CN115134150A - Block chain-based data acquisition method and system, storage medium and electronic device - Google Patents

Block chain-based data acquisition method and system, storage medium and electronic device Download PDF

Info

Publication number
CN115134150A
CN115134150A CN202210751793.5A CN202210751793A CN115134150A CN 115134150 A CN115134150 A CN 115134150A CN 202210751793 A CN202210751793 A CN 202210751793A CN 115134150 A CN115134150 A CN 115134150A
Authority
CN
China
Prior art keywords
query
data
group
data acquisition
encrypted data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210751793.5A
Other languages
Chinese (zh)
Inventor
夏明宇
曾现元
陈月珠
陈婉仪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202210751793.5A priority Critical patent/CN115134150A/en
Publication of CN115134150A publication Critical patent/CN115134150A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data acquisition method, a data acquisition system, a storage medium and an electronic device based on a block chain. Relates to the technical field of block chains, and the method comprises the following steps: acquiring a query request initiated by a query object and identity information of the query object through a data acquisition group; verifying the identity information of the query object through the authority management group, and verifying the query authority of the query request under the condition that the identity information is verified; under the condition that the query authority passes the verification, acquiring a query result corresponding to the query request from the database through the data acquisition group; and encrypting the query result through the data encryption group to generate encrypted data and a decryption key, sending the decryption key to the query object, and sending the encrypted data to the query object under the condition of receiving the data acquisition instruction. By the method and the device, the problems of low efficiency and long time consumption of background users for acquiring the service data in the related technology are solved.

Description

Block chain-based data acquisition method and system, storage medium and electronic device
Technical Field
The present application relates to the field of blockchains and financial technologies, and in particular, to a method, a system, a storage medium, and an electronic device for obtaining data based on blockchains.
Background
In the field of financial science and technology, a system used by a bank is large in scale and has a lot of data to be processed, while in the process of developing and maintaining a bank background transaction system, related technical personnel often need to access real-time data in production, but in order to maintain the data security of the bank, when background maintenance and development personnel acquire production data, the operation and maintenance personnel can acquire the production data under the assistance of multi-party approval confirmation. Although the mode of acquiring the production data maintains the safety of the production data to a great extent, much time is consumed when the production problem is solved and the production data needs to be acquired to determine a subsequent development decision, and the problem solving efficiency is reduced.
Aiming at the problems of low efficiency and long time consumption of background users for acquiring service data in the related art, no effective solution is provided at present.
Disclosure of Invention
The present application mainly aims to provide a data acquisition method, a system, a storage medium and an electronic device based on a block chain, so as to solve the problems of low efficiency and long time consumption of background users for acquiring service data in the related art.
To achieve the above object, according to one aspect of the present application, a data acquisition method based on a blockchain is provided. The method comprises the following steps: acquiring a query request initiated by a query object and identity information of the query object through a data acquisition group, wherein the data acquisition group comprises a plurality of data acquisition nodes on a block chain; verifying the identity information of the query object through an authority management group, and verifying the query authority of the query request under the condition that the identity information is verified, wherein the authority management group comprises a plurality of authority management nodes on a block chain; under the condition that the query authority passes the verification, acquiring a query result corresponding to the query request from the database through the data acquisition group; the method comprises the steps of encrypting a query result through a data encryption group to generate encrypted data and a decryption key, sending the decryption key to a query object, detecting whether a data acquisition instruction sent by the query object is received, and sending encrypted data to the query object under the condition that the data acquisition instruction is received, wherein the data encryption group comprises a plurality of data encryption nodes on a block chain.
Optionally, verifying the identity information of the query object through the rights management group includes: determining account information corresponding to the identity information, and inquiring a mapping relation table according to the account information to obtain terminal equipment corresponding to the account information, wherein the mapping relation table stores a plurality of account information and equipment identification information corresponding to each account information; sending a verification code to the terminal equipment, and detecting whether the verification code fed back by the terminal equipment is received; and determining that the identity information of the query object passes the verification under the condition of detecting the verification code fed back by the terminal equipment.
Optionally, in a case that the identity information is verified, verifying the query authority of the query request includes: verifying whether the statement of the query request meets the condition; and/or verifying whether the attribute of the query request meets the condition, wherein the attribute at least comprises one of the following items: query volume, query range, query reason.
Optionally, after acquiring the query request initiated by the query object through the data acquisition group, the method further includes: converting the query request into a target format, wherein the target format is a format identified by the database; before obtaining a query result corresponding to the query request from the database, the method further includes: and verifying the performability of the query request, and under the condition that the performability verification is passed, executing the step of acquiring a query result corresponding to the query request from the database.
Optionally, after encrypting the query result by the data encryption group to generate encrypted data and a decryption key, and sending the decryption key to the query object, the method further includes: detecting whether the encrypted data is sent to a query object through a data lifecycle management group, wherein the lifecycle management group comprises a plurality of lifecycle management nodes on a blockchain; clearing the encrypted data cached in the data acquisition group under the condition that the encrypted data is sent to the query object; under the condition that the encrypted data are not sent to the query object, judging whether the acquisition time of the encrypted data is longer than a first preset time length; and clearing the encrypted data cached in the data acquisition group under the condition that the acquisition time of the encrypted data is longer than a first preset time length.
Optionally, in a case that the encrypted data is not sent to the query object, after determining whether the obtaining time of the encrypted data is greater than a first preset time, the method further includes: under the condition that the acquisition time of the encrypted data is less than a first preset time length, judging whether the acquisition time of the encrypted data is greater than a second preset time length, wherein the second preset time length is less than the first preset time length; when the acquisition time of the encrypted data is longer than a second preset time, re-encrypting the query result through the data encryption group to obtain updated encrypted data and an updated decryption key, and sending the updated decryption key to the query object; and judging whether the number of times of re-encrypting the query result by the data encryption group is greater than the preset number of times, and clearing the encrypted data cached in the data acquisition group under the condition that the number of times is greater than the preset number of times.
To achieve the above object, according to another aspect of the present application, a data acquisition system based on a blockchain is provided. The system comprises: the data acquisition group is used for acquiring a query request initiated by a query object and identity information of the query object, and acquiring a query result corresponding to the query request from the database under the condition that the identity information of the query object and the query authority of the query request are verified, wherein the data acquisition group comprises a plurality of data acquisition nodes on a block chain; the system comprises a permission management group, a query request and a service management group, wherein the permission management group is used for verifying identity information of a query object and verifying query permission of the query request under the condition that the identity information passes verification, and comprises a plurality of permission management nodes on a block chain; and the data encryption group is used for encrypting the query result, generating encrypted data and a decryption key, sending the decryption key to the query object, detecting whether a data acquisition instruction sent by the query object is received, and sending the encrypted data to the query object under the condition of receiving the data acquisition instruction, wherein the data encryption group comprises a plurality of data encryption nodes on the block chain.
Optionally, the system further comprises: the terminal equipment comprises a user interface and an identity information identification control, wherein the user interface is used for receiving a query request input by a query object and triggering the operation of initiating the query request to the data acquisition group, and is also used for displaying a verification code returned by the authority management group based on the identity information and receiving the verification code input by the query object so as to verify the identity information through the authority management group; the identity information identification control is used for identifying the identity information of the query object, wherein the identity information identification control at least comprises one of the following components: fingerprint identification control, face identification control.
Optionally, the system further comprises: the data life cycle management group is used for clearing the encrypted data cached in the data acquisition group under the condition that the encrypted data are sent to the query object; under the condition that the encrypted data are not sent to the query object, if the obtaining time of the encrypted data is longer than a first preset time length, the encrypted data cached in the data obtaining group are cleared, if the obtaining time of the encrypted data is shorter than the first preset time length and longer than a second preset time length, the query result is encrypted again through the data encryption group, if the number of times of encrypting the query result again through the data encryption group is larger than the preset number, the encrypted data cached in the data obtaining group are cleared, and the life cycle management group comprises a plurality of life cycle management nodes on the block chain.
In order to achieve the above object, according to another aspect of the present application, there is provided a data acquisition apparatus based on a blockchain. The device includes: the first acquisition unit is used for acquiring an inquiry request initiated by an inquiry object and identity information of the inquiry object; the verification unit is used for verifying the identity information of the query object and verifying the query authority of the query request under the condition that the identity information passes verification; the second acquisition unit is used for acquiring the query result corresponding to the query request from the database under the condition that the query authority passes the verification; and the encryption unit is used for encrypting the query result, generating encrypted data and a decryption key, sending the decryption key to the query object, detecting whether a data acquisition instruction sent by the query object is received, and sending the encrypted data to the query object under the condition of receiving the data acquisition instruction.
According to another aspect of the embodiments of the present invention, a computer storage medium is further provided, where the computer storage medium is used to store a program, where the program controls a device in which the nonvolatile storage medium is located to execute a data acquisition method based on a block chain when the program is running.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, including a processor and a memory; the memory has stored therein computer readable instructions, and the processor is configured to execute the computer readable instructions, wherein the computer readable instructions are configured to execute a method for block chain based data acquisition.
Through the application, the following steps are adopted: acquiring a query request initiated by a query object and identity information of the query object through a data acquisition group; verifying the identity information of the query object through the authority management group, and verifying the query authority of the query request under the condition that the identity information is verified; under the condition that the query authority passes the verification, acquiring a query result corresponding to the query request from the database through the data acquisition group; the method comprises the steps of encrypting a query result through a data encryption group to generate encrypted data and a decryption key, sending the decryption key to a query object, detecting whether a data acquisition instruction sent by the query object is received, and sending the encrypted data to the query object under the condition that the data acquisition instruction is received, so that the problems of low efficiency and long time consumption of background users for acquiring service data in the related art are solved. Through the process that the data acquisition group, the authority management group and the data encryption group participate in data query together, the effects of high efficiency and time saving of the background user for acquiring the service data are achieved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
fig. 1 is a flowchart of a block chain-based data acquisition method according to an embodiment of the present application;
fig. 2 is a block diagram of a data acquisition system based on a blockchain according to an embodiment of the present disclosure;
fig. 3 is a flowchart of a data acquisition method based on a blockchain according to an embodiment of the present application;
fig. 4 is a block diagram of a terminal device provided according to an embodiment of the present application;
fig. 5 is a schematic electronic device diagram of a data acquisition method based on a blockchain according to an embodiment of the present application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, the user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for presentation, analyzed data, etc.) referred to in the present disclosure are information and data authorized by the user or sufficiently authorized by each party.
The present invention is described below with reference to preferred implementation steps, and fig. 1 is a flowchart of a data acquisition method based on a block chain according to an embodiment of the present application, as shown in fig. 1, the method includes the following steps:
step S101, a query request initiated by a query object and identity information of the query object are obtained through a data obtaining group, wherein the data obtaining group comprises a plurality of data obtaining nodes on a block chain.
Specifically, the query object initiates a query request on the terminal device, the terminal device serves as a query auxiliary device, and uploads the query request and identity information of the query object to a data acquisition node of the block chain, where the query object may be an operation and maintenance user, the query request may be used to request to acquire service data from a database to support operation and maintenance work, and the identity information of the query object may include information such as an account and a password.
Step S102, the identity information of the query object is verified through an authority management group, and the query authority of the query request is verified under the condition that the identity information is verified, wherein the authority management group comprises a plurality of authority management nodes on a block chain.
Specifically, after receiving the query request information stored in the blockchain, the rights management group may send an authentication code to the query assisting apparatus of the user to verify the user identity, and after the user identity, convert and check the query statement to verify the query right of the query request.
And step S103, acquiring a query result corresponding to the query request from the database through the data acquisition group under the condition that the query authority passes the verification.
Specifically, after the query request is checked and approved by the right management group, data query is performed in the database through the data acquisition group, and a query result corresponding to the query request is acquired.
And step S104, encrypting the query result through a data encryption group to generate encrypted data and a decryption key, sending the decryption key to the query object, detecting whether a data acquisition instruction sent by the query object is received, and sending the encrypted data to the query object under the condition of receiving the data acquisition instruction, wherein the data encryption group comprises a plurality of data encryption nodes on the block chain.
Specifically, after the query result is obtained, the query result is encrypted according to a pre-deployed encryption algorithm to obtain encrypted data, the encrypted data is uploaded to a block chain to wait for a user to obtain the encrypted data, a decryption key is generated and sent to the user, the user sends a data obtaining instruction after receiving the decryption key, and the data encryption group sends the encrypted data to the user after detecting the instruction.
In an alternative embodiment, the query result may be encrypted using SM9 algorithm, and the key of SM9 algorithm is generated by KGC (key generation center), mainly comprising the encrypted master key pair of KGC and the private key of the user. Data encryption master key pair: the private key is a random number in the range of [1, N-1 ]; the public key is a multiple point of a base point P1 of the G1 group, the multiple being the private key. The public and private keys of the master key pair are used in different scenes, wherein the master private key is only used for inquiring the private key of the user; the master public key is published by KGC and used on the chain. The inquiry user private key is generated by the KGC and comprises a signature private key and an encryption private key. Signature private key: is a multiple point of the base point P1 of the G1 group. The private signature key is only used in digital signature; and (3) encrypting a private key: a multiple point of a base point P2 of the G2 group; the encrypted private key is used as the private key in key unsealing, decryption and key exchange. The KGC generates a private key of the user by using the main private key and the user identity, and then sends the private key to the user through the database auxiliary device, so that the user can decrypt the obtained encrypted data by using the private key.
Through the application, the following steps are adopted: acquiring a query request initiated by a query object and identity information of the query object through a data acquisition group; verifying the identity information of the query object through the authority management group, and verifying the query authority of the query request under the condition that the identity information is verified; under the condition that the query authority passes the verification, acquiring a query result corresponding to the query request from the database through the data acquisition group; the method comprises the steps of encrypting a query result through a data encryption group to generate encrypted data and a decryption key, sending the decryption key to a query object, detecting whether a data acquisition command sent by the query object is received, and sending the encrypted data to the query object under the condition that the data acquisition command is received. The data acquisition group, the authority management group and the data encryption group participate in the data query process together, so that the effects of high efficiency and time saving of the background user for acquiring the service data are achieved.
Optionally, in the data obtaining method based on a block chain provided in the embodiment of the present application, verifying the identity information of the query object through the rights management group includes: determining account information corresponding to the identity information, and inquiring a mapping relation table according to the account information to obtain terminal equipment corresponding to the account information, wherein the mapping relation table stores a plurality of account information and equipment identification information corresponding to each account information; sending a verification code to the terminal equipment, and detecting whether the verification code fed back by the terminal equipment is received; and determining that the identity information of the query object passes verification under the condition of detecting the verification code fed back by the terminal equipment.
Specifically, the account information may include a query account and a password of the user, after the account information is obtained, the terminal device identification information is obtained through a mapping relation table of the pre-stored account information and the device identification information, the terminal device identification information may be a unique identification code of the device, further, a verification code is sent to the terminal device corresponding to the device identification information, and if the verification code fed back by the terminal device of the user is received, it is determined that the identity information of the query object passes verification.
Optionally, in the data acquisition method based on the blockchain provided in the embodiment of the present application, verifying the query permission of the query request when the identity information passes verification includes: verifying whether the statement of the query request meets the condition; and/or verifying whether the attribute of the query request meets the condition, wherein the attribute at least comprises one of the following: query volume, query range, query reason.
It should be noted that the verification of the query authority is verified according to the preset authority management specification and the query management specification, which include a query data statement specification, a user query specification, and a query authorization specification. The query data statement specification sets a statement query efficiency specification, a statement query field specification, a statement query data dictionary specification and the like. The user query specification establishes a user query application dividing principle, a user query data volume principle and the like. Inquiring authorization specification, making data inquiry reason specification and the like.
Specifically, whether the user can perform the relevant database operation is checked according to the above specification, if yes, the relevant data query is authorized, otherwise, the request is rejected. According to the embodiment, the authorization specification is deployed in advance to verify the query authority of the query request, so that the process of waiting for approval of relevant departments is omitted, the production data can be acquired more quickly, and the working efficiency is improved.
Optionally, in the data obtaining method based on the blockchain provided in the embodiment of the present application, after obtaining, by the data obtaining group, the query request initiated by the query object, the method further includes: converting the query request into a target format, wherein the target format is a format identified by the database; before obtaining the query result corresponding to the query request from the database, the method further includes: and verifying the performability of the query request, and under the condition that the performability verification is passed, executing the step of acquiring a query result corresponding to the query request from the database.
Specifically, the data acquisition group translates and converts the data request sent by the service personnel to obtain a form which can be acquired through the database, and verifies the performability of the query request according to the verification rule of the query authority, wherein the performability can refer to whether logic in the query request can be executed or not.
Further, under the condition that the verification is passed, the query account, the password and the verification code fed back by the user of the user are uploaded to the block chain, the uploading request is checked through the authority management group to check the identity of the user, whether the user can obtain related data is judged, and a query result corresponding to the query request is obtained from the database after the identity is checked. The embodiment establishes a foundation for data query by performing format conversion on the query request and performing performability verification on the converted query request.
Optionally, in the data obtaining method based on the blockchain provided in this embodiment of the present application, after encrypting the query result by the data encryption group, generating encrypted data and a decryption key, and sending the decryption key to the query object, the method further includes: detecting whether the encrypted data is sent to a query object through a data lifecycle management group, wherein the lifecycle management group comprises a plurality of lifecycle management nodes on a blockchain; clearing the encrypted data cached in the data acquisition group under the condition that the encrypted data is sent to the query object; under the condition that the encrypted data are not sent to the query object, judging whether the acquisition time of the encrypted data is longer than a first preset time length; and clearing the encrypted data cached in the data acquisition group under the condition that the acquisition time of the encrypted data is longer than a first preset time length.
Specifically, whether the encrypted data are sent to the query object is detected through the data life cycle management group, a first preset time length is set under the condition that the encrypted data are not sent to the query object, the first preset time length is also the longest storage time length of the encrypted data, the first preset time length is calculated by sending a key to a user, and if the obtaining time of the encrypted data is longer than the first preset time length, namely the encrypted data exceeds the longest storage time length on a chain, the encrypted data on the chain are cleaned. According to the embodiment, the encrypted data on the chain is managed through the data life cycle management group, and the server burden caused by excessive data can be effectively avoided.
Optionally, in order to avoid that the query result is not obtained in time by the query object and the query result is leaked, in the data obtaining method based on the blockchain provided in the embodiment of the present application, under a condition that the encrypted data is not sent to the query object, after determining whether the obtaining time of the encrypted data is greater than a first preset time, the method further includes: under the condition that the acquisition time of the encrypted data is less than a first preset time length, judging whether the acquisition time of the encrypted data is greater than a second preset time length, wherein the second preset time length is less than the first preset time length; when the acquisition time of the encrypted data is longer than a second preset time, re-encrypting the query result through the data encryption group to obtain updated encrypted data and an updated decryption key, and sending the updated decryption key to the query object; and judging whether the number of times of re-encrypting the query result by the data encryption group is greater than the preset number of times, and clearing the encrypted data cached in the data acquisition group under the condition that the number of times is greater than the preset number of times.
Specifically, a second preset time duration is set in advance, if the acquisition time of the encrypted data is longer than the second preset time duration and shorter than the first preset time duration, the data is re-encrypted according to the requirement of the data life cycle management group to generate a new key, and the updated decryption key is sent to the query object. In addition, a preset encryption frequency is set, whether the frequency of re-encrypting the query result through the data encryption group is greater than the preset frequency is judged, and the encrypted data cached in the data acquisition group is cleared under the condition that the frequency is greater than the preset frequency. The server burden caused by excessive data can be effectively avoided through the data life cycle management group. The data life cycle management group encrypts the encrypted data on the link again at regular time and clears the encrypted data in time after the encrypted data are acquired, so that the data safety is protected, and the risk of being stolen is reduced.
The embodiment of the present application further provides a data acquisition system based on a blockchain, as shown in fig. 2, including a data acquisition group 201, a rights management group 202, and a data encryption group 203.
Specifically, the data acquisition group 201 is configured to acquire a query request initiated by a query object and identity information of the query object, and is further configured to acquire a query result corresponding to the query request from a database when the identity information of the query object and the query authority of the query request are verified, where the data acquisition group 301 includes a plurality of data acquisition nodes in a block chain.
And the right management group 202 is configured to verify identity information of the query object and verify query right of the query request when the identity information passes verification, where the right management group 302 includes a plurality of right management nodes in a blockchain.
And the data encryption group 203 is used for encrypting the query result, generating encrypted data and a decryption key, sending the decryption key to the query object, detecting whether a data acquisition instruction sent by the query object is received, and sending the encrypted data to the query object under the condition that the data acquisition instruction is received, wherein the data encryption group 303 comprises a plurality of data encryption nodes on the block chain.
The data acquisition group 201 may include a data acquisition request uploading module, a database interaction module, and an intelligent data return processing module. The data acquisition request uploading module is used for translating the data request uploaded by the service personnel into a form which can be acquired through a database, uploading relevant information of the user, including a query account, a password and a verification code fed back by the user, to a chain, verifying and checking the uploading request through the authorization management module to check the identity of the user, judging whether the user can acquire relevant data or not, and executing the data acquisition request after the verification is successful. And after the encrypted data is successfully obtained, the user queries the auxiliary device from the database to obtain a decryption key after obtaining the data encrypted by the encryption module, and decrypts the data by using the decryption key through the data return processing module to obtain the data.
Rights management group 202 may contain an identity verification module, a rights management module, an authorization request interaction module. The identity verification module verifies the identity of a query user by utilizing a database query auxiliary device in the hand of the user, the verification mode is that firstly, an authorization request interaction module obtains a query request sent by the user through a data acquisition request uploading module from a chain, after the identity verification module verifies the identity of the user, the identity verification module sends a verification code to a unique database query auxiliary device bound with a user account according to a stored account and a unique equipment code of the database query auxiliary device so as to verify the identity of the user, after the user obtains the verification code, all information including query content and the verification code is sent through a block chain, the identity verification module verifies the identity of the user, an authority management module verifies whether the user has the authority of acquiring related data according to the stored query authority of the user, and the verification result is returned to the block chain through the authorization request interaction module
The data encryption group 203 can comprise a data encryption module, an encrypted data uploading module and a key sending module; firstly, for the data whose identity has been verified by the rights management group 202, the executable verification of the data is performed and then the query is performed, and the result returned by the query is sent to the data encryption module, which can encrypt the data by using the SM9 encryption algorithm to ensure the security of the data. It should be noted that the key of the SM9 algorithm is generated by KGC (key generation center), and mainly includes an encrypted master key pair of KGC and a private key of a user. Data encryption master key pair: the private key is a random number in the range of [1, N-1 ]; the public key is a multiple point of a base point P1 of the G1 group, the multiple being the private key. Public and private keys of the master key pair are used in different scenes, wherein the master private key is only used for inquiring private keys of users; the master public key is published by KGC and used on the chain. The inquiry user private key is generated by the KGC and comprises a signature private key and an encryption private key. Signature private key: is a multiple point of the base point P1 of the G1 group. The private signature key is only used in digital signatures; encrypting a private key: a base point P2 that is a base point of the G2 group; the encrypted private key is used as the private key in key unsealing, decryption and key exchange. The KGC uses the main private key and the user identity to generate a private key of the user, and then sends the private key to the user through the database auxiliary device, and the user can decrypt the obtained encrypted data by using the private key. The encryption algorithm by SM9 ensures that even data that is put on the chain waiting to be retrieved is not easily stolen.
Optionally, in the data acquisition system based on a blockchain provided in the embodiment of the present application, the system further includes: the data life cycle management group 204 is used for clearing the encrypted data cached in the data acquisition group under the condition that the encrypted data are sent to the query object; under the condition that the encrypted data are not sent to the query object, if the obtaining time of the encrypted data is longer than a first preset time length, the encrypted data cached in the data obtaining group are cleared, if the obtaining time of the encrypted data is shorter than the first preset time length and longer than a second preset time length, the query result is encrypted again through the data encryption group, if the number of times of encrypting the query result again through the data encryption group is larger than the preset number, the encrypted data cached in the data obtaining group are cleared, and the life cycle management group comprises a plurality of life cycle management nodes on the block chain.
Specifically, the main function of the data lifecycle management group 204 is to manage data on the blockchain, first, to prevent the data from occupying resources on the chain for a long time, clean up data that has been acquired by the user or that has not been acquired by the user for a long time, then, regularly clear up data that has been encrypted on the existing chain but has not been acquired by the user for a certain time, and notify the encryption group to re-encrypt the data and send a new key to the database query assistance device in the user's hand.
In order to achieve secure acquisition of production data, optionally, in the data acquisition system based on a blockchain provided in the embodiment of the present application, the system further includes: the terminal equipment comprises a user interface and an identity information identification control, wherein the user interface is used for receiving a query request input by a query object and triggering the operation of initiating the query request to the data acquisition group, and is also used for displaying a verification code returned by the authority management group based on the identity information and receiving the verification code input by the query object so as to verify the identity information through the authority management group; the identity information identification control is used for identifying the identity information of the query object, wherein the identity information identification control at least comprises one of the following components: fingerprint identification control, face identification control.
Specifically, the terminal device is a database query assisting apparatus, and as shown in fig. 3, the structure diagram of the terminal device provided by the present invention is shown. The terminal equipment can input the account password of the user to identify the authority of the user to access the device, sends a query request to the database authority management group when the user queries data, receives a verification code returned by the database authority management group, is used for verifying the identity of the user when querying the data, can receive a secret key returned by the encryption group, and is used for decrypting the data encrypted on the link by inputting the secret key through the data return module on the query system.
The identity information identification control can comprise a scanner 301 for fingerprint identification, and is used for identifying user fingerprint information written in the device in advance and verifying the identity of the user; the face recognition module 304 is used for recognizing the facial biological characteristics of the user, comparing the facial biological characteristics with data built in the device and verifying the identity of the user; the user interface can comprise a user input module 302, and a user can input an account of the user through the user input module 302, and the password is compared with preset information in the device to verify the identity of the user; the user interface may further include a display module 303, which may display information input by the user, assist the user in operating, and display the verification code returned by the rights management group and the decryption key returned by the encrypted group. Furthermore, the user interface may further include auxiliary operation keys 305, thereby facilitating the input operation by the user.
In the embodiment, multiple verification is performed through the external query auxiliary device and the user password for querying the database, so that the identity of the user for querying the database is ensured to be normal, and the condition that the user is stolen cannot occur even if the user is carelessly lost through various verification modes including fingerprints and faces of the query auxiliary device.
The data acquisition system based on the block chain, provided by the embodiment of the application, acquires the query request initiated by the query object and the identity information of the query object through the data acquisition group 201, and is further configured to acquire a query result corresponding to the query request from a database under the condition that the identity information of the query object and the query permission of the query request are verified, where the data acquisition group 201 includes a plurality of data acquisition nodes on the block chain; the authority management group 202 verifies the identity information of the query object and verifies the query authority of the query request under the condition that the identity information is verified, wherein the authority management group 202 comprises a plurality of authority management nodes on a block chain; the data encryption group 203 encrypts the query result to generate encrypted data and a decryption key, sends the decryption key to the query object, is further used for detecting whether a data acquisition instruction sent by the query object is received, and sends the encrypted data to the query object under the condition that the data acquisition instruction is received, wherein the data encryption group 203 comprises a plurality of data encryption nodes on a block chain, and the problems of low efficiency and long time consumption of background users for acquiring service data in the related art are solved. The data acquisition group, the authority management group and the data encryption group participate in the data query process together, so that the effects of high efficiency and time saving of the background user for acquiring the service data are achieved.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
The embodiment of the present application further provides a data acquisition device based on a block chain, and it should be noted that the data acquisition device based on a block chain according to the embodiment of the present application may be used to execute the data acquisition method based on a block chain provided in the embodiment of the present application. The following describes a data acquisition apparatus based on a block chain according to an embodiment of the present application.
Fig. 4 is a schematic diagram of a data acquisition apparatus based on a blockchain according to an embodiment of the present application. As shown in fig. 4, the apparatus includes:
a first obtaining unit 401, configured to obtain, through a data obtaining group, a query request initiated by a query object and identity information of the query object, where the data obtaining group includes a plurality of data obtaining nodes on a block chain;
a verification unit 402, configured to verify identity information of a query object through a rights management group, and verify a query right of a query request when the identity information passes verification, where the rights management group includes multiple rights management nodes in a block chain;
a second obtaining unit 403, configured to obtain, through the data obtaining group, a query result corresponding to the query request from the database when the query right verification passes;
an encrypting unit 404, configured to encrypt the query result by a data encryption group, generate encrypted data and a decryption key, send the decryption key to the query object, detect whether a data obtaining instruction sent by the query object is received, and send the encrypted data to the query object when the data obtaining instruction is received, where the data encryption group includes a plurality of data encryption nodes in a block chain.
In the data acquisition apparatus based on a blockchain provided in the embodiment of the present application, a first acquisition unit 401 acquires, through a data acquisition group, an inquiry request initiated by an inquiry object and identity information of the inquiry object, where the data acquisition group includes a plurality of data acquisition nodes on the blockchain; the verification unit 402 verifies the identity information of the query object through an authority management group, and verifies the query authority of the query request under the condition that the identity information is verified, wherein the authority management group comprises a plurality of authority management nodes on a block chain; the second obtaining unit 403 obtains a query result corresponding to the query request from the database through the data obtaining group when the query permission is verified; the encryption unit 404 encrypts the query result through the data encryption group to generate encrypted data and a decryption key, sends the decryption key to the query object, detects whether a data acquisition instruction sent by the query object is received, and sends the encrypted data to the query object under the condition that the data acquisition instruction is received, wherein the data encryption group comprises a plurality of data encryption nodes on a block chain, so that the problems of low efficiency and long time consumption of background users for acquiring service data in the related art are solved, and the effects of high efficiency and time saving of the background users for acquiring the service data are achieved.
Optionally, in the data acquisition apparatus based on a blockchain provided in the embodiment of the present application, the verification unit 402 includes: the first verification module is used for verifying the identity information of the query object through the authority management group, and comprises a first determining submodule used for determining account information corresponding to the identity information and querying a mapping relation table according to the account information to obtain terminal equipment corresponding to the account information, wherein the mapping relation table stores a plurality of pieces of account information and equipment identification information corresponding to each piece of account information; the sending submodule is used for sending the verification code to the terminal equipment and detecting whether the verification code fed back by the terminal equipment is received; and the second determining submodule is used for determining that the identity information of the query object passes the verification under the condition of detecting the verification code fed back by the terminal equipment.
Optionally, in the data acquisition apparatus based on a blockchain provided in the embodiment of the present application, the verification unit 402 includes: the second verification module is used for verifying the query authority of the query request under the condition that the identity information passes verification, and comprises a first verification submodule used for verifying whether the statement of the query request meets the condition or not; and/or the second verification sub-module is used for verifying whether the attribute of the query request meets the condition, wherein the attribute at least comprises one of the following items: query volume, query range, query reason.
Optionally, in the data acquiring apparatus based on a block chain provided in the embodiment of the present application, the apparatus further includes a converting unit, configured to convert, after acquiring, through the data acquisition group, an inquiry request initiated by an inquiry object, the inquiry request into a target format, where the target format is a format identified by the database; and the verifying unit is used for verifying the performability of the query request before the query result corresponding to the query request is obtained from the database, and executing the step of obtaining the query result corresponding to the query request from the database under the condition that the performability verification is passed.
Optionally, in the data acquiring apparatus based on a block chain provided in the embodiment of the present application, the apparatus further includes: the generating unit is used for encrypting the query result through the data encryption group, generating encrypted data and a decryption key, sending the decryption key to the query object, and detecting whether the encrypted data is sent to the query object through the data life cycle management group, wherein the life cycle management group comprises a plurality of life cycle management nodes on the block chain; a first clearing unit, configured to clear the encrypted data cached in the data acquisition group when the encrypted data is sent to the query object; the first judgment unit is used for judging whether the acquisition time of the encrypted data is longer than a first preset time length or not under the condition that the encrypted data is not sent to the query object; and the second clearing unit is used for clearing the encrypted data cached in the data acquisition group under the condition that the acquisition time of the encrypted data is longer than the first preset time length.
Optionally, in the data obtaining apparatus based on a blockchain provided in the embodiment of the present application, the apparatus further includes: the second judging unit is used for judging whether the acquisition time of the encrypted data is greater than a second preset time length or not under the condition that the encrypted data is not sent to the query object and the acquisition time of the encrypted data is less than the first preset time length; the re-encryption unit is used for re-encrypting the query result through the data encryption group under the condition that the acquisition time of the encrypted data is longer than a second preset time length to obtain updated encrypted data and an updated decryption key, and sending the updated decryption key to the query object; and the third clearing unit is used for judging whether the number of times of re-encrypting the query result by the data encryption group is greater than the preset number of times or not and clearing the encrypted data cached in the data acquisition group under the condition that the number of times is greater than the preset number of times.
The device for acquiring data based on a blockchain comprises a processor and a memory, wherein the first acquiring unit 401, the verifying unit 402, the second acquiring unit 403, the encrypting unit 404 and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more than one, and the problems of low efficiency and long time consumption of background users for acquiring service data in the related technology are solved by adjusting kernel parameters.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
An embodiment of the present invention provides a computer-readable storage medium, on which a program is stored, where the program, when executed by a processor, implements the block chain-based data acquisition method.
The embodiment of the invention provides a processor, which is used for running a program, wherein the block chain-based data acquisition method is executed when the program runs.
As shown in fig. 5, an electronic device according to an embodiment of the present invention is provided, where the device 501 includes a processor, a memory, and a program stored in the memory and capable of running on the processor, and when the processor executes the program, the steps of the block chain-based data acquisition method according to the embodiment of the present application are implemented. The device can be a server, a PC, a PA background user, a mobile phone and the like, and can efficiently and time-efficiently acquire service data.
The present application further provides a computer program product adapted to perform the steps of initializing the blockchain-based data acquisition method provided by the embodiments of the present application when executed on a data processing device.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (11)

1. A data acquisition method based on a block chain is characterized by comprising the following steps:
acquiring a query request initiated by a query object and identity information of the query object through a data acquisition group, wherein the data acquisition group comprises a plurality of data acquisition nodes on a block chain;
verifying the identity information of the query object through an authority management group, and verifying the query authority of the query request under the condition that the identity information is verified, wherein the authority management group comprises a plurality of authority management nodes on the block chain;
under the condition that the query authority passes the verification, acquiring a query result corresponding to the query request from a database through the data acquisition group;
encrypting the query result through a data encryption group to generate encrypted data and a decryption key, sending the decryption key to the query object, detecting whether a data acquisition instruction sent by the query object is received, and sending the encrypted data to the query object under the condition of receiving the data acquisition instruction, wherein the data encryption group comprises a plurality of data encryption nodes on the block chain.
2. The method of claim 1, wherein verifying the identity information of the query object by a rights management group comprises:
determining account information corresponding to the identity information, and querying a mapping relation table according to the account information to obtain terminal equipment corresponding to the account information, wherein the mapping relation table stores a plurality of pieces of account information and equipment identification information corresponding to each piece of account information;
sending a verification code to the terminal equipment, and detecting whether the verification code fed back by the terminal equipment is received;
and determining that the identity information of the query object passes verification under the condition that the verification code fed back by the terminal equipment is detected.
3. The method of claim 1, wherein verifying the query authority of the query request if the identity information is verified comprises:
verifying whether the statement of the query request meets the condition; and/or
Verifying whether the attribute of the query request meets the condition, wherein the attribute at least comprises one of the following: query volume, query range, query reason.
4. The method of claim 1,
after obtaining the query request initiated by the query object through the data obtaining group, the method further comprises: converting the query request into a target format, wherein the target format is a format identified by a database;
before obtaining a query result corresponding to the query request from a database, the method further includes: and verifying the performability of the query request, and executing the step of acquiring the query result corresponding to the query request from the database under the condition that the performability verification is passed.
5. The method of claim 1, wherein after encrypting the query result by a data encryption group to generate encrypted data and a decryption key, and sending the decryption key to the query object, the method further comprises:
detecting whether the encrypted data is sent to the query object through a data lifecycle management group, wherein the lifecycle management group comprises a plurality of lifecycle management nodes on the blockchain;
clearing the encrypted data cached in the data acquisition group under the condition that the encrypted data is sent to the query object;
under the condition that the encrypted data are not sent to the query object, judging whether the acquisition time of the encrypted data is longer than a first preset time length;
and clearing the encrypted data cached in the data acquisition group under the condition that the acquisition time of the encrypted data is longer than the first preset time length.
6. The method according to claim 1, wherein after determining whether the acquisition time of the encrypted data is longer than a first preset time period in a case where the encrypted data is not sent to the query object, the method further comprises:
under the condition that the obtaining time of the encrypted data is less than the first preset time, judging whether the obtaining time of the encrypted data is greater than a second preset time, wherein the second preset time is less than the first preset time;
when the acquisition time of the encrypted data is longer than the second preset time, re-encrypting the query result through the data encryption group to obtain updated encrypted data and an updated decryption key, and sending the updated decryption key to the query object;
and judging whether the number of times of re-encrypting the query result by the data encryption group is greater than a preset number of times, and clearing the encrypted data cached in the data acquisition group under the condition that the number of times is greater than the preset number of times.
7. A blockchain-based data acquisition system, comprising:
the system comprises a data acquisition group and a data processing group, wherein the data acquisition group is used for acquiring a query request initiated by a query object and identity information of the query object, and acquiring a query result corresponding to the query request from a database under the condition that the identity information of the query object and query authority of the query request pass verification, and comprises a plurality of data acquisition nodes on a block chain;
the authority management group is used for verifying the identity information of the query object and verifying the query authority of the query request under the condition that the identity information is verified, wherein the authority management group comprises a plurality of authority management nodes on the block chain;
and the data encryption group is used for encrypting the query result, generating encrypted data and a decryption key, sending the decryption key to the query object, detecting whether a data acquisition instruction sent by the query object is received, and sending the encrypted data to the query object under the condition of receiving the data acquisition instruction, wherein the data encryption group comprises a plurality of data encryption nodes on the block chain.
8. The system of claim 7, further comprising:
the terminal equipment comprises a user interface and an identity information identification control,
the user interface is used for receiving the query request input by a query object, triggering the operation of initiating the query request to the data acquisition group, displaying a verification code returned by the authority management group based on the identity information, receiving the verification code input by the query object, and verifying the identity information through the authority management group;
the identity information identification control is used for identifying the identity information of the query object, wherein the identity information identification control at least comprises one of the following components: fingerprint identification control, face identification control.
9. The system of claim 7, further comprising:
the data life cycle management group is used for clearing the encrypted data cached in the data acquisition group under the condition that the encrypted data are sent to the query object; and under the condition that the encrypted data is not sent to the query object, if the acquisition time of the encrypted data is longer than a first preset time length, clearing the encrypted data cached in the data acquisition group, if the acquisition time of the encrypted data is shorter than the first preset time length and longer than a second preset time length, re-encrypting the query result through the data encryption group, and if the re-encrypting time of the query result through the data encryption group is longer than a preset time length, clearing the encrypted data cached in the data acquisition group, wherein the life cycle management group comprises a plurality of life cycle management nodes on the block chain.
10. A computer storage medium, characterized in that the computer storage medium is used for storing a program, wherein the program controls a device in which the non-volatile storage medium is located to execute the block chain-based data acquisition method according to any one of claims 1 to 6 when the program runs.
11. An electronic device, comprising a processor and a memory, wherein the memory stores computer-readable instructions, and the processor is configured to execute the computer-readable instructions, wherein the computer-readable instructions are executed to perform the method for acquiring data based on a blockchain according to any one of claims 1 to 6.
CN202210751793.5A 2022-06-29 2022-06-29 Block chain-based data acquisition method and system, storage medium and electronic device Pending CN115134150A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210751793.5A CN115134150A (en) 2022-06-29 2022-06-29 Block chain-based data acquisition method and system, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210751793.5A CN115134150A (en) 2022-06-29 2022-06-29 Block chain-based data acquisition method and system, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN115134150A true CN115134150A (en) 2022-09-30

Family

ID=83380438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210751793.5A Pending CN115134150A (en) 2022-06-29 2022-06-29 Block chain-based data acquisition method and system, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN115134150A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116684207A (en) * 2023-08-03 2023-09-01 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140172898A1 (en) * 2012-12-13 2014-06-19 Microsoft Corporation Distributed sql query processing using key-value storage system
CN110060162A (en) * 2019-03-29 2019-07-26 阿里巴巴集团控股有限公司 Data grant, querying method and device based on block chain
CN110365670A (en) * 2019-07-08 2019-10-22 深圳壹账通智能科技有限公司 Blacklist sharing method, device, computer equipment and storage medium
CN111680067A (en) * 2020-05-28 2020-09-18 中国工商银行股份有限公司 Data processing method, device and system based on block chain
CN114238393A (en) * 2021-12-21 2022-03-25 深圳前海微众银行股份有限公司 Authority control method, block chain and storage medium
CN114371917A (en) * 2022-01-07 2022-04-19 中国工商银行股份有限公司 Block chain-based demand processing method and system, storage medium and electronic device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140172898A1 (en) * 2012-12-13 2014-06-19 Microsoft Corporation Distributed sql query processing using key-value storage system
CN110060162A (en) * 2019-03-29 2019-07-26 阿里巴巴集团控股有限公司 Data grant, querying method and device based on block chain
CN110365670A (en) * 2019-07-08 2019-10-22 深圳壹账通智能科技有限公司 Blacklist sharing method, device, computer equipment and storage medium
CN111680067A (en) * 2020-05-28 2020-09-18 中国工商银行股份有限公司 Data processing method, device and system based on block chain
CN114238393A (en) * 2021-12-21 2022-03-25 深圳前海微众银行股份有限公司 Authority control method, block chain and storage medium
CN114371917A (en) * 2022-01-07 2022-04-19 中国工商银行股份有限公司 Block chain-based demand processing method and system, storage medium and electronic device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116684207A (en) * 2023-08-03 2023-09-01 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain
CN116684207B (en) * 2023-08-03 2023-10-20 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain

Similar Documents

Publication Publication Date Title
US10979231B2 (en) Cross-chain authentication method, system, server, and computer-readable storage medium
CN106330850B (en) Security verification method based on biological characteristics, client and server
US20220191012A1 (en) Methods For Splitting and Recovering Key, Program Product, Storage Medium, and System
JP6275653B2 (en) Data protection method and system
KR101371608B1 (en) Database Management System and Encrypting Method thereof
US8239679B2 (en) Authentication method, client, server and system
CN101976317B (en) Virtual machine image safety method in private cloud computing application
CN108965222B (en) Identity authentication method, system and computer readable storage medium
CN108833361B (en) Identity authentication method and device based on virtual account
US20080072066A1 (en) Method and apparatus for authenticating applications to secure services
CN113221128B (en) Account and password storage method and registration management system
CN103942896A (en) System for money withdrawing without card on ATM
US20100011221A1 (en) Secured storage device with two-stage symmetric-key algorithm
CN114826661A (en) Data access method, device and medium based on open API
KR20220092811A (en) Method and device for storing encrypted data
CN115002141B (en) File storage method and device based on block chain
CN112800477A (en) Data encryption and decryption system and method based on biological characteristic value
CN110737905B (en) Data authorization method, data authorization device and computer storage medium
US20060143477A1 (en) User identification and data fingerprinting/authentication
CN115134150A (en) Block chain-based data acquisition method and system, storage medium and electronic device
CN102752112A (en) Authority control method and device based on signed message 1 (SM1)/SM2 algorithm
Cavoukian et al. Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy
CN110909336B (en) Password management method and device based on fingerprint USB flash disk
CN115694921B (en) Data storage method, device and medium
KR101809976B1 (en) A method for security certification generating authentication key combinating multi-user element

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination