer's individual identity, transaction records, time and place and other related sensitive information. If these private data are illegally obtained and applied, it will greatly damage the customer's own identity. rights and interests, resulting in personal and property safety risks. Although the blockchain ledger itself is shared between nodes, and the ledger records all service-related information on the entire blockchain, although the information on the blockchain ledger will undergo necessary processing such as encryption, there is still a relatively large risk It is cracked, resulting in the leakage of customer privacy data. The existing solution has the following two shortcomings: on the one hand, the amount of interaction between customers and securities companies is large, and the amount of data transmitted to the public chain or alliance chain is large, and the synchronization is not timely; Obtain, such as the number of daily active customers, the number of daily clicks, resulting in the leakage of trade secrets.

发明内容SUMMARY OF THE INVENTION

有鉴于此,一方面,一些实施例公开的技术方案是基于区块链的数据保护方法,用于增强证券公司与客户多类交互数据的可信性,基于区块链的数据保护方法包括步骤:In view of this, on the one hand, the technical solutions disclosed in some embodiments are data protection methods based on blockchain, which are used to enhance the credibility of various types of interactive data between securities companies and customers, and the data protection methods based on blockchain include steps :

S1、采集多源异构数据;S1. Collect multi-source heterogeneous data;

S2、将采集的多源异构数据处理为具有指定格式的数据流,并从数据流中抽取开始时间、结束时间、业务类型,生成数据指纹;S2. Process the collected multi-source heterogeneous data into a data stream with a specified format, and extract the start time, end time, and service type from the data stream to generate a data fingerprint;

S3、将得到的开始时间、结束时间、业务类型和数据指纹拼装成报文;S3. Assemble the obtained start time, end time, service type and data fingerprint into a message;

S4、将拼装生成的报文存储在区块链上,原始数据仍然存储在本地数据库和/或本地文件中。S4. The assembled message is stored on the blockchain, and the original data is still stored in the local database and/or local file.

进一步,一些实施例公开的基于区块链的数据保护方法,还包括步骤:Further, the blockchain-based data protection method disclosed in some embodiments further includes the steps:

S5、依照选定的开始时间、结束时间、业务类型将本地数据库和本地文件中的数据生成待验证数据指纹;S5, according to the selected start time, end time, and business type, generate the data fingerprint to be verified from the data in the local database and the local file;

S6、将生成的待验证数据指纹与区块链上存储的与选定开始时间、结束时间、业务类型相对应的报文中的数据指纹进行比较,若二者一致,则本地数据库和/或本地文件中的数据可信。S6. Compare the generated data fingerprint to be verified with the data fingerprint stored in the block chain in the message corresponding to the selected start time, end time, and service type. If the two are consistent, the local database and/or The data in the local file is trusted.

一些实施例公开的基于区块链的数据保护方法,数据指纹为MD5值。In the blockchain-based data protection method disclosed in some embodiments, the data fingerprint is an MD5 value.

一些实施例公开的基于区块链的数据保护方法,指定格式的数据流包括统一格式的数据流或特定格式的数据流,其中,统一格式包括JSON格式、avro格式,特定格式包括文本格式、图片格式、语音格式、视频格式。In the blockchain-based data protection method disclosed in some embodiments, the data stream in the specified format includes a data stream in a unified format or a data stream in a specific format, wherein the unified format includes JSON format and avro format, and the specific format includes text format, picture format, voice format, video format.

一些实施例公开的基于区块链的数据保护方法,本地数据库包括关系型数据库和非关系型数据库。In the blockchain-based data protection method disclosed in some embodiments, the local database includes a relational database and a non-relational database.

另一方面,一些实施例公开了基于区块链的数据保护装置,用于执行基于区块链的数据保护方法,保护装置包括:On the other hand, some embodiments disclose a blockchain-based data protection device for executing a blockchain-based data protection method, the protection device comprising:

数据采集模块,配置用于采集多源异构数据;Data acquisition module, configured to collect multi-source heterogeneous data;

数据处理模块,配置用于将采集的多源异构数据处理为具有指定格式的数据流,并从数据流中抽取开始时间、结束时间、业务类型,生成数据指纹;The data processing module is configured to process the collected multi-source heterogeneous data into a data stream with a specified format, and extract the start time, end time, and service type from the data stream to generate a data fingerprint;

封装模块,配置为将得到的开始时间、结束时间、业务类型和数据指纹拼装成报文;The encapsulation module is configured to assemble the obtained start time, end time, service type and data fingerprint into a message;

数据上链模块,配置为将生成的报文转存至区块链。The data uploading module is configured to transfer the generated message to the blockchain.

进一步,一些实施例公开的基于区块链的数据保护装置,还包括数据认证模块,配置为依照选定的开始时间、结束时间、业务类型将本地数据库和本地文件中的数据生成待验证数据指纹;将生成的待验证数据指纹与区块链上存储的与选定开始时间、结束时间、业务类型相对应的报文中的数据指纹进行比较,若二者一致,则本地数据库和/或本地文件中的数据可信。Further, the blockchain-based data protection device disclosed in some embodiments further includes a data authentication module configured to generate a data fingerprint to be verified from the data in the local database and the local file according to the selected start time, end time, and business type ; Compare the generated data fingerprint to be verified with the data fingerprint stored on the blockchain in the message corresponding to the selected start time, end time, and business type. If the two are consistent, the local database and/or local The data in the file can be trusted.

一些实施例公开的基于区块链的数据保护装置,还包括数据缓存模块,配置为将待上链的报文储存储在消息中间件中。The blockchain-based data protection device disclosed in some embodiments further includes a data cache module configured to store the message to be uploaded on the chain in the message middleware.

一些实施例公开的基于区块链的数据保护装置,还包括调度模块,配置用于控制数据采集模块的数据采集。The blockchain-based data protection device disclosed in some embodiments further includes a scheduling module configured to control data collection by the data collection module.

一些实施例公开的基于区块链的数据保护装置,数据上链模块具体包括:In the blockchain-based data protection device disclosed in some embodiments, the data uploading module specifically includes:

权限认证单元,用于认证查验者的权限;The authority authentication unit, which is used to authenticate the authority of the checker;

请求单元,用于向区块链服务器发起连接请求;The request unit is used to initiate a connection request to the blockchain server;

连接单元,用于向请求的区块链服务器建立连接;A connection unit for establishing a connection to the requested blockchain server;

上传单元,用于向区块链服务器上传报文。The uploading unit is used to upload messages to the blockchain server.

本申请实施例公开的基于区块链的数据保护方法,将多源异构数据转化为仅包含开始时间、结束时间、业务类型和数据指纹的报文存储在区块链上,缓解了现有技术中需要将全部数据记录下来并逐一上链的过程所造成的区块链的计算资源、存储资源和带宽资源开销过大的技术问题,还能够解决客户与证券公司的交互数据易删除、易篡改、无法确保数据的安全性和完备性的问题。The blockchain-based data protection method disclosed in the embodiment of the present application converts multi-source heterogeneous data into messages containing only the start time, end time, service type and data fingerprint, and stores them on the blockchain, which alleviates the problem of existing In the technology, it is necessary to record all the data and upload it one by one. The technical problem of excessive overhead of computing resources, storage resources and bandwidth resources of the blockchain is caused by the process. It can also solve the problem that the interactive data between customers and securities companies is easy to delete and easy to delete. The problem of tampering and inability to ensure the security and completeness of data.

附图说明Description of drawings

图1基于区块链的数据保护方法流程示意图;Figure 1 is a schematic flowchart of a data protection method based on blockchain;

图2基于区块链的数据保护装置组成示意图。Figure 2 is a schematic diagram of the composition of a data protection device based on blockchain.

具体实施方式Detailed ways

在这里专用的词“实施例”,作为“示例性”所说明的任何实施例不必解释为优于或好于其它实施例。本申请实施例中性能指标测试,除非特别说明,采用本领域常规试验方法。应理解,本申请中所述的术语仅仅是为描述特别的实施方式,并非用于限制本申请公开的内容。Where the word "embodiment" is used exclusively herein, any embodiment described as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments. In the performance index test in the examples of this application, unless otherwise specified, conventional test methods in the field are used. It should be understood that the terms described in this application are only used to describe particular embodiments, and are not used to limit the content disclosed in this application.

除非另有说明,否则本文使用的技术和科学术语具有本申请所属技术领域的普通技术人员通常理解的相同含义;作为本申请中其它未特别注明的试验方法和技术手段均指本领域内普通技术人员通常采用的实验方法和技术手段。Unless otherwise specified, the technical and scientific terms used herein have the same meaning as commonly understood by those of ordinary skill in the technical field to which this application belongs; as other test methods and technical means not specifically noted in this application, all refer to the common sense in the art The experimental methods and technical means commonly used by technicians.

本文所用的术语“基本”和“大约”用于描述小的波动。例如,它们可以是指小于或等于±5%,如小于或等于±2%,如小于或等于±1%,如小于或等于±0.5%,如小于或等于±0.2%,如小于或等于±0.1%,如小于或等于±0.05%。在本文中以范围格式表示或呈现的数值数据,仅为方便和简要起见使用,因此应灵活解释为不仅包括作为该范围的界限明确列举的数值,还包括该范围内包含的所有独立的数值或子范围。例如,“1~5%”的数值范围应被解释为不仅包括1%至5%的明确列举的值,还包括在所示范围内的独立值和子范围。因此,在这一数值范围中包括独立值,如2%、3.5%和4%,和子范围,如1%~3%、2%~4%和3%~5%等。这一原理同样适用于仅列举一个数值的范围。此外,无论该范围的宽度或所述特征如何,这样的解释都适用。本文述及的时间区域通常是由开始时间和结束时间确定的一段时间。As used herein, the terms "substantially" and "approximately" are used to describe small fluctuations. For example, they may mean less than or equal to ±5%, such as less than or equal to ±2%, such as less than or equal to ±1%, such as less than or equal to ±0.5%, such as less than or equal to ±0.2%, such as less than or equal to ± 0.1%, such as less than or equal to ±0.05%. Numerical data expressed or presented herein in a range format is used for convenience and brevity only, and should therefore be flexibly construed to include not only the values expressly recited as the limits of the range, but also all individual values subsumed within the range or sub range. For example, a numerical range of "1 to 5%" should be construed to include not only the expressly recited value of 1% to 5%, but also individual values and subranges within the indicated range. Accordingly, individual values, such as 2%, 3.5%, and 4%, and subranges, such as 1%-3%, 2%-4%, 3%-5%, and the like, are included in this numerical range. The same principle applies to ranges reciting only one numerical value. Furthermore, such interpretations apply regardless of the breadth of the range or the characteristics described. The time zone referred to herein is generally a period of time determined by a start time and an end time.

在本文中,包括权利要求书中,连接词,如“包含”、“包括”、“带有”、“具有”、“含有”、“涉及”、“容纳”等被理解为是开放性的,即是指“包括但不限于”。只有连接词“由……构成”和“由……组成”是封闭连接词。In this document, including the claims, conjunctions such as "comprising", "including", "with", "having", "containing", "involving", "containing" and the like are to be understood as being open-ended , which means "including but not limited to". Only the conjunctions "consisting of" and "consisting of" are closing conjunctions.

为了更好的说明本申请内容,在下文的具体实施例中给出了众多的具体细节。本领域技术人员应当理解,没有某些具体细节,本申请同样可以实施。在实施例中,对于本领域技术人员熟知的一些方法、手段、仪器、设备等未作详细描述,以便凸显本申请的主旨。In order to better illustrate the content of the present application, numerous specific details are given in the following specific embodiments. It should be understood by those skilled in the art that the present application may be practiced without certain specific details. In the embodiments, some methods, means, instruments, equipment, etc. that are well known to those skilled in the art are not described in detail, so as to highlight the gist of the present application.

在不冲突的前提下,本申请实施例公开的技术特征可以任意组合,得到的技术方案属于本申请实施例公开的内容。On the premise of no conflict, the technical features disclosed in the embodiments of the present application can be combined arbitrarily, and the obtained technical solutions belong to the contents disclosed in the embodiments of the present application.

以下结合实施例和附图1对基于区块链的数据保护方法、保护装置作进一步示例性说明。The block chain-based data protection method and protection device will be further exemplified below with reference to the embodiment and FIG. 1 .

在一些实施方式中,基于区块链的数据保护方法包括步骤:In some embodiments, a blockchain-based data protection method includes the steps of:

S1、数据采集步骤,对多源异构数据进行采集;S1, a data collection step, collecting multi-source heterogeneous data;

S2、数据处理步骤,将采集的多源异构数据处理为具有指定格式的数据流,并从数据流中抽取开始时间、结束时间、业务类型,将保护开始时间、结束时间、业务类型的数据段生成数据指纹;一般地,查询指定的开始时间和结束时间,将该时间区域内对应业务类型的全部数据,将全部数据转换成字节流,进而生成这段字节流的数据指纹;本文实施例述及的时间区域通常是由开始时间和结束时间确定的一段时间;S2. The data processing step: process the collected multi-source heterogeneous data into a data stream with a specified format, extract the start time, end time, and service type from the data stream, and protect the data of the start time, end time, and service type segment to generate data fingerprints; generally, query the specified start time and end time, convert all data of the corresponding service type in the time area, convert all data into byte streams, and then generate the data fingerprints of this byte stream; this paper The time zone mentioned in the embodiment is usually a period of time determined by the start time and the end time;

S3、数据封装步骤,将得到的开始时间、结束时间、业务类型和数据指纹拼装成报文;S3, the data encapsulation step, assembling the obtained start time, end time, service type and data fingerprint into a message;

S4、数据上链步骤,将拼装生成的报文存储在区块链上,原始数据仍然存储在本地数据库和/或本地文件中。S4, the data uploading step, store the assembled message on the blockchain, and the original data is still stored in the local database and/or local file.

一般地,客户与证券公司的交互数据包含:业务办理、重要通知、投资者教育、适当性管理、协议签署、规则学习、短信微信电话沟通内容、风险提示等重要的交互行为,每种业务的办理都会产生大量的后台数据。数据类型包含:图片、语音、数据库记录、日志文件等。根据客户的数据类型不同,存储在不同地方,如客户的交易流水数据存储在数据库,客户的协议签署文件存储在本地文件。点击阅读浏览等行为数据存储在大数据平台,实时数据存储在消息队列中如Kafka。将这些多源异构数据采集后进行统一处理,将采集的原始大规模数据加工成包含开始时间、结束时间、业务类型和数据指纹的数据流,生成统一的报文格式,经过分布式数据缓存,将报文上传到区块链上,原始多源异构数据仍然保存在证券公司的各业务系统的本地数据库及本地文件中,避免了区块链上其他参与者滥用;需要验证数据是否可信时,客户选定时间及业务类型,由于每种业务类型生产数据指纹时的开始时间、结束时间保存在原系统中,从原系统中查到指定时间所在的开始时间,结束时间,获取该业务类型在开始时间、结束时间之间的所有数据生成待验证数据指纹,与区块链上的数据指纹对照,如果一致证明数据可信。一方面,用来解决客户与证券公司的交互数据易删除、易篡改问题,无法确保数据的安全性完备性等问题,提升对投资者权益的保护;另一方面,缓解了现有技术中存在的将数据全部记录下来并逐一上链的过程所造成的区块链的计算资源、存储资源和带宽资源开销过大的技术问题。Generally, the interaction data between customers and securities companies includes: business handling, important notices, investor education, suitability management, agreement signing, rule learning, SMS, WeChat and telephone communication content, risk reminders and other important interaction behaviors. Processing will generate a large amount of background data. Data types include: pictures, voice, database records, log files, etc. Depending on the customer's data type, it is stored in different places. For example, the customer's transaction flow data is stored in the database, and the customer's agreement signing file is stored in a local file. Behavioral data such as click to read and browse are stored in the big data platform, and real-time data is stored in message queues such as Kafka. These multi-source heterogeneous data are collected and processed uniformly, and the collected raw large-scale data is processed into a data stream including start time, end time, business type and data fingerprint, and a unified message format is generated. After distributed data cache , upload the message to the blockchain, and the original multi-source heterogeneous data is still stored in the local database and local files of each business system of the securities company, avoiding abuse by other participants on the blockchain; it is necessary to verify whether the data can be When the customer selects the time and business type, since the start time and end time of each business type when producing data fingerprints are stored in the original system, the start time and end time of the specified time can be found from the original system to obtain the business. All data whose type is between the start time and the end time generate a data fingerprint to be verified, which is compared with the data fingerprint on the blockchain. If the data is consistent, it proves that the data is credible. On the one hand, it is used to solve the problems of easy deletion and tampering of the interactive data between customers and securities companies, and the inability to ensure the security and completeness of the data, so as to improve the protection of investors' rights and interests; The technical problem of excessive overhead of computing resources, storage resources and bandwidth resources of the blockchain caused by the process of recording all the data and uploading it to the chain one by one.

作为可选实施例,按设定的业务类型、时间区间选定所有相关数据,将该时间区间内的所有相关数据形成数据流,利用数据指纹生成器,生成区域数据的数据指纹。As an optional embodiment, all relevant data are selected according to the set service type and time interval, all relevant data in the time interval are formed into a data stream, and a data fingerprint generator is used to generate a data fingerprint of the regional data.

按业务类型、时间区间选定所有相关数据,该所有相关数据是指在选定的时间区间内某项业务的所有记录信息,时间区间可以是任何计时单位确定的时间段,例如,月、天、小时等;例如,2022年1月20号所有客户的股票交易数据,2022年1月20号所有客户的基金交易数据,2022年1月20号所有客户的开户数据。还可以是更细粒度的时间区域,如分钟、秒等,如2022年1月20号9点30到9点35的所有客户的股票交易数据,旨在减小单次生成数据指纹时数据处理的时间,也减小客户验证数据是否可信时所需的数据量和计算量。Select all relevant data by business type and time interval. All relevant data refers to all record information of a certain business in the selected time interval. The time interval can be a time period determined by any timing unit, such as month, day , hours, etc.; for example, the stock transaction data of all customers on January 20, 2022, the fund transaction data of all customers on January 20, 2022, and the account opening data of all customers on January 20, 2022. It can also be a more fine-grained time area, such as minutes, seconds, etc., such as the stock transaction data of all customers from 9:30 to 9:35 on January 20, 2022, aiming to reduce data processing when generating data fingerprints once It also reduces the amount of data and computation required by customers to verify whether the data is credible.

作为可选实施例,数据指纹生成器优选MD5值生成函数,生成的数据指纹为MD5值。As an optional embodiment, the data fingerprint generator preferably uses an MD5 value generating function, and the generated data fingerprint is an MD5 value.

作为可选实施例,基于区块链的数据保护方法生成的数据流具有设定的格式,一般地,数据流包括统一格式的数据流或特定格式的数据流,其中,统一格式包括JSON格式、avro格式,特定格式包括文件格式、图片格式、语音格式、视频格式。As an optional embodiment, the data stream generated by the blockchain-based data protection method has a set format. Generally, the data stream includes a data stream in a unified format or a data stream in a specific format, wherein the unified format includes JSON format, avro format, specific formats include file format, picture format, voice format, and video format.

作为可选实施例,基于区块链的数据保护方法的原始数据存储在本地数据库和/或本地文件中,其中,本地数据库包括关系型数据库和非关系型数据库。As an optional embodiment, the original data of the blockchain-based data protection method is stored in a local database and/or a local file, where the local database includes a relational database and a non-relational database.

作为可选实施例,基于区块链的数据保护方法还包括数据认证步骤,具体包括:As an optional embodiment, the blockchain-based data protection method further includes a data authentication step, which specifically includes:

S5、依照选定的开始时间、结束时间、业务类型将本地数据库和本地文件中的数据生成待验证数据指纹;一般地,需要验证本地数据库和/或本地文件中的数据是否被篡改或是否可信,可以选定一个特定的时间区域和一个特定的业务类型,然后将该时间区域内的业务类型的所有数据,生成待验证数据指纹;一般地,选定的特定时间区域比较短,以便该时间区域包含的数据量小,缩短生成数据指纹的处理时间,提高数据传输效率,提高验证效率;一般地,在更细时间粒度上对数据进行切分,能够实现对本地数据是否可信的验证。S5. Generate a data fingerprint to be verified from the data in the local database and the local file according to the selected start time, end time, and business type; generally, it is necessary to verify whether the data in the local database and/or the local file has been tampered with or whether it can be verified. A specific time zone and a specific service type can be selected, and then all the data of the service type in the time zone can be used to generate the data fingerprint to be verified; generally, the selected specific time zone is relatively short, so that the The time area contains a small amount of data, which shortens the processing time for generating data fingerprints, improves data transmission efficiency, and improves verification efficiency; generally, data segmentation at a finer time granularity can verify whether the local data is credible. .

S6、将生成的待验证数据指纹与区块链上存储的与开始时间、结束时间、业务类型相对应的报文中的数据指纹进行比较,若二者一致,则本地数据库和/或本地文件中的数据可信。一般地,待验证数据指纹所包含的开始时间、结束时间与区块链上存储的数据指纹所包含的开始时间、结束时间相对应。S6. Compare the generated data fingerprint to be verified with the data fingerprint stored in the block chain in the message corresponding to the start time, end time, and service type. If the two are consistent, then the local database and/or local file The data in can be trusted. Generally, the start time and end time included in the data fingerprint to be verified correspond to the start time and end time included in the data fingerprint stored on the blockchain.

作为可选实施例,基于区块链的数据保护方法还包括数据缓存步骤,将生成的待上链报文存储在消息中间件中。较为优选的实施例为存在Kafka中,防止数据交互时数据量过大造成区块链系统过载。可以全部数据流放入一个Kafka topic,也可以按业务划分到多个Topic。As an optional embodiment, the blockchain-based data protection method further includes a data caching step of storing the generated message to be uploaded in the message middleware. A more preferred embodiment is stored in Kafka to prevent the blockchain system from being overloaded due to the excessive amount of data during data interaction. All data streams can be put into one Kafka topic, or divided into multiple topics by business.

作为可选实施例,将报文转存至区块链的过程包括:As an optional embodiment, the process of transferring the message to the blockchain includes:

权限认证步骤,数据查验者输入申请权限,进行身份和权限验证;In the authorization authentication step, the data verifier enters the application authorization for identity and authorization verification;

请求步骤,向区块链服务器发起连接请求;The request step is to initiate a connection request to the blockchain server;

连接步骤,与被请求的区块链服务器建立连接;The connection step is to establish a connection with the requested blockchain server;

上传步骤,将报文上传至选中的区块链服务器。Upload step, upload the message to the selected blockchain server.

作为可选实施例,基于区块链的数据保护装置还包括数据调度步骤,将将业务系统数据作为数据采集对象,将所述数据采集对象加入调度列表中,并设置数据监控的时间间隔和数据采集的时间间隔。按照预设时间采集相关业务系统数据,作为可选实施例,对于不同业务系统数据的采集时间设定不同的时间间隔,如某些业务系统的采集间隔设置为每5分钟,另一些业务系统的采集间隔设置为每小时,还有一些业务系统的采集间隔设置为全天。As an optional embodiment, the blockchain-based data protection device further includes a data scheduling step, which takes the business system data as a data collection object, adds the data collection object to the scheduling list, and sets the time interval and data for data monitoring. Collection time interval. Collect relevant business system data according to the preset time. As an optional embodiment, different time intervals are set for the collection time of different business system data. For example, the collection interval of some business systems is set to every 5 minutes, and the The collection interval is set to every hour, and the collection interval of some business systems is set to all day.

一些实施方式公开的基于区块链的数据保护装置,用于执行基于区块链的数据保护方法,数据保护装置包括:A blockchain-based data protection device disclosed in some embodiments is used to execute a blockchain-based data protection method, and the data protection device includes:

数据采集模块,配置用于采集多源异构数据;一般地,客户与证券公司的交互数据包含:业务办理、重要通知、投资者教育、适当性管理、协议签署、规则学习、短信微信电话沟通内容、风险提示等重要的交互行为,每种业务的办理都会产生大量的后台数据;数据类型包含:图片、语音、数据库记录、日志文件等。根据客户的数据类型不同,存储在不同地方,如客户的交易流水数据存储在数据库,客户的协议签署文件存储在本地文件;点击阅读浏览等行为数据存储在大数据平台,实时数据存储在消息队列中如Kafka;The data collection module is configured to collect multi-source heterogeneous data; generally, the interaction data between customers and securities companies includes: business processing, important notices, investor education, suitability management, agreement signing, rule learning, SMS, WeChat and telephone communication For important interactive behaviors such as content and risk warnings, the processing of each business will generate a large amount of background data; data types include: pictures, voices, database records, log files, etc. Depending on the type of customer data, it is stored in different places. For example, the customer's transaction flow data is stored in the database, and the customer's agreement signing file is stored in the local file; behavior data such as click, read and browse are stored in the big data platform, and real-time data is stored in the message queue. Such as Kafka;

数据处理模块,配置用于将采集的多源异构数据处理为具有指定格式的数据流,并从数据流中抽取时间区域的开始时间、结束时间、业务类型,生成数据指纹的数据流;作为可选实施例,按设定的业务类型、时间区间选定所有相关数据,将该时间区间内的所有相关数据形成数据流,利用数据指纹生成器,生成区域数据的数据指纹。一般地,按业务类型、时间区间选定所有相关数据,该所有相关数据是指在选定的时间区间内某项业务的所有记录信息,时间区间可以是任何计时单位确定的时间段,例如,月、天、小时等;例如,2022年1月20号所有客户的股票交易数据,2022年1月20号所有客户的基金交易数据,2022年1月20号所有客户的开户数据。还可以是更细粒度的时间区域,如分钟、秒等,如2022年1月20号9点30到9点35的所有客户的股票交易数据,旨在减小单次生成数据指纹时数据处理的时间,也减小客户验证数据是否可信时所需的数据量和计算量;The data processing module is configured to process the collected multi-source heterogeneous data into a data stream with a specified format, and extract the start time, end time, and service type of the time zone from the data stream, and generate a data stream of data fingerprints; In an optional embodiment, all relevant data are selected according to a set service type and time interval, all relevant data in the time interval are formed into a data stream, and a data fingerprint generator is used to generate a data fingerprint of the regional data. Generally, all relevant data are selected according to the service type and time interval, and the all relevant data refers to all the record information of a certain service in the selected time interval, and the time interval can be a time period determined by any timing unit, for example, Month, day, hour, etc.; for example, the stock transaction data of all customers on January 20, 2022, the fund transaction data of all customers on January 20, 2022, and the account opening data of all customers on January 20, 2022. It can also be a more fine-grained time area, such as minutes, seconds, etc., such as the stock transaction data of all customers from 9:30 to 9:35 on January 20, 2022, aiming to reduce data processing when generating data fingerprints once It also reduces the amount of data and calculation required by customers to verify whether the data is credible;

作为可选实施例,数据指纹生成器优选MD5值生成函数;As an optional embodiment, the data fingerprint generator preferably MD5 value generation function;

封装模块,配置为将得到的时间区域开始时间、结束时间、业务类型和数据指纹数据流生成统一格式的报文;例如,封装模块将目标数据提取并将提取的目标数据字段封装进报文,该字段包含业务类型、开始时间、结束时间、数据指纹;The encapsulation module is configured to generate a uniform format message from the obtained time zone start time, end time, service type and data fingerprint data stream; for example, the encapsulation module extracts the target data and encapsulates the extracted target data field into the message, This field contains service type, start time, end time, and data fingerprint;

数据上链模块,配置为将生成的报文转存至区块链。一般地,数据上链模块从消息中间件读取消息,将封装有目标数据字段的报文转存至区块链平台,例如,较为优选有公信力的区块链平台,如上证链。The data uploading module is configured to transfer the generated message to the blockchain. Generally, the data uploading module reads the message from the message middleware, and transfers the message encapsulated with the target data field to the blockchain platform. For example, a credible blockchain platform such as SSE is preferable.

作为可选实施例,基于区块链的数据保护装置还包括数据认证模块,配置为依照选定的开始时间、结束时间、业务类型将本地数据库和本地文件中的数据生成待验证数据指纹;将生成的待验证数据指纹与区块链上存储的与选定开始时间、结束时间、业务类型相对应的报文中的数据指纹进行比较,若二者一致,则本地数据库和/或本地文件中的数据可信。As an optional embodiment, the blockchain-based data protection device further includes a data authentication module, configured to generate a data fingerprint to be verified from the data in the local database and the local file according to the selected start time, end time, and business type; The generated data fingerprint to be verified is compared with the data fingerprint in the message corresponding to the selected start time, end time, and business type stored on the blockchain. data is credible.

基于区块链的数据保护装置将多源异构数据采集后进行统一处理,将采集的原始大规模数据加工成包含开始时间、结束时间、业务类型和数据指纹的数据流,生成统一的报文格式,经过分布式数据缓存,将报文上传到区块链上,原始多源异构数据仍然保存在证券公司的各业务系统的本地数据库及本地文件中,避免了区块链上其他参与者滥用;需要验证数据是否可信时,客户选定时间区域及业务类型生成待验证数据指纹,与区块链上的数据指纹对照,如果一致证明数据可信。The blockchain-based data protection device collects multi-source heterogeneous data for unified processing, processes the collected original large-scale data into a data stream including start time, end time, business type and data fingerprint, and generates a unified message Format, through distributed data caching, the message is uploaded to the blockchain, and the original multi-source heterogeneous data is still stored in the local database and local files of each business system of the securities company, avoiding other participants on the blockchain. Abuse; when it is necessary to verify whether the data is credible, the customer selects the time zone and business type to generate the data fingerprint to be verified, and compares it with the data fingerprint on the blockchain. If the data is consistent, it proves that the data is credible.

作为可选实施例,基于区块链的数据保护装置还包括数据缓存模块,配置为将待上链的报文储存储在消息中间件中。较为优选的实施例为待上链的报文存储在Kafka中,防止数据交互时数据量过大造成区块链系统过载。可以将全部报文放入一个kafka topic,也可以将全部报文按业务划分分别放入到多个Topic。实现对报文的分类缓存并提供报文输出接口。As an optional embodiment, the blockchain-based data protection device further includes a data cache module configured to store the message to be uploaded on the chain in the message middleware. A more preferred embodiment is that the message to be uploaded is stored in Kafka to prevent the blockchain system from being overloaded due to the excessive amount of data during data interaction. You can put all the packets into one kafka topic, or you can put all the packets into multiple topics by business division. It implements the classification and caching of packets and provides a packet output interface.

作为可选实施例,基于区块链的数据保护装置还包括调度模块,配置用于控制数据采集模块的数据采集,具体地,将业务系统数据作为数据采集对象,将所述数据采集对象加入调度列表中,并设置数据监控的时间间隔和数据采集的时间间隔。按照预设时间采集相关业务系统数据,作为可选实施例,对于不同业务系统数据的采集时间设定不同的时间间隔,如某些业务系统的采集间隔设置为每5分钟,另一些业务系统的采集间隔设置为每小时,还有一些业务系统的采集间隔设置为全天。As an optional embodiment, the blockchain-based data protection device further includes a scheduling module configured to control the data collection of the data collection module. Specifically, the business system data is used as the data collection object, and the data collection object is added to the scheduling list, and set the data monitoring time interval and data collection time interval. Collect relevant business system data according to the preset time. As an optional embodiment, different time intervals are set for the collection time of different business system data. For example, the collection interval of some business systems is set to every 5 minutes, and the The collection interval is set to every hour, and the collection interval of some business systems is set to all day.

作为可选实施例,数据上链模块具体包括:权限认证单元,用于认证查验者的权限;请求单元,用于向区块链服务器发起连接请求;连接单元,用于向请求的区块链服务器建立连接;上传单元,用于向区块链服务器上传报文。例如,以POST形式向区块链发送数据上链请求,并接收返回报文;如果发现返回失败信息则可以再次进行数据上链请求;服务器返回的状态码若为1,表示上链成功,若为-1,则表示失败。As an optional embodiment, the data uploading module specifically includes: an authority authentication unit, used to authenticate the authority of the checker; a request unit, used to initiate a connection request to the blockchain server; a connection unit, used to request the blockchain The server establishes a connection; the uploading unit is used to upload messages to the blockchain server. For example, a data upload request is sent to the blockchain in the form of POST, and a return message is received; if the failure information is found, the data upload request can be made again; if the status code returned by the server is 1, it means that the chain is successful, if -1 means failure.

本申请实施例公开的基于区块链的数据保护方法,将多源异构数据转化为仅包含开始时间、结束时间、业务类型和数据指纹的报文存储在区块链上,缓解了现有技术中需要将全部数据记录下来并逐一上链的过程所造成的区块链的计算资源、存储资源和带宽资源开销过大的技术问题,还能够解决客户与证券公司的交互数据易删除、易篡改、无法确保数据的安全性和完备性的问题。The blockchain-based data protection method disclosed in the embodiment of the present application converts multi-source heterogeneous data into messages containing only the start time, end time, service type and data fingerprint, and stores them on the blockchain, which alleviates the problem of existing In the technology, it is necessary to record all the data and upload it one by one. The technical problem of excessive overhead of computing resources, storage resources and bandwidth resources of the blockchain is caused by the process. It can also solve the problem that the interactive data between customers and securities companies is easy to delete and easy to delete. The problem of tampering and inability to ensure the security and completeness of data.

本申请公开的技术方案和实施例中公开的技术细节,仅是示例性说明本申请的发明构思,并不构成对本申请技术方案的限定,凡是对本申请公开的技术细节所做的常规改变、替换或组合等,都与本申请具有相同的发明构思,都在本申请权利要求的保护范围之内。The technical solutions disclosed in the application and the technical details disclosed in the examples are only illustrative of the inventive concept of the application, and do not constitute a limitation on the technical solutions of the application. Any conventional changes and replacements made to the technical details disclosed in the application Or combinations, etc., all have the same inventive concept as the present application, and all fall within the protection scope of the claims of the present application.

Claims (10)

1.基于区块链的数据保护方法,其特征在于,包括步骤:1. A data protection method based on blockchain, characterized in that it comprises the steps: S1、采集多源异构数据;S1. Collect multi-source heterogeneous data; S2、将采集的多源异构数据处理为具有指定格式的数据流,并从所述数据流中抽出开始时间、结束时间、业务类型,生成数据指纹;S2, processing the collected multi-source heterogeneous data into a data stream with a specified format, and extracting the start time, end time, and service type from the data stream to generate a data fingerprint; S3、将得到的开始时间、结束时间、业务类型和数据指纹拼装成报文;S3. Assemble the obtained start time, end time, service type and data fingerprint into a message; S4、将拼装成的报文存储在区块链上,原始数据仍然存储在本地数据库和/或本地文件中。S4. Store the assembled message on the blockchain, and the original data is still stored in the local database and/or local file. 2.根据权利要求1所述的基于区块链的数据保护方法,其特征在于,还包括步骤:2. The blockchain-based data protection method according to claim 1, further comprising the steps of: S5、依照选定的开始时间、结束时间、业务类型将本地数据库和/或本地文件中的数据生成待验证数据指纹;S5. Generate a data fingerprint to be verified from the data in the local database and/or the local file according to the selected start time, end time, and business type; S6、将生成的待验证数据指纹与区块链上存储的与开始时间、结束时间、业务类型相对应的报文中的数据指纹进行比较,若二者一致,则本地数据库和/或本地文件中的数据可信。S6. Compare the generated data fingerprint to be verified with the data fingerprint stored in the block chain in the message corresponding to the start time, end time, and service type. If the two are consistent, then the local database and/or local file The data in can be trusted. 3.根据权利要求1所述的基于区块链的数据保护方法,其特征在于,所述数据指纹为MD5值。3. The blockchain-based data protection method according to claim 1, wherein the data fingerprint is an MD5 value. 4.根据权利要求1所述的基于区块链的数据保护方法,其特征在于,所述指定格式的数据流包括统一格式的数据流或特定格式的数据流,其中,所述统一格式包括JSON格式、avro格式,所述特定格式包括文本格式、图片格式、语音格式、视频格式。4. The data protection method based on blockchain according to claim 1, wherein the data stream of the specified format comprises a data stream of a unified format or a data stream of a specific format, wherein the unified format comprises JSON Format, avro format, the specific format includes text format, picture format, voice format, video format. 5.根据权利要求1所述的基于区块链的数据保护方法,其特征在于,所述本地数据库包括关系型数据库和非关系型数据库。5 . The data protection method based on blockchain according to claim 1 , wherein the local database includes a relational database and a non-relational database. 6 . 6.基于区块链的数据保护装置,用于执行权利要求1~5任一项所述的数据保护方法,其特征在于,包括:6. A block chain-based data protection device for implementing the data protection method according to any one of claims 1 to 5, characterized in that, comprising: 数据采集模块,配置用于采集多源异构数据;Data acquisition module, configured to collect multi-source heterogeneous data; 数据处理模块,配置用于将采集的多源异构数据处理为具有指定格式的数据流,并从数据流中抽取开始时间、结束时间、业务类型,生成数据指纹;The data processing module is configured to process the collected multi-source heterogeneous data into a data stream with a specified format, and extract the start time, end time, and service type from the data stream to generate a data fingerprint; 封装模块,配置为将得到的开始时间、结束时间、业务类型和数据指纹拼装成报文;The encapsulation module is configured to assemble the obtained start time, end time, service type and data fingerprint into a message; 数据上链模块,配置为将拼装成的报文转存至区块链。The data uploading module is configured to transfer the assembled message to the blockchain. 7.根据权利要求6所述的基于区块链的数据保护装置,其特征在于,还包括:7. The blockchain-based data protection device according to claim 6, further comprising: 数据认证模块,配置为依照选定的开始时间、结束时间、业务类型将本地数据库和/或本地文件中的数据生成待验证数据指纹;将生成的待验证数据指纹与区块链上存储的与开始时间、结束时间、业务类型相对应的报文中的数据指纹进行比较,若二者一致,则本地数据库和/或本地文件中的数据可信。The data authentication module is configured to generate a data fingerprint to be verified from the data in the local database and/or local file according to the selected start time, end time and business type; The data fingerprints in the packets corresponding to the start time, end time, and service type are compared, and if the two are consistent, the data in the local database and/or the local file is credible. 8.根据权利要求6所述的基于区块链的数据保护装置,其特征在于,还包括所数据缓存模块,配置为将待上链的报文储存储在消息中间件中。8 . The blockchain-based data protection device according to claim 6 , further comprising a data cache module configured to store the messages to be uploaded on the chain in the message middleware. 9 . 9.根据权利要求6所述的基于区块链的数据保护装置,其特征在于,还包括调度模块,配置用于控制数据采集模块的数据采集。9 . The blockchain-based data protection device according to claim 6 , further comprising a scheduling module configured to control data collection of the data collection module. 10 . 10.根据权利要求6所述的基于区块链的数据保护装置,其特征在于,所述数据上链模块具体包括:10. The blockchain-based data protection device according to claim 6, wherein the data uploading module specifically comprises: 权限认证单元,用于认证查验者的权限;The authority authentication unit, which is used to authenticate the authority of the checker; 请求单元,用于向区块链服务器发起连接请求;The request unit is used to initiate a connection request to the blockchain server; 连接单元,用于向请求的区块链服务器建立连接;A connection unit for establishing a connection to the requested blockchain server; 上传单元,用于向区块链服务器上传报文。The uploading unit is used to upload messages to the blockchain server.
CN202210257313.XA 2022-03-16 2022-03-16 Data protection method and protection device based on block chain Pending CN114626849A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210257313.XA CN114626849A (en) 2022-03-16 2022-03-16 Data protection method and protection device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210257313.XA CN114626849A (en) 2022-03-16 2022-03-16 Data protection method and protection device based on block chain

Publications (1)

Publication Number Publication Date
CN114626849A true CN114626849A (en) 2022-06-14

Family

ID=81901703

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210257313.XA Pending CN114626849A (en) 2022-03-16 2022-03-16 Data protection method and protection device based on block chain

Country Status (1)

Country Link
CN (1) CN114626849A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116668451A (en) * 2023-04-10 2023-08-29 中泰证券股份有限公司 Data storage method, equipment and medium for securities business

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040012A (en) * 2018-06-19 2018-12-18 西安电子科技大学 A kind of data security protecting and sharing method based on block chain and system and application
CN112100265A (en) * 2020-09-17 2020-12-18 博雅正链(北京)科技有限公司 Multi-source data processing method and device for big data architecture and blockchain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040012A (en) * 2018-06-19 2018-12-18 西安电子科技大学 A kind of data security protecting and sharing method based on block chain and system and application
CN112100265A (en) * 2020-09-17 2020-12-18 博雅正链(北京)科技有限公司 Multi-source data processing method and device for big data architecture and blockchain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
广东大中信息技术有限公司: "数据治理分析系统解决方案", pages 1, Retrieved from the Internet <URL:http://www.security-cms.com/m/newsdetail.aspx?code=0206&id=125> *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116668451A (en) * 2023-04-10 2023-08-29 中泰证券股份有限公司 Data storage method, equipment and medium for securities business
CN116668451B (en) * 2023-04-10 2024-01-23 中泰证券股份有限公司 Data storage method, equipment and medium for securities business

Similar Documents

Publication Publication Date Title
CN108809932B (en) Block chain-based deposit certificate system, method and readable medium
CN109034833B (en) A blockchain-based product traceability information management system and method
US7503070B1 (en) Methods and systems for enabling analysis of communication content while preserving confidentiality
CN113438084A (en) Green power source tracing method and system based on R-PBFT consensus algorithm and timestamp
CN110287186B (en) Smart power grid data management system and method based on master block chaining technology
CN109492431A (en) Financial data storage method and system and electronic device
CN112084529B (en) Method and system for encrypting and accessing private data based on blockchain technology for community
CN113792308A (en) Government affair sensitive data oriented security behavior risk analysis method
CN112488714A (en) Method for linking remark field based on block chain transaction process
Liang et al. Research on IoT forensics system based on blockchain technology
Hulak et al. Ensuring Data Security in the Peer-to-Peer Economic System of the DAO
CN112532718A (en) Block chain based offshore equipment data sharing system, method and medium
CN112507304A (en) Information management system for retired soldiers
CN110909381A (en) Block chain-based user comment tamper-proof system and method
CN114626849A (en) Data protection method and protection device based on block chain
CN111931239A (en) Data leakage prevention system for database security protection
Peng et al. Research on blockchain technology and media industry applications in the context of big data
US20240305490A1 (en) Blockchain-based data processing method, device, medium, and program product
CN112532395B (en) Block chain-based data credit system, method and medium
CN109801189A (en) A kind of block chain residential property application
CN112000963A (en) Transaction privacy information verification method and verification system based on block chain
CN116049877B (en) Method, system, equipment and storage medium for identifying and desensitizing private data
CN113938694B (en) Method for realizing safe broadcasting control from recording broadcasting to live broadcasting
CN105704126A (en) Audio audit method and system based on watermarks
Heo et al. Understanding block and transaction logs of permissionless blockchain networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination