CN115879155A - Data processing method, device, equipment and storage medium - Google Patents

Data processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN115879155A
CN115879155A CN202211648501.1A CN202211648501A CN115879155A CN 115879155 A CN115879155 A CN 115879155A CN 202211648501 A CN202211648501 A CN 202211648501A CN 115879155 A CN115879155 A CN 115879155A
Authority
CN
China
Prior art keywords
data
user
query
task
intelligent contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211648501.1A
Other languages
Chinese (zh)
Inventor
徐照晔
邱雪涛
熊璐
张远健
乐旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN202211648501.1A priority Critical patent/CN115879155A/en
Publication of CN115879155A publication Critical patent/CN115879155A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application discloses a data processing method, a data processing device, data processing equipment and a storage medium. The method comprises the steps of receiving a data query request sent by a data using end, wherein the data query request comprises a query task and a task query condition; sending a verification instruction to the user side according to the data query request, wherein the verification instruction comprises a first intelligent contract and is used for indicating the user side to provide an authorization identifier corresponding to the task query condition based on the first intelligent contract; when a second intelligent contract fed back by a user side is obtained, according to an authorization identifier in the second intelligent contract, sending a non-homogenization certificate including a query task query result and a user certificate to a data using side, wherein the query result is a result of whether a task query condition is met, the user certificate carries a data signature of a data generating side and a data signature of the user side, and the user certificate is a certificate for representing the authenticity of original data. Therefore, the leakage of the personal information of the user can be avoided, and the safety of the personal information of the user is ensured.

Description

Data processing method, device, equipment and storage medium
Technical Field
The present application belongs to the field of communications technologies, and in particular, to a data processing method, apparatus, device, and storage medium.
Background
With the rapid development of internet technology, personal data of natural people is widely acquired, stored and used on the internet. The personal data of the natural person can be generated and stored by the data generating end, and the data using end can apply for using the personal data of the natural person to the user through the data generating end.
However, since the links of storing, managing and using personal data by the user end are difficult to control, the data using end sometimes excessively or even forcibly requires user authorization, so that the data generating end excessively collects and privately stores original and plaintext personal data, causing personal data to be abused, meanwhile, the data generating end sometimes also sends the original personal data to the data generating end, if the data generating end and the data using end cannot properly store and use the user data, personal information is easily leaked, and the security of each link of the personal data is reduced.
Disclosure of Invention
The embodiment of the application provides a data processing method, a data processing device, data processing equipment and a storage medium, and can solve the problem that personal data is easily leaked and abused in the related art.
In a first aspect, an embodiment of the present application provides a data processing method, which is applied to a block chain platform, and the method may include:
receiving a data query request sent by a data using end, wherein the data query request comprises a query task and task query conditions of the query task;
according to the data query request, sending a verification instruction to a user side related to the query task, wherein the verification instruction comprises a first intelligent contract, the first intelligent contract is determined by the query task and a task query condition, and the verification instruction is used for indicating the user side to provide an authorization identifier corresponding to the task query condition based on the first intelligent contract;
under the condition of acquiring a second intelligent contract fed back by a user side, sending a non-homogenization evidence to a data using side according to an authorization identifier in the second intelligent contract;
the non-homogenization evidence comprises an inquiry result of an inquiry task and a user evidence, wherein the inquiry result is a result of whether a task inquiry condition is met, the user evidence is provided by a user side, the user evidence carries a first data signature of a data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user evidence is a certificate for representing the authenticity of the original data.
In a second aspect, an embodiment of the present application provides a data processing method, which is applied to a user side, and the method may include:
acquiring original data sent by a data generating end, wherein the original data is determined by user personal information of a user end and a first digital signature of the data generating end;
generating a user certificate according to the attribute characteristics of the original data and a second data signature of the user side;
sending a user certificate to a block chain platform, wherein the user certificate is a certificate for representing the authenticity of original data;
receiving a verification instruction sent by a block chain platform, wherein the verification instruction comprises a first intelligent contract, and the first intelligent contract is determined by a query task in a data query request provided by a data using end and a task query condition of the query task;
marking a task query condition through an authorization identifier according to a query task in the first intelligent contract to obtain a second intelligent contract;
and sending a second intelligent contract to the blockchain platform.
In a third aspect, an embodiment of the present application provides a data processing method, which is applied to a data generation end, and the method may include:
acquiring user personal information of a user side;
encrypting the personal information of the user through a second preset encryption algorithm to obtain a second encryption result;
generating original data of the personal information of the user according to the second encryption result and the first digital signature of the data generation end;
and sending the original data to the user side under the condition of receiving the data acquisition request sent by the user side.
In a fourth aspect, an embodiment of the present application provides a data processing method, which is applied to a data using end, and the method may include:
sending a data query request to the blockchain platform, wherein the data query request comprises a query task and a task query condition of the query task, and the data query request is used for requesting the blockchain platform to send a query result of the query task;
receiving a non-homogeneous certificate sent by a block chain, wherein the non-homogeneous certificate comprises an inquiry result of an inquiry task and a user certificate, the inquiry result is a result of whether a task inquiry condition is met, the user certificate is provided by a user side, the user certificate carries a first data signature of a data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user certificate is a certificate for representing the authenticity of the original data.
In a fifth aspect, an embodiment of the present application provides a data processing apparatus, which is applied to a block chain platform, and the apparatus may include:
the receiving module is used for receiving a data query request sent by a data using end, wherein the data query request comprises a query task and task query conditions of the query task;
the system comprises a sending module, a receiving module and a verification module, wherein the sending module is used for sending a verification instruction to a user side related to a query task according to a data query request, the verification instruction comprises a first intelligent contract, the first intelligent contract is determined by the query task and a task query condition, and the verification instruction is used for indicating the user side to provide an authorization identifier corresponding to the task query condition based on the first intelligent contract;
the sending module is further used for sending a non-homogenization evidence to the data using end according to the authorization identifier in the second intelligent contract under the condition of obtaining the second intelligent contract fed back by the user end;
the non-homogeneous certificate comprises a query result of a query task and a user certificate, the query result is a result of whether a task query condition is met, the user certificate is provided by a user side, the user certificate carries a first data signature of a data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user certificate is a certificate for representing authenticity of the original data.
In a sixth aspect, an embodiment of the present application provides a data processing apparatus, which is applied to a user side, and the apparatus may include:
the acquisition module is used for acquiring original data sent by the data generation end, and the original data is determined by user personal information of the user end and a first digital signature of the data generation end;
the generating module is used for generating a user certificate according to the attribute characteristics of the original data and a second data signature of the user side;
the sending module is used for sending a user certificate to the block chain platform, wherein the user certificate is a certificate for representing the authenticity of original data;
the receiving module is used for receiving a checking instruction sent by the block chain platform, wherein the checking instruction comprises a first intelligent contract, and the first intelligent contract is determined by a query task in a data query request provided by a data using end and a task query condition of the query task;
the marking module is used for marking the task query condition through the authorization identifier according to the query task in the first intelligent contract to obtain a second intelligent contract;
the sending module is further configured to send a second intelligent contract to the blockchain platform.
In a seventh aspect, an embodiment of the present application provides a data processing apparatus, which is applied to a data generating end, and the apparatus may include:
the acquisition module is used for acquiring the personal information of the user at the user side;
the encryption module is used for encrypting the personal information of the user through a second preset encryption algorithm to obtain a second encryption result;
the generating module is used for generating original data of the personal information of the user according to the second encryption result and the first digital signature of the data generating end;
and the sending module is used for sending the original data to the user side under the condition of receiving the data acquisition request sent by the user side.
In an eighth aspect, an embodiment of the present application provides a data processing apparatus, which is applied to a data using end, and the apparatus may include:
the sending module is used for sending a data query request to the block chain platform, the data query request comprises a query task and a task query condition of the query task, and the data query request is used for requesting the block chain platform to send a query result of the query task;
the receiving module is used for receiving a non-homogeneous certificate sent by the block chain, the non-homogeneous certificate comprises a query result of a query task and a user certificate, the query result is a result of whether a task query condition is met, the user certificate is provided by a user side, the user certificate carries a first data signature of a data generating end and a second data signature of the user side, the data generating end is a platform for generating original data of user personal information of the user side, and the user certificate is a certificate for representing the authenticity of the original data.
In a ninth aspect, an embodiment of the present application provides a computer device, including: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements a data processing method as shown in the first aspect, implements a data processing method as shown in the second aspect, implements a data processing method as shown in the third aspect, or implements a data processing method as shown in the fourth aspect.
In a tenth aspect, embodiments of the present application provide a computer storage medium having stored thereon computer program instructions that, when executed by a processor, implement a data processing method as shown in the first aspect, implement a data processing method as shown in the second aspect, implement a data processing method as shown in the third aspect, or implement a data processing method as shown in the fourth aspect.
In an eleventh aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the data processing method shown in the first aspect, the data processing method shown in the second aspect, the data processing method shown in the third aspect, or the data processing method shown in the fourth aspect.
In a twelfth aspect, embodiments of the present application provide a computer program product, which is stored in a storage medium and is executed by at least one processor to implement the data processing method shown in the first aspect, the data processing method shown in the second aspect, the data processing method shown in the third aspect, or the data processing method shown in the fourth aspect.
According to the data processing method, the data processing device, the data processing equipment and the data processing storage medium, a data query request sent by a data using end is received, wherein the data query request comprises a query task and task query conditions of the query task; according to the data query request, sending a verification instruction to a user side related to the query task, wherein the verification instruction comprises a first intelligent contract, the first intelligent contract is determined by the query task and a task query condition, and the verification instruction is used for indicating the user side to provide an authorization identifier corresponding to the task query condition based on the first intelligent contract; under the condition of acquiring a second intelligent contract fed back by a user side, sending a non-homogenization evidence to a data using side according to an authorization identifier in the second intelligent contract; the non-homogenization evidence comprises an inquiry result of an inquiry task and a user evidence, wherein the inquiry result is a result of whether a task inquiry condition is met, the user evidence is provided by a user side, the user evidence carries a first data signature of a data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user evidence is a certificate for representing the authenticity of the original data.
Based on the method, for the user side, the user can be supported to independently download the original data of the personal information of the user, the option of the personal data storage mode of the user is expanded, namely the user can independently select the data storage mode such as a block chain platform stored in a third party, and when the data using side wants to inquire corresponding data, the user side can also be requested through the block chain platform, the decision that the user side participates in the storage, management and using links of the personal information of the user is realized, and the responsibility of ensuring the right of the user is clear. And original data of the personal information of the user can be stored truthfully through the block chain platform, a trust mechanism in the data processing process is guaranteed, and a way of applying for inquiry authority to the user side is provided for the data using side through intelligent contract of the block chain platform. In addition, in the embodiment of the application, the query result and the user deposit certificate are output in a non-homogeneous certification NFT form through an intelligent contract supported by a privacy computing technology, so that because the content of the NFT is encrypted, only a data using end can identify the NFT, the leakage of the output query result and the user deposit certificate is avoided, the original data can not be used and seen, a resource user can not obtain the original data and can only obtain the query result of a query task, the query requirement of the data using end is met, the minimization of data authorization is realized, the privacy safety of user personal information is protected, and the leakage of the user personal information is avoided. For the data using end, the inquiring result of the inquiring task and the data signatures of multiple parties, such as the first data signature of the data generating end and the second data signature of the user end, carried in the user certificate are used, so that even if the data using end fails to acquire the original data of the personal information of the user, the authenticity of the original data can be verified through the data signatures of the multiple parties.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of a data processing system according to one embodiment of a data processing method provided herein;
fig. 2 is a flowchart of a data processing method based on a blockchain platform according to an embodiment of the present disclosure;
fig. 3 is a flowchart of a data processing method based on a user terminal according to an embodiment of the present disclosure;
fig. 4 is a flowchart of a data processing method based on a data generating end according to an embodiment of the present application;
fig. 5 is a flowchart of a data processing method based on a data consumer according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a data processing apparatus based on a blockchain platform according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a data processing apparatus based on a user terminal according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a data processing apparatus based on a data generation end according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a data processing apparatus based on a data using end according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
Features of various aspects and exemplary embodiments of the present application will be described in detail below, and in order to make objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative only and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
It should be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising 8230; \8230;" comprises 8230; "does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
With the rapid development of internet technology, personal data of natural people is widely acquired, stored and used on the internet. The personal data of the natural person can be generated and stored by the data generating end, and the data using end can apply for using the personal data of the natural person to the user through the data generating end. However, for the data using end, some data using ends often excessively or even forcibly require user authorization for profit, and collect and store personal data in a mass manner, so that the personal data is abused through profit of the personal data. For the user side, the user side is difficult to autonomously select a storage party of personal data, and the selection range of specifying "who can use data" is limited, that is, the user side can only determine a data using end using the personal data in a platform specified by the data generating end, so that the links of storing, managing and using the personal data of the user side are difficult to control, and the user cannot see the using path of the personal data, so that the personal data can be maliciously used by a third party without permission of the user. Moreover, if the data generating end and the data using end cannot properly store and use the user data, personal information is easily leaked, and the safety of the personal data in each link of storage, management and use is reduced.
In the related art, the user terminal can become a key participant in the transmission process of personal Data by means of Data Transfer Project (DTP) and Distributed Data Transfer Protocol (DDTP). However, the former prevents the user end from selecting the position and mode of data storage by himself, and the data transmission trust mechanism relies too much on the secret credit of a single platform, so that the transparency of data transmission is low, and the user end right guarantee responsibility is not clear; the latter cannot prevent the data user from storing personal data privately, and cannot guarantee that the data user uploads records of using personal data faithfully.
Based on this, in order to solve the above-mentioned problems, an embodiment of the present application provides a data processing method for implementing user personal information based on a blockchain platform and privacy computation, where a data query request sent by a data using end is received, where the data query request includes a query task and a task query condition of the query task; according to the data query request, sending a verification instruction to a user side related to the query task, wherein the verification instruction comprises a first intelligent contract, the first intelligent contract is determined by the query task and a task query condition, and the verification instruction is used for indicating the user side to provide an authorization identifier corresponding to the task query condition based on the first intelligent contract; under the condition of acquiring a second intelligent contract fed back by the user side, sending a non-homogenization evidence to the data user side according to an authorization identifier in the second intelligent contract; the non-homogenization evidence comprises an inquiry result of an inquiry task and a user evidence, wherein the inquiry result is a result of whether a task inquiry condition is met, the user evidence is provided by a user side, the user evidence carries a first data signature of a data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user evidence is a certificate for representing the authenticity of the original data. In this way, the user can participate in the decision of the personal data (hereinafter, user personal information) in the storage, management and use links, the user right guarantee responsibility is clear, the user is allowed to download the personal data, and the data storage mode is selected autonomously. And generating and authorizing records of the user personal information through the block chain platform, ensuring a trust mechanism of the scheme, setting an intelligent contract layer on the block chain platform, applying a data result to the user through an intelligent contract formed by the intelligent contract, ensuring the privacy safety of data in the intelligent contract through a privacy computing technology, preventing the user personal information from being available and invisible to a data using end, preventing the data using end from privately storing the user personal information, effectively avoiding malicious use of the user personal information by a third party, and controlling the authorization range and the use object of the user personal information by the user, enlarging the authorization scene of the user, reducing the possibility of leakage of the user personal information, and ensuring the safety of the user personal information.
Based on this, the embodiments of the present application provide a data processing method, apparatus, device and storage medium. The data processing method, apparatus, server and storage medium of the embodiments of the present application will be described in detail with reference to fig. 1 to 10, and it should be noted that these embodiments are not intended to limit the scope of the present disclosure.
First, a data processing system provided in an embodiment of the present application will be described.
As shown in fig. 1, the data processing system 10 may include a data generation side 101, a user side 102, a block chain platform 103, and a data usage side 104. The data generation end 101 may include at least one data generation end, such as data generation end 1, data generation end 2, \8230 \ 8230;, data generation end M, where M is a positive integer; similarly, data consumer 104 may include at least one data consumer, such as data consumer 1, data consumer 2, \8230;, data consumer P, P is a positive integer; blockchain platform 103 may include a vouching platform and an intelligent contract layer.
It should be noted that the intelligent contracts (Smart contracts) referred to in the embodiments of the present application, such as the first intelligent Contract and the second intelligent Contract, may be a computer transaction protocol that can self-verify and automatically execute Contract terms without an intermediary; the secure Multi-Party computing (MPC) refers to that under the condition of no trusted third Party, a plurality of parties cooperatively compute an agreed function, and each Party is guaranteed to only obtain its own Computation result, and input and output data of any other Party cannot be inferred through interactive data in the Computation process. A Garbled Circuit (GC), which may refer to an encryption algorithm involved in secure multiparty computation, encrypts each operation to obtain a computation result without revealing an initial value; at the loss of transmission (OT), a cryptographic protocol, a sender delivers one of potentially many messages to a recipient, but remains unknown to the recipient; non-homogeneous voucher (NFT), which refers to a data unit on a digital book of a block chain platform, can represent a unique digital material, and is used as an electronic certificate or certificate for ownership of a virtual commodity, and has a characteristic of being unable to exchange.
Based on the data processing architecture, the embodiment of the present application describes the data processing system 10 in detail from three stages, namely, data storage, data verification and data use.
First, the phase for data storage. The user personal information may be stored in the data generating terminal 101, or may be downloaded from the generated data generating terminal 101 by the user terminal 102 to select a data storage method. Thus, even if the data generation end 101 terminates the service and no server is maintained, the user can autonomously control the personal information of the user.
Based on this, for the data generating end 101, in an example, the data generating end 101 may be configured to obtain the user personal information of the user end 102, where the user personal information may include at least one of the following: name, identification card number, mobile phone number, home address, positioning information, age, personal assets, health condition and the like. In another example, the data generating end 101 may be further configured to encrypt the user personal information D by using a second preset encryption algorithm to obtain a second encryption result, and generate the original data Sig of the user personal information according to the second encryption result and the first digital signature of the data generating end by using a preset digital signature algorithm generator (D) .1. The In another example, the data generation end 101 may be further configured to, in a case where a data acquisition request sent by the user end 102 is received, send the original data Sig to the user end 102 through a trusted transmission channel established between the data generation end 101 and the user end 102 generator (D) Wherein the trusted transport isThe tracks are determined by a preset protocol signed between the data generation side 101 and the user side 102. Here, the second preset encryption algorithm and the preset digital signature algorithm may be both algorithms for secure multiparty computation.
For the user end 102, in an example, the user end 102 may be configured to send a data obtaining request to the data generating end 101 based on a preset protocol signed with the data generating end 101 to obtain the original data Sig generator (D) .1. The In another example, the user terminal 102, upon acquiring the raw data, autonomously selects a storage terminal of the raw data, such as one stored in any cloud terminal, locally, or the like, so as to aggregate and manage the personal information of the user.
Here, in order to ensure the authenticity of the personal information of the user, the user terminal 102 may also upload a user certificate corresponding to the original data to the blockchain platform 103, so that the data using terminal 104 that wants to use the original data at a later time verifies the authenticity of the original data.
Secondly, in the data verification stage, the user side can upload the certificate on a block chain platform established by an authority so as to prove the authenticity of the original data.
Thus, for the user end 102, in one example, the user end 102 is configured to encrypt (Crypto) and Sign (Sign) the Attribute (ATTR) of the original data user ) Generating user certificate user =Sign user (Crypto (ATTR)) for third party agencies such as the blockchain platform 103 to verify the authenticity of the original data. In another example, the user terminal 102 can be further configured to verify the user certificate user =Sign user (Crypto (ATTR)) is uploaded to a credentialing platform of the blockchain platform 103 for storage. Wherein the Attribute (ATTR) may include a user ID (ID) user ) Raw data HASH value (HASH (Sig)) generator (D) Etc.), timestamp (Timestamp), etc. Further, the timestamp is a timestamp of the original data uploaded by the user terminal 102.
The blockchain platform 103 may be configured to receive a user certificate sent by the user terminal 102, and store the user certificate in the certificate storing platform.
Then, for the data using stage, the actual requirement of the data using end 104 such as a third party organization is not the user personal information of the user end, but the user personal information is used to verify some result (e.g. whether it is the user himself, whether it is an adult, whether it meets the application standard in a certain scenario, etc.). The user does not want to authorize and collect the personal information of the user on excessive platforms, does not want to authorize a certain data using end excessively, and at the same time, wants to enjoy the service convenience provided by the data using end.
In this way, the data consumer 104 can deploy an intelligent contract at the intelligent contract layer of the blockchain platform 102, and apply for data query authority to the user by using a privacy computing technology, the intelligent contract finally outputs a query result and a user storage certificate in a non-homogeneous certification (NFT) form, and specifies the use period or the number of NFT, so that the user personal information of the user end can be invisible, the query requirement of the data consumer 104 can be met, the user personal information is exposed to the minimum, and meanwhile, the NFT can ensure the transfer efficiency and can ensure that the use and the transfer process of the computing result can be tracked.
Based on this, the data consumer 104, in an example, the data consumer 104, is configured to convert a first demand function F1 (factor) corresponding to the query task and a second demand function F2 (factor) corresponding to the task query condition into a computing circuit C (factor), and then construct a corresponding obfuscated circuit (GC) based on the computing circuit C, where the factor represents user personal information required by the data consumer 104. In another example, the data consumer 10 is also configured to deploy a garbled circuit GC in a first intelligent contract of the intelligent contract layer, and write information such as the usage purpose, usage number (or cycle), and the like of the calculation result in the first intelligent contract. In yet another example, the data consumer 10 is further configured to send the first intelligent contract and the obfuscated table of the GC to the consumer via the blockchain platform 103.
The user end 102, in an example, the user end 102 is configured to, after determining that the query task in the first intelligent contract and the task query condition of the query task are agreed, perform N times of blackout transmission with the data consumer end 104 according to the identity of the data consumer end 104 in the first intelligent contract, and obtain an obfuscated value of an authorization identifier, that is, a factor, corresponding to the query task, where at this time, the obfuscated value can be recognized by only the data consumer end 104 that performs the N times of blackout transmission with the user end 102, so as to analyze the NFT according to the obfuscated value, and obtain the query result. In another example, the user terminal 102 is further configured to input the obfuscated value into a GC in the first intelligent contract to obtain a second intelligent contract, and send the second intelligent contract to the blockchain platform 103.
The blockchain platform 103, in one example, the blockchain platform 103, is configured to generate a Non-homogeneous token (NFT) based on the second smart contract, where the NFT only displays the calculation result and has a limitation on the number of uses (or the usage period). Here, the final query result and the user certificate are output in the form of NFT, the lifetime or the number of times of the query result by the data consumer 104 is specified, and the usage record is uploaded as it is. Since the NFT represents the query result of the privacy computation, the user side does not authorize the original data to the data consumer side, but authorizes the data consumer side with the query result of whether the task query condition is satisfied through the NFT, so that the data consumer side 103 provides the service to the user side 102 after receiving the NFT. In another example, the blockchain platform 103 may be further configured to receive a trace request sent by the client 102, so as to feed back the NFT streaming process according to the trace request. Here, the intelligent contract can compare and verify the attribute of the original data and the evidence of the block chain platform thereof, and ensure the authenticity of the data.
It should be clear that, after receiving the NFT, the data consumer 103 may be configured to match the authorization identifier in the NFT based on the authorization identifier obtained by performing N-times lossy transmission with the user end 102, and if the authorization identifier and the authorization identifier are matched, may extract the plaintext of the query result in the NFT.
Therefore, by receiving a data query request sent by a data using end, the data query request comprises a query task and a task query condition of the query task; according to the data query request, sending a verification instruction to a user side related to the query task, wherein the verification instruction comprises a first intelligent contract, the first intelligent contract is determined by the query task and a task query condition, and the verification instruction is used for indicating the user side to provide an authorization identifier corresponding to the task query condition based on the first intelligent contract; under the condition of acquiring a second intelligent contract fed back by a user side, sending a non-homogenization evidence to a data using side according to an authorization identifier in the second intelligent contract; the non-homogenization evidence comprises an inquiry result of an inquiry task and a user evidence, wherein the inquiry result is a result of whether a task inquiry condition is met, the user evidence is provided by a user side, the user evidence carries a first data signature of a data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user evidence is a certificate for representing the authenticity of the original data. Therefore, for the user side, the user can be supported to independently download the original data of the user personal information, and the option of the user personal data storage mode is expanded, namely the user can independently select the data storage mode such as storage in the local or cloud, in order to ensure that the authenticity of the original data is conveniently verified by the data using side at the later stage, the user side needs to upload the attribute characteristics of the original data and the user certificate generated by the second data signature of the user side to the block chain platform so as to store the certificate representing the authenticity of the original data, and therefore, when the data using side needs to inquire corresponding data, the block chain platform of the third party can also request the user side through the block chain platform, the decision that the user side participates in the storage, management and use links of the user personal information is realized, and the user right guarantee responsibility is clear. And original data of personal information of the user can be stored in a trusted mode through the blockchain platform, a trust mechanism in the data processing process is guaranteed, a way of applying for inquiry authority to the user side is provided for the data using side through intelligent contract of the blockchain platform, and the blockchain platform further adopts a privacy computing technology to guarantee privacy safety of the data in the intelligent contract, so that the original data can not be seen from the data using side, and the data using side is prevented from storing and abusing the original data in a private mode.
In addition, in the embodiment of the application, the query result and the user certificate are output in a non-homogeneous certification NFT form through an intelligent contract supported by a privacy computing technology, so that because the NFT content is encrypted, only a data using end can identify the NFT, the leakage of the output query result and the user certificate is avoided, the original data is invisible, a resource using party cannot obtain the original data, only the query result of a query task can be obtained, the query requirement of the data using end is met, the data authorization minimization is realized, the privacy safety of user personal information is protected, and the leakage of the user personal information is avoided. For the data using end, the inquiring result of the inquiring task and the data signatures of multiple parties, such as the first data signature of the data generating end and the second data signature of the user end, carried in the user certificate are used, so that even if the data using end cannot acquire the original data of the personal information of the user, the authenticity of the original data can be verified through the data signatures of the multiple parties.
It should be noted that the data processing method provided by the embodiment of the present application can be applied to the generation of the resident health code across jurisdictions, such as health departments of other jurisdictions, and the detection result of the resident can be checked without obtaining all the identity information of the resident. The data processing method provided by the embodiment of the application can also be applied to house purchase qualification certification, for example, a house sales agent does not need to obtain all materials of user identity certification, property certification, family relation and the like, only needs to write qualification conditions in an intelligent contract, the user provides data, and the contract finally generates a result meeting or not meeting the requirements to a seller. In addition, the data processing method provided by the embodiment of the application can be applied to an aggregation payment or cash register platform, for example, a user or a merchant only needs to open an account on the aggregation platform, purses do not need to be opened on a plurality of payment platforms, NFT can be transmitted between data users and payees, different data users use one account to register, and correspondingly, the user can use one account to pay on a plurality of data users, so that each data user cannot acquire original data, and the query result of a query task can also be acquired.
Based on the data processing system and the application scenario described above, in order to better explain the above, the data processing method provided by the embodiment of the present application is explained below with reference to fig. 2 to 5.
First, a data processing method based on a blockchain platform provided in an embodiment of the present application is described in detail below with reference to fig. 2.
Fig. 2 is a flowchart of a data processing method based on a blockchain platform according to an embodiment of the present disclosure.
As shown in fig. 2, the data processing method may be applied to the block chain platform shown in fig. 1, and the data processing method may specifically include the following steps:
step 210, receiving a data query request sent by a data using end, wherein the data query request comprises a query task and a task query condition of the query task; 220, sending a verification instruction to a user side related to the query task according to the data query request, wherein the verification instruction comprises a first intelligent contract, the first intelligent contract is determined by the query task and a task query condition, and the verification instruction is used for indicating the user side to provide an authorization identifier corresponding to the task query condition based on the first intelligent contract; and step 230, under the condition that the second intelligent contract fed back by the user side is obtained, sending a non-homogenization evidence to the data user side according to the authorization identifier in the second intelligent contract. The non-homogeneous certificate comprises a query result of a query task and a user certificate, the query result is a result of whether a task query condition is met, the user certificate is provided by a user side, the user certificate carries a first data signature of a data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user certificate is a certificate for representing authenticity of the original data.
Therefore, for the user side, the user can be supported to independently download the original data of the personal information of the user, the option of the personal data storage mode of the user is expanded, namely, the user can independently select the data storage mode such as a block chain platform stored in a third party, and when the data using side wants to inquire corresponding data, the user side can be requested through the block chain platform, the decision of the user side participating in the storage, management and use links of the personal information of the user is realized, and the user right guarantee responsibility is definite. And original data of personal information of the user can be stored in a trusted mode through the blockchain platform, a trust mechanism in the data processing process is guaranteed, a way of applying for inquiry authority to the user side is provided for the data using side through intelligent contract of the blockchain platform, and the blockchain platform further adopts a privacy computing technology to guarantee privacy safety of the data in the intelligent contract, so that the original data can not be seen from the data using side, and the data using side is prevented from storing and abusing the original data in a private mode. In addition, in the embodiment of the application, the query result and the user deposit certificate are output in a non-homogeneous certification NFT form through an intelligent contract supported by a privacy computing technology, so that because the content of the NFT is encrypted, only a data using end can identify the NFT, the leakage of the output query result and the user deposit certificate is avoided, the original data can not be used and seen, a resource user can not obtain the original data and can only obtain the query result of a query task, the query requirement of the data using end is met, the minimization of data authorization is realized, the privacy safety of user personal information is protected, and the leakage of the user personal information is avoided. For the data using end, the inquiring result of the inquiring task and the data signatures of multiple parties, such as the first data signature of the data generating end and the second data signature of the user end, carried in the user certificate are used, so that even if the data using end cannot acquire the original data of the personal information of the user, the authenticity of the original data can be verified through the data signatures of the multiple parties.
The above steps are described in detail below, specifically as follows:
referring first to step 210, in one or more possible embodiments, the task query condition includes at least one of: the data using end uses the destination information of the data and the time information of the data.
Illustratively, the purpose information is related to application scenes, such as house purchase, insurance purchase and the like. The time information of the usage data may include a usage time interval and a usage frequency, i.e., usage may be counted only twice a year, or monthly, etc.
And the query task can be whether the house purchasing condition is met, whether the insurance purchasing condition is met, whether the condition of entering and leaving the public place is met, whether the study age is met, and the like. The corresponding query task conditions can include that in the query task for whether the house purchasing condition is met, the task query conditions can be that the user assets are more than 10 thousands, the social security is paid for 3 years, and the fixed income exists; in the query task aiming at whether the conditions for purchasing insurance are met, the task query conditions are that the weight does not exceed 70 kg, the age is less than 30 and the like; in the inquiry task for judging whether the business information accords with the business information in and out of the public place, the task inquiry condition can be that the temperature is lower than 36.5, the identity document is proved, and the like; in the task of inquiring whether the study age is met, the task inquiry conditions are that the age does not exceed 10 years, the health is proved, the ordinary residence is in the city A, and the like. Here, the query result corresponding to the query result may include a yes or no conclusion, that is, the query result is a query task satisfying the house purchasing condition or a query task not satisfying the house purchasing condition for the query task satisfying the house purchasing condition; similarly, the query result of the query task of whether the conditions for purchasing insurance are met is that the conditions for purchasing insurance are met or not.
Therefore, the service life or the number of times of the NFT can be specified in the intelligent contract so as to be checked by a user, and therefore, the data transfer efficiency can be ensured, the NFT is prevented from being abused, and the data safety is ensured.
And, in another or more possible embodiments, before step 210, the data processing method may further include:
receiving a user certificate transmitted by a user side, wherein the user certificate is determined by the attribute characteristics of original data, and the attribute characteristics comprise at least one of the following items: the identity of the user side, the hash sequence of the original data and the timestamp for uploading the original data.
Here, it should be noted that the attribute feature is an attribute feature of the original data, and after the user certificate is generated based on the original data, the user certificate also carries the attribute feature, and the attribute feature is at least one of the following: the identity of the user side, the hash sequence of the original data and the time stamp of the uploaded original data.
Referring next to step 220, in one or more possible embodiments, prior to step 220, the data processing method may further include:
step 2401, obtaining a confusion circuit and an initial intelligent contract which are constructed at a data using end, wherein the confusion circuit is obtained by converting a first demand function corresponding to a query task and a second demand function corresponding to a task query condition, and the initial intelligent contract corresponds to the confusion circuit;
step 2402, writing the query task and the task query condition into the initial intelligent contract through the garbled circuit to obtain a first intelligent contract.
And the data use party applies for inquiring data to the user through the garbled circuit by the intelligent contract layer of the block chain platform, and the user side and the data side are transmitted in a lost mode for multiple times until the garbled finger is acquired so as to obtain the NFT.
Based on this, in an example, the step 2401 may specifically include:
receiving a deployment request sent by a data using end, wherein the deployment request comprises an obfuscation circuit constructed by the data using end;
constructing an initial intelligent contract corresponding to the data using end according to the deployment request;
and associating the garbled circuit at the data using end with the initial intelligent contract.
In another or more possible embodiments, the first intelligent contract in the embodiments of the present application further includes an identity of the data consumer, and the authorization identifier is obtained by the user side based on that the identity of the data consumer and the data consumer make N times of blank transmission, where N is a positive integer greater than 1.
Then, step 230 is involved, and in one or more possible embodiments, this step 230 may specifically include:
step 2301, inputting the authorization identifier in the second intelligent contract into a garbled circuit of the data using end to obtain a target garbled circuit;
step 2302, checking a task query condition in the second intelligent contract and an authorization identifier corresponding to the task query condition through a target confusion circuit to obtain a query result of a query task;
2303, generating a non-homogenization voucher according to the user voucher storage and the query result of the query task;
step 2304, sending non-homogenization evidence to the data using end.
Therefore, the NFT generated by the intelligent contract is supported by the privacy computing technology, the content (use, purpose, related original data and the like) of the NFT is encrypted, only the data using end can read the operation result of the NFT, the data using end cannot acquire source data, meanwhile, the query requirement can be met based on the NFT, and therefore data authorization minimization is achieved, the data using end cannot store personal information of a user privately, and privacy and safety are protected.
In another possible embodiment or embodiments, the user certifies the corresponding summary data, and the summary data is used to characterize the data type of the original data, based on which, before step 230, the data processing method may further include:
step 2501, according to the query task, screening target abstract data related to the query task from a plurality of pre-stored abstract data, wherein the target abstract data correspond to target original data;
step 2502, determining a target user end corresponding to the target original data as a user end related to the query task.
Here, the data type may be money amount, age, blood pressure value, etc.
In addition, after step 230, the data processing method provided in the embodiment of the present application may further include:
receiving a tracking request sent by a user side, wherein the tracking request comprises an identity of the user side;
acquiring a target non-homogenization pass corresponding to the user side according to the identity of the user side;
sending access data corresponding to the target non-homogenization permit to a user side; wherein, the first and the second end of the pipe are connected with each other,
accessing the data includes at least one of: the method comprises the steps of accessing an identity of a data using end of a target non-homogeneous certificate, a transaction record of the target non-homogeneous certificate and the data using end, a first stream record of the target non-homogeneous certificate on a block chain platform, and a second stream record of the target non-homogeneous certificate on the data using end and the block chain platform.
Therefore, the NFT can upload the used record of the original data to be conveniently inquired by a user, know the personal information access condition of the user, inform the subsequent circulation process of the NFT, realize the decision of the user side participating in the storage, management and use links of the personal information of the user and make the user right guarantee responsibility clear.
Next, based on the same inventive concept, the data processing method based on the user terminal provided in the embodiment of the present application is described in detail below with reference to fig. 3.
Fig. 3 is a flowchart of data processing based on a user side according to an embodiment of the present disclosure.
As shown in fig. 3, the data processing method may be applied to the user side shown in fig. 1, and specifically includes the following steps:
step 310, acquiring original data sent by a data generating end, wherein the original data is determined by user personal information of a user end and a first digital signature of the data generating end; step 320, generating a user certificate according to the attribute characteristics of the original data and a second data signature of the user side; step 330, sending a user deposit certificate to the blockchain platform, wherein the user deposit certificate is a certificate for representing the authenticity of the original data; step 340, receiving a checking instruction sent by the block chain platform, wherein the checking instruction comprises a first intelligent contract, and the first intelligent contract is determined by a query task in a data query request provided by a data using end and a task query condition of the query task; step 350, marking a task query condition according to a query task in the first intelligent contract through an authorization identifier to obtain a second intelligent contract; step 360, a second intelligent contract is sent to the blockchain platform.
Therefore, for the user side, the user can be supported to independently download the original data of the personal information of the user, the option of the personal data storage mode of the user is expanded, namely the user can independently select the data storage mode such as a block chain platform stored in a third party, and when the data using side wants to inquire corresponding data, the user side can also make a request to the user side through the block chain platform, the user side is made to participate in the decision of the personal information of the user in the links of storage, management and use, and the responsibility of the user right guarantee is clear. And in order to ensure that the authenticity of the original data can be verified, the user side uploads a user certificate which can prove the authenticity of the data to a block chain platform which is dominated by an authority, the user side can know where the personal data can be verified, and the data user side can verify the certificate through the block chain platform, so that the data input by the user is ensured to be authentic.
The above steps are described in detail as follows:
referring first to step 310, in one or more possible embodiments, step 310 may specifically include:
sending a data acquisition request to a data generation end, wherein the data acquisition request is used for requesting the data generation end to send original data corresponding to the user end;
and receiving the original data sent by the data generation end.
In this way, the option of the personal data storage mode of the user is expanded, the personal data is not only stored in the data generation end, but also can be downloaded from the data generation end by the user, and the personal data can be automatically and comprehensively selected by the data storage mode.
Second, referring to step 320, in one or more possible embodiments, step 320 may specifically include:
encrypting the attribute characteristics of the original data through a first preset encryption algorithm to obtain a first encryption result;
and marking the first encryption result through the second data signature to obtain the user deposit certificate.
Here, it should be noted that, because the original data carries the first digital signature of the data generation end, based on this, after the attribute feature of the original data is encrypted, the first encryption result is further marked and processed by the second data signature, so as to obtain the user certificate, the user certificate will include both the first digital signature of the data generation end and the second data signature of the user end, so that when the user end uses the data, the authenticity of the original data can be verified by the two data signatures. And, the first predetermined encryption algorithm may also be for secure multiparty computation.
Further, in step 350, in one or more possible embodiments, the first intelligent contract further includes an identity of the data consumer; before the step 350, the data processing method may further include:
based on the identity of the data using end, performing N times of disappearing transmission with the data using end, and acquiring the authorization identifier corresponding to the query task.
At this time, the authorization identifier may be an obfuscated value, and the user side may send the obfuscated value to the data using side, so that the data using side matches the authorization identifier in the NFT based on the authorization identifier obtained by performing nth-time lossy transmission with the user side, and in a case where the authorization identifier and the authorization identifier are matched, a plaintext of the query result in the NFT may be extracted; or, the user side may send the confusion table corresponding to the confusion value to the data user side, so that the data user side verifies the confusion value in the NFT based on the confusion table, and may extract the plaintext of the query result in the NFT when the two are matched; or, the data consumer may obtain the authorization identifier together with the user terminal when performing the N times of blank transmission with the user terminal, and based on this, the authorization identifier obtained by the data consumer based on the data consumer is matched with the authorization identifier in the NFT, and in a case that the authorization identifier and the authorization identifier are matched, the plaintext of the query result in the NFT may be extracted.
Then, step 360, in one or more possible embodiments, after step 360, the data processing method may further include:
receiving a first input of a user;
responding to the first input, sending a tracking request to the blockchain platform, wherein the tracking request comprises an identity of a user side, and the tracking request is used for requesting the blockchain platform to send access data corresponding to a target non-homogeneous certificate, and the target non-homogeneous certificate corresponds to the user side;
receiving access data sent by a blockchain platform, wherein the access data comprises at least one of the following data: the method comprises the steps of accessing an identity of a data using end of a target non-homogeneous certificate, transaction records of the target non-homogeneous certificate and the data using end, a first flow record of the target non-homogeneous certificate on a block chain platform, and a second flow record of the target non-homogeneous certificate on the data using end and the block chain platform.
Therefore, through the intelligent contract supported by the privacy computing technology, the query result and the user certificate are output in a non-homogeneous certification NFT form, and therefore, because the content of the NFT is encrypted, only the data using end can identify the NFT, the leakage of the output query result and the user certificate is avoided, the original data can not be used and seen, the resource using party can not obtain the original data, only the query result of a query task can be obtained, the query requirement of the data using end is met, the minimization of data authorization is realized, the privacy safety of user personal information is protected, and the leakage of the user personal information is avoided. And the used records of the NFT are recorded on the blockchain platform, so that a user can follow the flow transfer of the NFT in the whole process through the blockchain platform, the violation condition of a data using end is reduced, the personal information of the user is prevented from being leaked, the data safety of the user is maintained, the decision that the user end participates in the personal information of the user in the links of storage, management and use is realized, and the responsibility of the user right guarantee is clear.
Next, based on the same inventive concept, the data processing method based on the data generating end provided in the embodiment of the present application is described in detail below with reference to fig. 4.
Fig. 4 is a flowchart of data processing based on a data generation end according to an embodiment of the present application.
As shown in fig. 4, the data processing may be applied to the data generating end shown in fig. 1, and the data processing method may specifically include the following steps:
step 410, acquiring user personal information of a user side; step 420, encrypting the personal information of the user through a second preset encryption algorithm to obtain a second encryption result; step 430, generating original data of the personal information of the user according to the second encryption result and the first digital signature of the data generation end; step 440, in case of receiving the data obtaining request sent by the user side, sending the original data to the user side.
Illustratively, first, user personal information of a user terminal may be obtained, where the user personal information may include at least one of the following: name, identification card number, mobile phone number, home address, positioning information, age, personal assets, health condition, etc. And then, encrypting the personal information of the user through a second preset encryption algorithm to obtain a second encryption result, and generating original data of the personal information of the user according to the second encryption result and the first digital signature of the data generation end through a preset digital signature algorithm. In this case, in the case of receiving a data acquisition request sent by a user side, original data is sent to the user side through a trusted transmission channel established between the data generation side and the user side, where the trusted transmission channel is determined by a preset protocol signed between the data generation side 101 and the user side 102.
Therefore, the original data can be generated based on the personal information of the user, so that the user can be supported to independently download the original data of the personal information of the user, and the option of the personal data storage mode of the user is expanded, namely, the user can independently select the data storage mode such as a block chain platform stored in a third party, and when the data using end wants to inquire corresponding data, the user can also make a request to the user end through the block chain platform, so that the decision of the user end participating in the links of storing, managing and using the personal information of the user is realized, and the user right guarantee responsibility is clear.
Next, based on the same inventive concept, the data processing method based on the data using end provided in the embodiment of the present application is described in detail below with reference to fig. 5.
Fig. 5 is a flowchart of data processing based on a data consumer according to an embodiment of the present disclosure.
As shown in fig. 5, the data processing method may be applied to the data using end shown in fig. 1, and specifically may include the following steps:
step 510, sending a data query request to the blockchain platform, where the data query request includes a query task and a task query condition of the query task, and the data query request is used to request the blockchain platform to send a query result of the query task; step 520, receiving a non-homogenization certification transmitted by the blockchain, wherein the non-homogenization certification comprises a query result of the query task and a user certificate, the query result is a result of whether the task query condition is met, the user certificate is provided by the user side, the user certificate carries a first data signature of the data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user certificate is a certificate for representing the authenticity of the original data.
Therefore, for the data using end, the authenticity of the original data can be verified through the multi-party data signatures even if the data using end fails to acquire the original data of the personal information of the user.
The above steps are described in detail as follows:
referring first to step 510, in one or more possible embodiments, a task query includes at least one of: the data using end uses the destination information of the data and the time information of the data.
Then, referring to step 520, in one or more possible embodiments, after step 520, the data processing method may further include:
step 530, receiving a second input of the user;
step 540, in response to the second data, acquiring a query task corresponding to the second input and a task query condition of the query task;
step 550, converting a first demand function corresponding to the query task and a second demand function corresponding to the task query condition through a preset conversion algorithm to obtain a confusion circuit;
and step 560, sending a deployment request to the blockchain platform, where the deployment request includes the obfuscation circuit, and the deployment request is used to request the blockchain to write the obfuscation circuit into the initial intelligent contract corresponding to the data using end.
It is noted that, in one example, after step 540, step 510 may be performed.
In addition, it should be noted that, in the embodiment of the present application, the data signatures, such as the first data signature of the data generation end and the second data signature of the user end, are both used to determine the validity and authenticity of the user data, so as to ensure that the original data cannot be tampered in the whole data processing system, and ensure that the identities of both parties in the transaction are authentic and reliable.
Based on the foregoing fig. 2 to fig. 5, in order to better understand the data processing method provided in the embodiment of the present application, the embodiment of the present application specifically takes a qualification certification of house purchase as an example, and the user side is the user a, and the data user side is a property seller, which are specifically described as follows.
The property sales agent needs to verify the property of the purchased house of the user and needs the user to provide various certification materials such as user personal information in the aspects of user identity family information, marital status, income level, education level, hired state and the like according to relevant regulation requirements. If the house property sales agent side maliciously reveals the user personal information profit-making or does not properly store the information, the house property sales agent side can form great threat to the production and life safety of the user. In an actual scene, a user is very passive to the problems of where the user personal information is stored, how much data is authorized, how to maintain accountability after the user personal information is leaked, and the like.
Based on this, the embodiments of the present application provide a data processing method, and the specific steps are as follows.
Referring to fig. 1 and S1, a data generating end having public trust, such as a police station, a civil bureau, a social security bureau, a bank, etc., may generate original data of a user a according to personal information of the user a and a first digital signature of the data generating end.
And S2, the user side can download the original data from each data generation side and select a trusted storage platform for storage. Here, the data can be stored locally or in the cloud, in order to ensure the security of the original data and facilitate the later data using end to verify the authenticity of the original data, the user end needs to upload the attribute characteristics of the original data and the user certificate generated by the second data signature of the user end to the block chain platform to store the certificate representing the authenticity of the original data.
And S3, based on the user identity, the user side generates a user certificate according to the attribute characteristics of the original data and the second data signature of the user side, and sends the user certificate to the block chain platform, wherein the user certificate is a certificate for representing the authenticity of the original data. When receiving the user certificate, the blockchain platform can store the user certificate to the certificate storage platform so as to verify the authenticity of the original data at a later period.
And S4, the house property seller needs only the result, but not the original data of the user A, for verifying the house purchasing qualification of the user A. Therefore, the seller can deploy the privacy calculation contract at the intelligent contract layer in the block chain platform, write the verification process into the garbled circuit, write the circuit into the first intelligent contract, and send the first intelligent contract to the user A through the block chain platform.
And S5, the user A and the house property seller perform repeated blank transmission, the user A obtains the confusion value of the data required by the house property seller, the user A does not need to write real original data into the first intelligent contract, but fills the authorization identifier such as the confusion value, and a second intelligent contract is generated.
And S6, the user A sends the generated second intelligent contract to an intelligent contract layer in the block chain platform.
And S7, the block chain platform calls the user certificate in the certificate storage platform, and generates the non-homogeneous certification NFT according to the user certificate and the query result calculated based on the authorization identifier in the second intelligent contract. The method comprises the steps that a query result is calculated by an intelligent contract layer and is embodied in an NFT form, wherein the NFT represents the user A who carries out privacy calculation to buy the house qualification (according/not according), the user A does not authorize original data to a house seller, and the NFT authorizes the calculation result to the house seller, namely the query result that the house qualification of the user A meets or does not meet is obtained.
And S8, the block chain platform sends the NFT to the property seller, and the property seller analyzes the NFT to obtain a result of the property (conformity/nonconformity) purchased by the user A so as to provide subsequent services for the user A.
It should be noted that, the privacy computing technology supports the NFT generated by the intelligent contract, only the property seller who knows the obfuscation value can interpret the NFT, and the other nodes on the chain can only see the attribution of the NFT, but do not know the meaning of the NFT, and the privacy of "the user intentionally purchases the house" is kept secret from the other nodes. If other organizations want to use the NFT, the house property seller needs to authorize the NFT transaction, and the process of the house property seller in the NFT transaction is recorded on the block chain platform, so that the user A can follow the flow of the NFT in the whole process, the violation condition of the data using end is reduced, the personal information of the user is prevented from being leaked, and the data security of the user is maintained.
In summary, for the user side, the user can be supported to autonomously download the original data of the user personal information, and the option of the user personal data storage manner is expanded, that is, the user can autonomously select the data storage manner such as a block chain platform stored in a third party, and when the data user side wants to query corresponding data, a request can be made to the user side through the block chain platform, so that the user side can participate in the decision of the user personal information in the storage, management and use links, and the user right guarantee responsibility is clear. And original data of personal information of the user can be stored in a trusted mode through the blockchain platform, a trust mechanism in the data processing process is guaranteed, a way of applying for inquiry authority to the user side is provided for the data using side through intelligent contract of the blockchain platform, and the blockchain platform further adopts a privacy computing technology to guarantee privacy safety of the data in the intelligent contract, so that the original data can not be seen from the data using side, and the data using side is prevented from storing and abusing the original data in a private mode. In addition, in the embodiment of the application, the query result and the user deposit certificate are output in a non-homogeneous certification NFT form through an intelligent contract supported by a privacy computing technology, so that because the content of the NFT is encrypted, only a data using end can identify the NFT, the leakage of the output query result and the user deposit certificate is avoided, the original data can not be used and seen, a resource user can not obtain the original data and can only obtain the query result of a query task, the query requirement of the data using end is met, the minimization of data authorization is realized, the privacy safety of user personal information is protected, and the leakage of the user personal information is avoided. For the data using end, the inquiring result of the inquiring task and the data signatures of multiple parties, such as the first data signature of the data generating end and the second data signature of the user end, carried in the user certificate are used, so that even if the data using end cannot acquire the original data of the personal information of the user, the authenticity of the original data can be verified through the data signatures of the multiple parties.
Based on the same inventive concept, the application provides a data processing device. This is explained in detail with reference to fig. 6.
Fig. 6 is a schematic structural diagram of a data processing apparatus based on a blockchain platform according to an embodiment of the present application.
In some embodiments of the present application, the data processing apparatus 60 shown in fig. 6 can be disposed in a blockchain platform as shown in fig. 1.
As shown in fig. 6, the data processing apparatus 60 may specifically include:
a receiving module 601, configured to receive a data query request sent by a data using end, where the data query request includes a query task and a task query condition of the query task;
a sending module 602, configured to send, according to the data query request, a verification instruction to a user side related to the query task, where the verification instruction includes a first intelligent contract, the first intelligent contract is determined by the query task and a task query condition, and the verification instruction is used to instruct the user side to provide an authorization identifier corresponding to the task query condition based on the first intelligent contract;
the sending module 602 is further configured to send a non-homogenization certification to the data using end according to the authorization identifier in the second intelligent contract when the second intelligent contract fed back by the user end is obtained;
the non-homogeneous certificate comprises a query result of a query task and a user certificate, the query result is a result of whether a task query condition is met, the user certificate is provided by a user side, the user certificate carries a first data signature of a data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user certificate is a certificate for representing authenticity of the original data.
The data processing device 60 in the embodiment of the present application will be described in detail below.
In one or more alternative embodiments, the data processing apparatus 60 in the embodiment of the present application may further include a first obtaining module and a writing module; wherein the content of the first and second substances,
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring a garbled circuit and an initial intelligent contract which are constructed by a data using end, the garbled circuit is obtained by converting a first demand function corresponding to a query task and a second demand function corresponding to a task query condition, and the initial intelligent contract corresponds to the garbled circuit;
and the writing module is used for writing the query task and the task query condition into the initial intelligent contract through the confusion circuit to obtain a first intelligent contract.
In another or various alternative embodiments, the data processing apparatus 60 in the embodiment of the present application may further include a building module and an association module; wherein the content of the first and second substances,
the receiving module 601 may be further configured to receive a deployment request sent by the data using end, where the deployment request includes an obfuscated circuit constructed by the data using end;
the construction module is used for constructing an initial intelligent contract corresponding to the data using end according to the deployment request;
and the association module is used for associating the garbled circuit of the data storage using end with the initial intelligent contract.
In yet another or various alternative embodiments, the data processing apparatus 60 in the embodiments of the present application may further include an input module, a collation module, and a generation module; wherein the content of the first and second substances,
the input module is used for inputting the authorization identifier in the second intelligent contract into the confusion circuit of the data using end to obtain a target confusion circuit;
the checking module is used for checking the task query condition in the second intelligent contract and the authorization identifier corresponding to the task query condition through the target confusion circuit to obtain a query result of the query task;
the generating module is used for generating the non-homogeneous certificate according to the user certificate storage and the query result of the query task;
the sending module 602 is further configured to send the non-homogeneity certification to the data using end.
In still another or more alternative embodiments, the data processing apparatus 60 in the embodiment of the present application may further include a screening module and a determining module; wherein the content of the first and second substances,
the screening module is used for screening target abstract data related to a query task from a plurality of prestored abstract data according to the query task under the condition that the user certificate corresponds to the abstract data which is used for representing the data type of the original data, wherein the target abstract data corresponds to the target original data;
and the determining module is used for determining the target user side corresponding to the target original data as the user side related to the query task.
In still another one or more alternative embodiments, the first intelligent contract further includes an identity of the data consumer, and the authorization identifier is obtained by the user side through N times of casual transmission between the identity of the data consumer and the data consumer, where N is a positive integer greater than 1.
In still another or more alternative embodiments, the data processing apparatus 60 in the embodiment of the present application may further include a second obtaining module; wherein the content of the first and second substances,
the receiving module 601 may also be configured to receive a tracking request sent by a user side, where the tracking request includes an identity of the user side;
the second acquisition module is used for acquiring a target non-homogeneous certificate corresponding to the user side according to the identity of the user side;
the sending module 602 may be further configured to send, to the user side, access data corresponding to the target non-homogeneous certificate; wherein the content of the first and second substances,
the access data includes at least one of: the method comprises the steps of accessing an identity of a data using end of a target non-homogeneous certificate, transaction records of the target non-homogeneous certificate and the data using end, a first flow record of the target non-homogeneous certificate on a block chain platform, and a second flow record of the target non-homogeneous certificate on the data using end and the block chain platform.
In yet another or more alternative embodiments, the user credentials are determined from attribute characteristics of the raw data, the attribute characteristics including at least one of: the identity of the user side, the hash sequence of the original data and the timestamp for uploading the original data;
the task query condition includes at least one of: the data using end uses the destination information of the data and the time information of the data.
Therefore, original data of personal information of a user can be stored in a trusted mode through the blockchain platform, a trust mechanism in the data processing process is guaranteed, a way of applying for inquiry authority to a user side is provided for a data using end through intelligent contract of the blockchain platform, and the blockchain platform further adopts a privacy computing technology to guarantee privacy safety of data in an intelligent contract, so that the original data can not be seen from the data using end, and the data using end is prevented from storing the original data in a private mode and abusing the original data. In addition, in the embodiment of the application, the query result and the user deposit certificate are output in a non-homogeneous certification NFT form through an intelligent contract supported by a privacy computing technology, so that because the content of the NFT is encrypted, only a data using end can identify the NFT, the leakage of the output query result and the user deposit certificate is avoided, the original data can not be used and seen, a resource user can not obtain the original data and can only obtain the query result of a query task, the query requirement of the data using end is met, the minimization of data authorization is realized, the privacy safety of user personal information is protected, and the leakage of the user personal information is avoided.
Based on the same inventive concept, the application provides a data processing device. The details are described with reference to fig. 7.
Fig. 7 is a schematic structural diagram of a data processing apparatus based on a user terminal according to an embodiment of the present application.
In some embodiments of the present application, the data processing apparatus 70 shown in fig. 7 may be disposed in a user side as shown in fig. 1.
As shown in fig. 7, the data processing apparatus 70 may specifically include:
an obtaining module 701, configured to obtain original data sent by a data generating end, where the original data is determined by user personal information of a user side and a first digital signature of the data generating end;
a generating module 702, configured to generate a user certificate according to the attribute characteristics of the original data and the second data signature at the user side;
a sending module 703, configured to send a user deposit certificate to the blockchain platform, where the user deposit certificate is a certificate representing authenticity of the original data;
a receiving module 704, configured to receive a verification instruction sent by a blockchain platform, where the verification instruction includes a first intelligent contract, and the first intelligent contract is determined by a query task in a data query request provided by a data using end and a task query condition of the query task;
the marking module 705 is used for marking the task query condition through the authorization identifier according to the query task in the first intelligent contract to obtain a second intelligent contract;
the sending module 703 is further configured to send the second intelligent contract to the blockchain platform.
The data processing device 70 in the embodiment of the present application will be described in detail below.
In one or more optional embodiments, the sending module 703 in this embodiment may be further configured to send a data obtaining request to the data generating end, where the data obtaining request is used to request the data generating end to send original data corresponding to the user end;
the receiving module 704 may also be configured to receive the original data sent by the data generating end.
In another or various alternative embodiments, the data processing apparatus 70 in the embodiment of the present application may further include an encryption module and a processing module; wherein the content of the first and second substances,
the encryption module is used for encrypting the attribute characteristics of the original data through a first preset encryption algorithm to obtain a first encryption result;
and the processing module is used for marking the first encryption result through the second data signature to obtain the user certificate.
In still another or multiple optional embodiments, the obtaining module 701 may be further configured to, when the first intelligent contract further includes an identity of the data consumer, perform N times of blank transmission with the data consumer based on the identity of the data consumer, and obtain the authorization identifier corresponding to the query task.
In yet another or more alternative embodiments, the receiving module 704 is further configured to receive a first input from a user;
the sending module 703 is further configured to send, in response to the first input, a tracking request to the blockchain platform, where the tracking request includes an identity of the user end, and the tracking request is used to request the blockchain platform to send access data corresponding to the target non-homogenous certificate, where the target non-homogenous certificate corresponds to the user end;
the receiving module 704 is further configured to receive access data sent by the blockchain platform, where the access data includes at least one of the following: the method comprises the steps of accessing an identity of a data using end of a target non-homogeneous certificate, a transaction record of the target non-homogeneous certificate and the data using end, a first stream record of the target non-homogeneous certificate on a block chain platform, and a second stream record of the target non-homogeneous certificate on the data using end and the block chain platform.
Therefore, for the user side, the user can be supported to independently download the original data of the personal information of the user, the option of the personal data storage mode of the user is expanded, namely, the user can independently select the data storage mode such as a block chain platform stored in a third party, and when the data using side wants to inquire corresponding data, the user side can be requested through the block chain platform, the decision of the user side participating in the storage, management and use links of the personal information of the user is realized, and the user right guarantee responsibility is definite.
Based on the same inventive concept, the application provides a data processing device. The details are described with reference to fig. 8.
Fig. 8 is a schematic structural diagram of a data processing apparatus based on a data generation end according to an embodiment of the present application.
In some embodiments of the present application, the data processing apparatus 80 shown in fig. 8 may be disposed in the data generating end as shown in fig. 1.
As shown in fig. 8, the data processing apparatus 80 may specifically include:
an obtaining module 801, configured to obtain user personal information of a user side;
the encryption module 802 is configured to encrypt the personal information of the user through a second preset encryption algorithm to obtain a second encryption result;
a generating module 803, configured to generate original data of the personal information of the user according to the second encryption result and the first digital signature of the data generating end;
the sending module 804 is configured to send the original data to the user side when receiving the data obtaining request sent by the user side.
Therefore, the data generation end can generate original data which can support a user to independently download the user personal information according to the user personal information of the user end, and the option of the user personal data storage mode is expanded, namely, the user can independently select the data storage mode, such as a block chain platform stored in a third party.
Based on the same inventive concept, the application provides a data processing device. This is explained in detail with reference to fig. 9.
Fig. 9 is a schematic structural diagram of a data processing apparatus based on a data using end according to an embodiment of the present application.
In some embodiments of the present application, the data processing device 90 shown in fig. 9 can be disposed in a data using end as shown in fig. 1.
As shown in fig. 9, the data processing apparatus 90 may specifically include:
a sending module 901, configured to send a data query request to a blockchain platform, where the data query request includes a query task and a task query condition of the query task, and the data query request is used to request the blockchain platform to send a query result of the query task;
the receiving module 902 is configured to receive a non-homogeneous certificate sent by a block chain, where the non-homogeneous certificate includes a query result of a query task and a user certificate, the query result is a result of whether a task query condition is satisfied, the user certificate is provided by a user side, the user certificate carries a first data signature of a data generating end and a second data signature of the user side, the data generating end is a platform for generating original data of user personal information of the user side, and the user certificate is a certificate for representing authenticity of the original data.
The data processing device 90 in the embodiment of the present application will be described in detail below.
In one or more alternative embodiments, the task query condition includes at least one of: the data using end uses the destination information of the data and the time information of the data.
In another or various alternative embodiments, the data processing apparatus 90 in the embodiment of the present application may further include a conversion module; wherein the content of the first and second substances,
the receiving module 904 is further configured to receive a second input of the user;
the obtaining module 901 is further configured to, in response to the second data, obtain a query task corresponding to the second input and a task query condition of the query task;
the conversion module is used for converting a first demand function corresponding to the query task and a second demand function corresponding to the task query condition through a preset conversion algorithm to obtain a confusion circuit;
the sending module 903 is further configured to send a deployment request to the blockchain platform, where the deployment request includes an obfuscated circuit, and the deployment request is used to request the blockchain to write the obfuscated circuit into an initial intelligence contract corresponding to the data consumer.
Therefore, for the data using end, through the inquiry result of the inquiry task and the data signatures of multiple parties, such as the first data signature of the data generating end and the second data signature of the user end, which are carried in the user certificate, even if the data using end fails to acquire the original data of the personal information of the user, the authenticity of the original data can be verified through the data signatures of the multiple parties.
Based on the same inventive concept, the application also provides a computer device. This is explained in detail with reference to fig. 10.
Fig. 10 is a schematic structural diagram of a computer device according to an embodiment of the present application.
As shown in fig. 10, the computer device may include at least one of the following involved in the embodiments of the present application: the device of the block chain platform, the device of the user side, the device of the data generation side and the device of the data use side. The computer device may include, among other things, a processor 1001 and memory 1002 in which computer program instructions are stored.
Specifically, the processor 1001 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 1002 may include mass storage for data or instructions. By way of example, and not limitation, memory 1002 may include a Hard Disk Drive (HDD), a floppy Disk Drive, flash memory, an optical Disk, a magneto-optical Disk, magnetic tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 1002 may include removable or non-removable (or fixed) media, where appropriate. The memory 1002 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 1002 is non-volatile solid-state memory. In a particular embodiment, the memory 1002 includes solid state storage (ROM). Where appropriate, the ROM may be mask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically Erasable PROM (EEPROM), electrically rewritable ROM (EAROM), or flash memory, or a combination of two or more of these.
The processor 1001 realizes any one of the data processing methods in the above embodiments by reading and executing computer program instructions stored in the memory 1002.
In one example, the computer device may also include a communication interface 1003 and a bus 1010. As shown in fig. 10, the processor 1001, the memory 1002, and the communication interface 1003 are connected to each other via a bus 1010 to complete communication therebetween.
The communication interface 1003 is mainly used for implementing communication between modules, apparatuses, units and/or devices in this embodiment.
The bus 1010 includes hardware, software, or both to couple the components of the flow control device to one another. By way of example, and not limitation, a bus may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a Hypertransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus or a combination of two or more of these. Bus 1010 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the present application, any suitable buses or interconnects are contemplated by the present application.
The data processing device may execute the data processing method in the embodiment of the present application, thereby implementing the data processing method and apparatus described in conjunction with fig. 1 to 9.
In addition, in combination with the data processing method in the foregoing embodiments, the embodiments of the present application may provide a computer-readable storage medium to implement. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any of the data processing methods in the above embodiments.
It is to be understood that the present application is not limited to the particular arrangements and instrumentalities described above and shown in the attached drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions or change the order between the steps after comprehending the spirit of the present application.
The functional blocks shown in the above structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranets, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed at the same time.
As will be apparent to those skilled in the art, for convenience and brevity of description, the specific working processes of the systems, modules and units described above may refer to corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered within the scope of the present application.

Claims (23)

1. A data processing method is applied to a block chain platform and comprises the following steps:
receiving a data query request sent by a data using end, wherein the data query request comprises a query task and task query conditions of the query task;
according to the data query request, sending a verification instruction to a user side related to the query task, wherein the verification instruction comprises a first intelligent contract, the first intelligent contract is determined by the query task and the task query condition, and the verification instruction is used for indicating the user side to provide an authorization identifier corresponding to the task query condition based on the first intelligent contract;
under the condition of acquiring a second intelligent contract fed back by the user side, sending a non-homogenization evidence to the data using end according to an authorization identifier in the second intelligent contract;
the non-homogenization evidence comprises an inquiry result of an inquiry task and a user evidence, wherein the inquiry result is a result of whether a task inquiry condition is met, the user evidence is provided by the user side, the user evidence carries a first data signature of a data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user evidence is a certificate for representing the authenticity of the original data.
2. The method according to claim 1, wherein before sending the verification instruction to the user terminal related to the query task according to the data query request, the method further comprises:
acquiring a garbled circuit and an initial intelligent contract which are constructed by the data using end, wherein the garbled circuit is obtained by converting a first demand function corresponding to the query task and a second demand function corresponding to the task query condition, and the initial intelligent contract corresponds to the garbled circuit;
and writing the query task and the task query condition into the initial intelligent contract through the garbled circuit to obtain the first intelligent contract.
3. The method of claim 2, wherein the obtaining the garbled circuit and the initial intelligent contract constructed by the data consumer comprises:
receiving a deployment request sent by the data using end, wherein the deployment request comprises a garbled circuit constructed by the data using end;
constructing an initial intelligent contract corresponding to the data using end according to the deployment request;
and associating and storing the garbled circuit of the data using end and the initial intelligent contract.
4. The method of claim 3, wherein sending a non-homogenization permit to the data consumer according to the authorization identifier in the second intelligent contract comprises:
inputting the authorization identifier in the second intelligent contract into the confusion circuit of the data using end to obtain a target confusion circuit;
checking a task query condition in the second intelligent contract and the authorization identifier corresponding to the task query condition through the target confusion circuit to obtain a query result of the query task;
generating a non-homogeneous certificate according to the user certificate and the query result of the query task;
and sending the non-homogenization evidence to the data using end.
5. The method according to claim 1, wherein the user certificate corresponds to summary data, and the summary data is used for representing the data type of the original data;
before sending the verification instruction to the user side related to the query task according to the data query request, the method further includes:
according to the query task, target abstract data relevant to the query task are screened from a plurality of prestored abstract data, and the target abstract data correspond to target original data;
and determining a target user side corresponding to the target original data as the user side related to the query task.
6. The method according to claim 1, wherein the first intelligent contract further includes an identity of the data consumer, and the authorization identifier is obtained by the user side based on N times of blank transmission between the identity of the data consumer and the data consumer, where N is a positive integer greater than 1.
7. The method of claim 1, further comprising:
receiving a tracking request sent by the user side, wherein the tracking request comprises an identity of the user side;
acquiring a target non-homogenization voucher corresponding to the user side according to the identity of the user side;
sending access data corresponding to the target non-homogeneous certificate to the user side; wherein the content of the first and second substances,
the access data includes at least one of: accessing an identity of a data using end of the target non-homogenization evidence, a transaction record of the target non-homogenization evidence and the data using end, a first flow record of the target non-homogenization evidence on a blockchain platform, and a second flow record of the target non-homogenization evidence on the data using end and the blockchain platform.
8. The method of any of claims 1-7, wherein the user credentials are determined from attribute characteristics of the raw data, the attribute characteristics including at least one of: the identity of the user side, the hash sequence of the original data and the timestamp for uploading the original data;
the task query condition includes at least one of: the data using end uses the destination information of the data and the time information of the data.
9. A data processing method is applied to a user side and comprises the following steps:
acquiring original data sent by a data generation end, wherein the original data is determined by user personal information of a user end and a first digital signature of the data generation end;
generating a user deposit certificate according to the attribute characteristics of the original data and the second data signature of the user side;
sending the user certificate to a block chain platform, wherein the user certificate is a certificate for representing the authenticity of the original data;
receiving a verification instruction sent by the blockchain platform, wherein the verification instruction comprises the first intelligent contract, and the first intelligent contract is determined by a query task in a data query request provided by a data using end and a task query condition of the query task;
marking the task query condition according to the query task in the first intelligent contract through an authorization identifier to obtain a second intelligent contract;
sending the second intelligent contract to the blockchain platform.
10. The method according to claim 9, wherein the obtaining of the original data sent by the data generating end comprises:
sending a data acquisition request to the data generation end, wherein the data acquisition request is used for requesting the data generation end to send original data corresponding to the user end;
and receiving the original data sent by the data generating end.
11. The method according to claim 9, wherein the generating a user certificate according to the attribute characteristics of the original data and the second data signature of the user side comprises:
encrypting the attribute characteristics of the original data through a first preset encryption algorithm to obtain a first encryption result;
and marking the first encryption result through the second data signature to obtain the user certificate.
12. The method of claim 9, wherein the first intelligent contract further comprises an identification of the data consumer;
before the obtaining of the second intelligent contract, the method further comprises:
based on the identity identifier of the data using end, performing N-time blank transmission with the data using end, and acquiring an authorization identifier corresponding to the query task.
13. The method of claim 9, further comprising:
receiving a first input of a user;
responding to the first input, sending a tracking request to the blockchain platform, wherein the tracking request comprises an identity of the user terminal, and the tracking request is used for requesting the blockchain platform to send access data corresponding to a target non-homogeneous certificate, and the target non-homogeneous certificate corresponds to the user terminal;
receiving access data sent by the blockchain platform, wherein the access data comprises at least one of the following: accessing an identity of a data using end of the target non-homogenization evidence, a transaction record of the target non-homogenization evidence and the data using end, a first flow record of the target non-homogenization evidence on a blockchain platform, and a second flow record of the target non-homogenization evidence on the data using end and the blockchain platform.
14. A data processing method is applied to a data generation end and comprises the following steps:
acquiring user personal information of a user side;
encrypting the personal information of the user through a second preset encryption algorithm to obtain a second encryption result;
generating original data of the personal information of the user according to the second encryption result and the first digital signature of the data generation end;
and sending the original data to the user side under the condition of receiving a data acquisition request sent by the user side.
15. A data processing method is applied to a data using end and comprises the following steps:
sending a data query request to a block chain platform, wherein the data query request comprises a query task and a task query condition of the query task, and the data query request is used for requesting the block chain platform to send a query result of the query task;
receiving a non-homogenization evidence sent by the block chain, wherein the non-homogenization evidence comprises an inquiry result of an inquiry task and a user evidence, the inquiry result is a result of whether a task inquiry condition is met, the user evidence is provided by the user side, the user evidence carries a first data signature of a data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user evidence is a certificate for representing the authenticity of the original data.
16. The method of claim 15, wherein the task query condition comprises at least one of: the data using end uses the destination information of the data and the time information of the data.
17. The method of claim 15, further comprising:
receiving a second input of the user;
responding to the second data, and acquiring a query task corresponding to the second input and a task query condition of the query task;
converting a first demand function corresponding to the query task and a second demand function corresponding to the task query condition through a preset conversion algorithm to obtain the confusion circuit;
sending a deployment request to the blockchain platform, wherein the deployment request comprises the garbled circuit, and the deployment request is used for requesting the blockchain to write the garbled circuit into an initial intelligent contract corresponding to the data using end.
18. A data processing apparatus for use in a blockchain platform, the apparatus comprising:
the receiving module is used for receiving a data query request sent by a data using end, wherein the data query request comprises a query task and task query conditions of the query task;
the sending module is used for sending a verification instruction to a user side related to the query task according to the data query request, wherein the verification instruction comprises a first intelligent contract, the first intelligent contract is determined by the query task and the task query condition, and the verification instruction is used for indicating the user side to provide an authorization identifier corresponding to the task query condition based on the first intelligent contract;
the sending module is further configured to send a non-homogenization evidence to the data using end according to an authorization identifier in a second intelligent contract when the second intelligent contract fed back by the user end is obtained;
the non-homogenization evidence comprises an inquiry result of an inquiry task and a user evidence, wherein the inquiry result is a result of whether a task inquiry condition is met, the user evidence is provided by the user side, the user evidence carries a first data signature of a data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user evidence is a certificate for representing the authenticity of the original data.
19. A data processing device applied to a user side comprises:
the acquisition module is used for acquiring original data sent by a data generation end, wherein the original data is determined by user personal information of the user end and a first digital signature of the data generation end;
the generating module is used for generating a user certificate according to the attribute characteristics of the original data and the second data signature of the user side;
the sending module is used for sending the user deposit certificate to a block chain platform, wherein the user deposit certificate is a certificate for representing the authenticity of the original data;
the receiving module is used for receiving a checking instruction sent by the block chain platform, wherein the checking instruction comprises the first intelligent contract, and the first intelligent contract is determined by a query task in a data query request provided by a data using end and a task query condition of the query task;
the marking module is used for marking the task query condition through an authorization identifier according to the query task in the first intelligent contract to obtain a second intelligent contract;
the sending module is further configured to send the second intelligent contract to the blockchain platform.
20. A data processing device is applied to a data generation end, and the device comprises:
the acquisition module is used for acquiring the personal information of the user at the user side;
the encryption module is used for encrypting the personal information of the user through a second preset encryption algorithm to obtain a second encryption result;
the generating module is used for generating original data of the personal information of the user according to the second encryption result and the first digital signature of the data generating end;
and the sending module is used for sending the original data to the user side under the condition of receiving the data acquisition request sent by the user side.
21. A data processing device applied to a data using end comprises:
the system comprises a sending module, a block chain platform and a query module, wherein the sending module is used for sending a data query request to the block chain platform, the data query request comprises a query task and a task query condition of the query task, and the data query request is used for requesting the block chain platform to send a query result of the query task;
the receiving module is used for receiving the non-homogenization evidence sent by the block chain, the non-homogenization evidence comprises an inquiry result of the inquiry task and a user evidence, the inquiry result is whether the inquiry condition is met, the user evidence is provided by the user side, the user evidence carries a first data signature of the data generation end and a second data signature of the user side, the data generation end is a platform for generating original data of user personal information of the user side, and the user evidence is a certificate for representing the authenticity of the original data.
22. A computer device, the device comprising: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements a data processing method as claimed in any one of claims 1 to 8, implements a data processing method as claimed in any one of claims 9 to 13, implements a data processing method as claimed in claim 14, or implements a data processing method as claimed in any one of claims 15 to 17.
23. A storage medium having stored thereon computer program instructions which, when executed by a processor, implement a data processing method as claimed in any one of claims 1 to 8, implement a data processing method as claimed in any one of claims 9 to 13, implement a data processing method as claimed in claim 14, or implement a data processing method as claimed in any one of claims 15 to 17.
CN202211648501.1A 2022-12-21 2022-12-21 Data processing method, device, equipment and storage medium Pending CN115879155A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211648501.1A CN115879155A (en) 2022-12-21 2022-12-21 Data processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211648501.1A CN115879155A (en) 2022-12-21 2022-12-21 Data processing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115879155A true CN115879155A (en) 2023-03-31

Family

ID=85754174

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211648501.1A Pending CN115879155A (en) 2022-12-21 2022-12-21 Data processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115879155A (en)

Similar Documents

Publication Publication Date Title
US11496312B2 (en) Collecting surveys with secure identities via a blockchain
US20210351931A1 (en) System and method for securely processing an electronic identity
CN110046996B (en) Data processing method and device
CN111970129B (en) Data processing method and device based on block chain and readable storage medium
US10706416B2 (en) System and method of generating and validating encapsulated cryptographic tokens based on multiple digital signatures
RU2144269C1 (en) Method of secret use of digital signatures in commercial cryptographic system
US10410213B2 (en) Encapsulated security tokens for electronic transactions
CN110874464A (en) Method and equipment for managing user identity authentication data
CN110633963B (en) Electronic bill processing method, electronic bill processing device, computer readable storage medium and computer readable storage device
JP2006246543A (en) Cryptographic system and method with key escrow function
CN101206696A (en) Apparatus, method and system for protecting personal information
US11436597B1 (en) Biometrics-based e-signatures for pre-authorization and acceptance transfer
CN110719176A (en) Logistics privacy protection method and system based on block chain and readable storage medium
US11250423B2 (en) Encapsulated security tokens for electronic transactions
CN109118377A (en) A kind of processing method, system and the electronic equipment of the Claims Resolution event based on block chain
CN111160908A (en) Supply chain transaction privacy protection system and method based on block chain and related equipment
CN115203749A (en) Data transaction method and system based on block chain
CN110992034A (en) Supply chain transaction privacy protection system and method based on block chain and related equipment
CN111079190A (en) Block chain supply chain transaction hiding dynamic supervision system and method
CN111931230A (en) Data authorization method and device, storage medium and electronic device
US11496316B1 (en) System and method for identity verification for online dating
CN115879155A (en) Data processing method, device, equipment and storage medium
US20230267426A1 (en) Payment system, coin register, participant unit, transaction register, monitoring register and method for payment with electronic coin data sets
US20230066582A1 (en) Threshold multi-party computation with must-have member
Ying et al. Blockchaindistributedidentitymanagement model for cross-border data privacy protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination