CN116305185A - Data processing method, system and computer readable storage medium - Google Patents

Data processing method, system and computer readable storage medium Download PDF

Info

Publication number
CN116305185A
CN116305185A CN202310028667.1A CN202310028667A CN116305185A CN 116305185 A CN116305185 A CN 116305185A CN 202310028667 A CN202310028667 A CN 202310028667A CN 116305185 A CN116305185 A CN 116305185A
Authority
CN
China
Prior art keywords
data
user
platform
blockchain
data processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310028667.1A
Other languages
Chinese (zh)
Inventor
景梦园
姬长伟
邓小珊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Merchants Bank Co Ltd
Original Assignee
China Merchants Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Merchants Bank Co Ltd filed Critical China Merchants Bank Co Ltd
Priority to CN202310028667.1A priority Critical patent/CN116305185A/en
Publication of CN116305185A publication Critical patent/CN116305185A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a data processing method, a system and a computer readable storage medium, wherein the method comprises the following steps: responding to the data operation instruction, and carrying out corresponding data processing by combining an application service platform and a blockchain platform, wherein the data processing comprises the following steps: data storage, data validation, authorization, and transfer, etc. The scheme of the embodiment can realize the trusted storage of the data, and ensure that all parties are willing to share, can share and safely and compliance share the data. The electronic data block chain authorization and circulation scheme can be adopted, and the block chain distributed consensus and chain type storage technology is used, so that the data storage certificate and the process record are safer and more reliable; the blockchain intelligent contract technology is used for realizing the replacement of the traditional text contracts, and other flows can be better embedded; using a blockchain identity authentication technology, associating public and private key pairs with entity identities, and solving the most core ownership problem in the data streaming process; and the sensitive data privacy security is protected to a certain extent by using the HASH fingerprint, symmetric encryption and other technologies.

Description

Data processing method, system and computer readable storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data processing method, a data processing system, and a computer readable storage medium.
Background
In the big data age, data leakage is frequent, and the situation of non-compliance, unreasonable and illegal use number is difficult to put an end. Moreover, the data collaboration activity between organizations, individuals, and organizations is reduced. Data plays an important role in economy as a fifth major production element. How to make all parties willing to share and be able to share and safely and compliance share data is a problem to be solved.
Aiming at the key processes of data storage, data validation, data authorization and data acquisition, the current scheme and main defects thereof comprise:
and (3) data storage: the database is used for centralizing single-point storage, so that the data is difficult to be ensured not to be tampered; and the two single-point storage cannot be recovered and proven after being lost.
Data validation: generally, data is generated by natural human behavior, and the corresponding data has an information body. Most of the current institutions and systems do not explicitly record the affiliated party when storing data, so that the follow-up fetch and use of the data are confusing.
Data authorization: in most scenarios, the data authorization process is done by paper or electronic protocol documents. The user indicates authorization by signing the agreement. However, in this case the authorization and the actual subsequent usage are separated and cannot be effectively managed. Moreover, if the electronic protocol is adopted, the signing cost by using the CA is high, and the protocol file is generally stored in an organization storage system, so that the user benefit is difficult to guarantee.
Data are taken: data transmission and use if transmitted in AP I or stored in an open database, it is difficult to trace back who is, when, what data is used from the information body or the supervisor. Eventually, the user data leakage cannot trace the source responsibility.
Disclosure of Invention
The invention mainly aims to provide a data processing method, a system and a computer readable storage medium, which aim at improving data security, realizing data trusted storage and enabling all parties to share, be capable of sharing and safely and compliance to share data.
To achieve the above object, the present invention provides a data processing method, the method comprising the steps of:
responding to a data operation instruction;
according to the data operation instruction, carrying out corresponding data processing by combining an application service platform and a blockchain platform, wherein the data processing comprises the following steps: one or more of data storage, data validation, authorization, and circulation.
Optionally, the data operation instruction includes a user self-right operation instruction: the step of carrying out corresponding data processing by combining an application service platform and a blockchain platform according to the data operation instruction comprises the following steps:
according to a data operation instruction of a user, receiving data to be authenticated uploaded by the user through an application operation platform, and operating the data to be authenticated to generate a unique fingerprint of the data;
After the user confirms the fingerprint, the type and description of the supplemental data uploaded by the user are received through the application operation platform, and a right confirmation statement based on the data fingerprint is initiated by using the digital identity private key of the user, and the statement is synchronized to the blockchain system by the application operation platform to serve as the content with public credibility and verifiability.
Optionally, the data operation instruction includes an other party right confirmation operation instruction: the step of carrying out corresponding data processing by combining an application service platform and a blockchain platform according to the data operation instruction comprises the following steps:
receiving an acknowledgement request uploaded by a user through an application service platform according to a data operation instruction of the user, pushing a data list to the user according to the acknowledgement request, and selecting data by the user;
after the user selects data, determining to-be-determined weight data through the application service platform, and operating the to-be-determined weight data to generate a unique fingerprint of the data;
and initiating a right statement based on the data fingerprint through the application service platform, and synchronizing the statement to the blockchain system as publicly trusted and verifiable content.
Optionally, the step of performing corresponding data processing by combining the application service platform and the blockchain platform according to the data operation instruction further includes:
And receiving a data retrieval instruction initiated by a user or a third party platform of the data through the blockchain platform, and inquiring the data right-determining statement which is finished in the uplink in the blockchain system according to the retrieval instruction, and converging the data right-determining statement into a data directory, wherein the retrieval mode supports retrieval through data fingerprints, types, descriptions, ownership parties and statement parties.
Optionally, the step of performing corresponding data processing by combining the application service platform and the blockchain platform according to the data operation instruction further includes:
receiving a use number application initiated by a use number party through an application service platform, and acquiring information and use number requirements provided by a user party according to a data catalog according to the use number application;
after a user confirms the application signature by using a secret key of the user, initiating a use number application to a blockchain platform through an application service platform, initiating the application through a use number approval workflow intelligent contract interface of the blockchain platform, and acquiring a unique order I D provided by the blockchain platform to each use number application form for use by a data consumption transfer certificate;
and storing the user application data in each node through a block chain consensus synchronization mechanism by using a block chain platform, and obtaining application information from a block chain by a corresponding data ownership party and approving the application information in a block chain intelligent contract.
Optionally, the data operation instruction includes a data flow operation instruction: the step of carrying out corresponding data processing by combining an application service platform and a blockchain platform according to the data operation instruction comprises the following steps:
receiving an access consumption action initiated by an owner after receiving an access request initiated by a user through a block chain platform, and checking the validity of the access;
after verification is passed, executing the action of deducting quota in the corresponding order through the blockchain platform;
and receiving an access confirmation action initiated by the user after the owner transmits the data to the user through the blockchain platform, and executing an actual quota deduction action according to the access confirmation action.
Optionally, the step of performing corresponding data processing by combining the application service platform and the blockchain platform according to the data operation instruction further includes:
and tracing the related behavior operation according to the user by using the blockchain platform according to the digital identity of the user as a keyword.
Optionally, the step of tracing the related behavior operation according to the user by using the blockchain platform according to the digital identity of the user as a keyword includes:
the block chain platform is used for tracing the life cycle flow from the right confirmation to the use according to single data by taking the data fingerprint as a key word; or alternatively
The whole flow of the one-time use process is traced back by the blockchain platform according to the order I D as a key word.
Optionally, the step of performing corresponding data processing by combining the application service platform and the blockchain platform according to the data operation instruction further includes:
storing the data original text or the encrypted ciphertext in a block chain system according to the data operation instruction; or alternatively
After the fingerprint is calculated by the encryption algorithm, the fingerprint is stored in the blockchain for verification.
The embodiment of the invention also provides a data processing system, which comprises: the data processing system comprises a memory, a processor and a data processing program stored in the memory and capable of running on the processor, wherein the data processing program realizes the data processing method when being executed by the processor.
The embodiment of the invention also provides a computer readable storage medium, wherein a data processing program is stored on the computer readable storage medium, and the data processing program realizes the data processing method when being executed by a processor.
The data processing method, the system and the computer readable storage medium provided by the embodiment of the invention respond to the data operation instruction; according to the data operation instruction, carrying out corresponding data processing by combining an application service platform and a blockchain platform, wherein the data processing comprises the following steps: one or more of data storage, data validation, authorization, and circulation. The scheme of the embodiment can realize the trusted storage of the data, and ensure that all parties are willing to share, can share and safely and compliance share the data. The electronic data block chain authorization and circulation scheme can be adopted, and the block chain distributed consensus and chain type storage technology is used, so that the data storage certificate and the process record are safer and more reliable; the blockchain intelligent contract technology is used for realizing the replacement of the traditional text contracts, and other flows can be better embedded; using a blockchain identity authentication technology, associating public and private key pairs with entity identities, and solving the most core ownership problem in the data streaming process; and the sensitive data privacy security is protected to a certain extent by using the HASH fingerprint, symmetric encryption and other technologies.
Drawings
FIG. 1 is a schematic diagram of functional modules of a terminal device to which a data processing apparatus of the present invention belongs;
FIG. 2 is a schematic diagram of a data processing system architecture according to an embodiment of the present invention;
FIG. 3 is a flowchart of a first embodiment of a data processing method according to the present invention;
FIG. 4 is a diagram of a lifecycle of data elements according to an embodiment of the present invention;
FIG. 5 is a diagram of six types of primary rights relationships in a lifecycle of data elements according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a digital identity acquisition implementation according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of an implementation of self-determination according to an embodiment of the present invention;
fig. 8 is a schematic diagram of the implementation of the right of the other party according to the embodiment of the present invention;
FIG. 9 is a schematic diagram of a data directory retrieval implementation in confirmation of usage rights according to an embodiment of the present invention;
FIG. 10 is a schematic diagram of a usage right application implementation in the confirmation of usage rights according to an embodiment of the present invention;
FIG. 11 is a schematic diagram of a usage right approval implementation in the confirmation of the usage right according to an embodiment of the present invention;
fig. 12 is a schematic diagram of a data flow usage implementation according to an embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The main solutions of the embodiments of the present invention are: operating the instruction by responding to the data; according to the data operation instruction, carrying out corresponding data processing by combining an application service platform and a blockchain platform, wherein the data processing comprises the following steps: one or more of data validation, authorization, and circulation. The scheme of the embodiment can realize the trusted storage of the data, and ensure that all parties are willing to share, can share and safely and compliance share the data. The electronic data block chain authorization and circulation scheme can be adopted, and the block chain distributed consensus and chain type storage technology is used, so that the data storage certificate and the process record are safer and more reliable; the blockchain intelligent contract technology is used for realizing the replacement of the traditional text contracts, and other flows can be better embedded; using a blockchain identity authentication technology, associating public and private key pairs with entity identities, and solving the most core ownership problem in the data streaming process; and the sensitive data privacy security is protected to a certain extent by using the HASH fingerprint, symmetric encryption and other technologies.
The embodiment of the invention considers that: at present, the problem of how to enable all parties to share, be able to share and safely and compliance shared data cannot be solved. The current scheme and main defects thereof comprise the following key processes of data storage, data validation, data authorization and data acquisition:
And (3) data storage: the database is used for centralizing single-point storage, so that the data is difficult to be ensured not to be tampered; and the two single-point storage cannot be recovered and proven after being lost.
Data validation: generally, data is generated by natural human behavior, and the corresponding data has an information body. Most of the current institutions and systems do not explicitly record the affiliated party when storing data, so that the follow-up fetch and use of the data are confusing.
Data authorization: in most scenarios, the data authorization process is done by paper or electronic protocol documents. The user indicates authorization by signing the agreement. However, in this case the authorization and the actual subsequent usage are separated and cannot be effectively managed. Moreover, if the electronic protocol is adopted, the signing cost by using the CA is high, and the protocol file is generally stored in an organization storage system, so that the user benefit is difficult to guarantee.
Data are taken: data transmission and use if transmitted in AP I or stored in an open database, it is difficult to trace back who is, when, what data is used from the information body or the supervisor. Eventually, the user data leakage cannot trace the source responsibility.
Based on the above, the embodiment of the invention provides a solution, which can realize the trusted storage of data and ensure that all parties are willing to share, can share and safely and compliance share the data.
Specifically, referring to fig. 1, fig. 1 is a schematic diagram of functional modules of a terminal device to which a data processing apparatus of the present invention belongs. The data processing means may be a device independent of the terminal device, which may be carried on the terminal device or system in the form of hardware or software. The terminal equipment can be intelligent mobile terminals such as mobile phones and tablet computers, and can also be network equipment such as servers.
In this embodiment, the terminal device to which the data processing apparatus belongs at least includes an output module 110, a processor 120, a memory 130, and a communication module 140.
The memory 130 stores an operating system and a data processing program; the output module 110 may be a display screen, a speaker, etc. The communication module 140 may include a WI F I module, a mobile communication module, a bluetooth module, and the like, and communicates with an external device or a server through the communication module 140.
Wherein, as an embodiment, the following steps are implemented when the data processing program in the memory 130 is executed by the processor:
responding to a data operation instruction;
according to the data operation instruction, carrying out corresponding data processing by combining an application service platform and a blockchain platform, wherein the data processing comprises the following steps: one or more of data storage, data validation, authorization, and circulation.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
according to a data operation instruction of a user, receiving data to be authenticated uploaded by the user through an application operation platform, and operating the data to be authenticated to generate a unique fingerprint of the data;
after the user confirms the fingerprint, the type and description of the supplemental data uploaded by the user are received through the application operation platform, and a right confirmation statement based on the data fingerprint is initiated by using the digital identity private key of the user, and the statement is synchronized to the blockchain system by the application operation platform to serve as the content with public credibility and verifiability.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
receiving an acknowledgement request uploaded by a user through an application service platform according to a data operation instruction of the user, pushing a data list to the user according to the acknowledgement request, and selecting data by the user;
after the user selects data, determining to-be-determined weight data through the application service platform, and operating the to-be-determined weight data to generate a unique fingerprint of the data;
and initiating a right statement based on the data fingerprint through the application service platform, and synchronizing the statement to the blockchain system as publicly trusted and verifiable content.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
and receiving a data retrieval instruction initiated by a user or a third party platform of the data through the blockchain platform, and inquiring the data right-determining statement which is finished in the uplink in the blockchain system according to the retrieval instruction, and converging the data right-determining statement into a data directory, wherein the retrieval mode supports retrieval through data fingerprints, types, descriptions, ownership parties and statement parties.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
receiving a use number application initiated by a use number party through an application service platform, and acquiring information and use number requirements provided by a user party according to a data catalog according to the use number application;
after a user confirms the application signature by using a secret key of the user, initiating a use number application to a blockchain platform through an application service platform, initiating the application through a use number approval workflow intelligent contract interface of the blockchain platform, and acquiring a unique order I D provided by the blockchain platform to each use number application form for use by a data consumption transfer certificate;
and storing the user application data in each node through a block chain consensus synchronization mechanism by using a block chain platform, and obtaining application information from a block chain by a corresponding data ownership party and approving the application information in a block chain intelligent contract.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
receiving an access consumption action initiated by an owner after receiving an access request initiated by a user through a block chain platform, and checking the validity of the access;
after verification is passed, executing the action of deducting quota in the corresponding order through the blockchain platform;
and receiving an access confirmation action initiated by the user after the owner transmits the data to the user through the blockchain platform, and executing an actual quota deduction action according to the access confirmation action.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
and tracing the related behavior operation according to the user by using the blockchain platform according to the digital identity of the user as a keyword.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
the block chain platform is used for tracing the life cycle flow from the right confirmation to the use according to single data by taking the data fingerprint as a key word; or alternatively
The whole flow of the one-time use process is traced back by the blockchain platform according to the order I D as a key word.
Further, the data processing program in the memory 130 when executed by the processor also implements the steps of:
storing the data original text or the encrypted ciphertext in a block chain system according to the data operation instruction; or alternatively
After the fingerprint is calculated by the encryption algorithm, the fingerprint is stored in the blockchain for verification.
According to the scheme, the embodiment responds to the data operation instruction; according to the data operation instruction, carrying out corresponding data processing by combining an application service platform and a blockchain platform, wherein the data processing comprises the following steps: one or more of data validation, authorization, and circulation. The scheme of the embodiment can realize the trusted storage of the data, and ensure that all parties are willing to share, can share and safely and compliance share the data. The electronic data block chain authorization and circulation scheme can be adopted, and the block chain distributed consensus and chain type storage technology is used, so that the data storage certificate and the process record are safer and more reliable; the blockchain intelligent contract technology is used for realizing the replacement of the traditional text contracts, and other flows can be better embedded; using a blockchain identity authentication technology, associating public and private key pairs with entity identities, and solving the most core ownership problem in the data streaming process; and the sensitive data privacy security is protected to a certain extent by using the HASH fingerprint, symmetric encryption and other technologies.
Referring to fig. 2, fig. 2 is a schematic diagram of a system architecture related to a data processing method according to the present invention.
As shown in fig. 2, the system architecture includes: an application layer, a service layer, a blockchain base layer, wherein:
the application layer can provide an application platform operated by a user, including various APP, web pages and the like;
the service layer can provide a user application service platform, and the related operations of storage, validation, authorization and circulation of the electronic data are realized through interaction of the application service platform and the blockchain platform. The service layer may include D services, data directory services, flow services, data storage services, and the like.
The blockchain base layer may provide a user blockchain platform and configure corresponding identity management contracts, data registration contracts, workflow contracts, certification contracts, and the like.
The method embodiment of the invention is proposed based on the above-mentioned terminal equipment architecture but not limited to the above-mentioned architecture.
Referring to fig. 3, fig. 3 is a flowchart illustrating a first embodiment of a data processing method according to the present invention.
As shown in fig. 3, a data processing method according to an embodiment of the present invention includes the following steps:
step S101, responding to a data operation instruction;
the data operation instruction may include a data storage instruction, a data authorization instruction, a data circulation instruction, and the like.
Step S102, according to the data operation instruction, performing corresponding data processing by combining an application service platform and a blockchain platform, where the data processing includes: one or more of data storage, data validation, authorization, and circulation.
The scheme of the embodiment can realize the trusted storage of the data, and ensure that all parties are willing to share, can share and safely and compliance share the data. The electronic data block chain authorization and circulation scheme can be adopted, and the block chain distributed consensus and chain type storage technology is used, so that the data storage certificate and the process record are safer and more reliable; the blockchain intelligent contract technology is used for realizing the replacement of the traditional text contracts, and other flows can be better embedded; using a blockchain identity authentication technology, associating public and private key pairs with entity identities, and solving the most core ownership problem in the data streaming process; and the sensitive data privacy security is protected to a certain extent by using the HASH fingerprint, symmetric encryption and other technologies.
In general, embodiments of the present invention may solve the following problems:
(1) Solving the problem of safe and credible data storage
2 alternative technical schemes are provided: 1) For non-sensitive data, the original text or encrypted ciphertext can be directly stored in a blockchain system, and the security and the credibility of the data are directly ensured by the characteristics of distributed blockchain and difficult tampering; 2) For sensitive data, the fingerprint can be stored in the blockchain after the fingerprint of the data original text is calculated through algorithms such as HASH, a holder of subsequent data can compare the data original text after the fingerprint is calculated again with the information on the chain, and if the data original text is the same, the consistency and the integrity of the data can be ensured, and the data is proved to be untampered.
(2) Solving the problem of data unauthorized
Technically, the precondition for using blockchain is that there is a public-private key pair for signing and authentication when sending transactions to the blockhouses. Thus, the scheme first enables each user to associate his or her real world identity with one or more public and private key pairs by means of the licensing of the federation chain, whereby operation of the key on the blockchain can represent the behaviour of the person/institution. In addition, a set of blockchain keys may be mapped in different organizations. The method realizes a set of on-chain identities and is universal in different applications and systems.
After the identity is provided, the relative ownership relationship can be clearly identified when the data goes to the blockchain (whether plaintext, ciphertext or fingerprint), the data attribution party is determined, and all subsequent rights are ensured. Specifically, the data rights include ownership (information body), escrow right (storage party), and the like. Generally, the sending signer of a blockchain transaction is the data store, and in addition, the body of information may be specified using fields in the transaction content.
(3) Solving the problem of data authorization
The blockchain intelligent contract is used for registering and confirming the data authorization relationship, so that the public transparency auditable of the authorization process can be realized. In addition, the problem of separating the authorization from the number of users can be solved.
Firstly, the data demand side needs to submit application information of the number of use and information body informed consent information to the corresponding intelligent contract of the blockchain system. The data store is also approved on the chain. Only after approval is passed can the corresponding data be viewed or downloaded.
(4) Solving the problem of no record in data stream transfer
The use number is simultaneously required to be recorded and submitted to trace back the data stream information. However, it is difficult to ensure that the user can perform this action autonomously and voluntarily in the conventional manner. By means of a block chain, the method realizes 'first registration and then use count' in use count, thereby ensuring that marks are left on each use count.
(5) Solving the problem of traceability of data life cycle
By indexing or fingerprinting of the data, trace back can be initiated for a single stroke of data. After extracting all the information associated with the data on the blockchain, the full lifecycle process of the data from uploading, validation, authorization to use can be demonstrated. Each link has a blockchain transaction signature traced back to an operator, a time stamp traced back to operation time, and a data body traced back to specific information content of the operation, so that a complete link closed loop is formed. Thereby effectively promoting legal compliance of data and orderly using the data.
Specifically, as one implementation manner, the data operation instruction includes a user self-confirming operation instruction: the step of performing corresponding data processing by combining an application service platform and a blockchain platform according to the data operation instruction may include:
according to a data operation instruction of a user, receiving data to be authenticated uploaded by the user through an application operation platform, and operating the data to be authenticated to generate a unique fingerprint of the data;
after the user confirms the fingerprint, the type and description of the supplemental data uploaded by the user are received through the application operation platform, and a right confirmation statement based on the data fingerprint is initiated by using the digital identity private key of the user, and the statement is synchronized to the blockchain system by the application operation platform to serve as the content with public credibility and verifiability.
Wherein, as an implementation manner, the data operation instruction includes an other party right confirmation operation instruction: the step of performing corresponding data processing by combining an application service platform and a blockchain platform according to the data operation instruction may include:
receiving an acknowledgement request uploaded by a user through an application service platform according to a data operation instruction of the user, pushing a data list to the user according to the acknowledgement request, and selecting data by the user;
After the user selects data, determining to-be-determined weight data through the application service platform, and operating the to-be-determined weight data to generate a unique fingerprint of the data;
and initiating a right statement based on the data fingerprint through the application service platform, and synchronizing the statement to the blockchain system as publicly trusted and verifiable content.
Further, the step of performing corresponding data processing by combining the application service platform and the blockchain platform according to the data operation instruction further includes:
and receiving a data retrieval instruction initiated by a user or a third party platform of the data through the blockchain platform, and inquiring the data right-determining statement which is finished in the uplink in the blockchain system according to the retrieval instruction, and converging the data right-determining statement into a data directory, wherein the retrieval mode supports retrieval through data fingerprints, types, descriptions, ownership parties and statement parties.
Further, the step of performing corresponding data processing by combining the application service platform and the blockchain platform according to the data operation instruction further includes:
receiving a use number application initiated by a use number party through an application service platform, and acquiring information and use number requirements provided by a user party according to a data catalog according to the use number application;
After a user confirms the application signature by using a secret key of the user, initiating a use number application to a blockchain platform through an application service platform, initiating the application through a use number approval workflow intelligent contract interface of the blockchain platform, and acquiring a unique order I D provided by the blockchain platform to each use number application form for use by a data consumption transfer certificate;
and storing the user application data in each node through a block chain consensus synchronization mechanism by using a block chain platform, and obtaining application information from a block chain by a corresponding data ownership party and approving the application information in a block chain intelligent contract.
Further, the data operation instruction includes a data flow operation instruction: the step of carrying out corresponding data processing by combining an application service platform and a blockchain platform according to the data operation instruction comprises the following steps:
receiving an access consumption action initiated by an owner after receiving an access request initiated by a user through a block chain platform, and checking the validity of the access;
after verification is passed, executing the action of deducting quota in the corresponding order through the blockchain platform;
and receiving an access confirmation action initiated by the user after the owner transmits the data to the user through the blockchain platform, and executing an actual quota deduction action according to the access confirmation action.
Further, the step of performing corresponding data processing by combining the application service platform and the blockchain platform according to the data operation instruction further includes:
and tracing the related behavior operation according to the user by using the blockchain platform according to the digital identity of the user as a keyword.
Further, the step of tracing the related behavior operation according to the user by using the blockchain platform according to the digital identity of the user as a keyword comprises the following steps:
the block chain platform is used for tracing the life cycle flow from the right confirmation to the use according to single data by taking the data fingerprint as a key word; or alternatively
The whole flow of the one-time use process is traced back by the blockchain platform according to the order I D as a key word.
Further, the step of performing corresponding data processing by combining the application service platform and the blockchain platform according to the data operation instruction further includes:
storing the data original text or the encrypted ciphertext in a block chain system according to the data operation instruction; or alternatively
After the fingerprint is calculated by the encryption algorithm, the fingerprint is stored in the blockchain for verification.
According to the scheme, the embodiment responds to the data operation instruction; according to the data operation instruction, carrying out corresponding data processing by combining an application service platform and a blockchain platform, wherein the data processing comprises the following steps: one or more of data validation, authorization, and circulation. The scheme of the embodiment can realize the trusted storage of the data, and ensure that all parties are willing to share, can share and safely and compliance share the data. The electronic data block chain authorization and circulation scheme can be adopted, and the block chain distributed consensus and chain type storage technology is used, so that the data storage certificate and the process record are safer and more reliable; the blockchain intelligent contract technology is used for realizing the replacement of the traditional text contracts, and other flows can be better embedded; using a blockchain identity authentication technology, associating public and private key pairs with entity identities, and solving the most core ownership problem in the data streaming process; and the sensitive data privacy security is protected to a certain extent by using the HASH fingerprint, symmetric encryption and other technologies.
The technical scheme of the invention is explained in detail as follows:
first, the relevant basic background is introduced
According to industry specifications, the lifecycle of the data elements is shown in fig. 4, and includes data acquisition, data transmission, data storage, data use, data deletion, and data destruction.
Of the five major production elements, the nature of the data element is most specific, being arbitrarily replicable, non-exclusive, heterogeneous. These features allow for very convenient circulation and use of data elements from a good perspective; on the other hand, however, the validation of data elements also presents a significant challenge.
One of the basic consensus points is that data elements are derived from various social activity behaviors of human beings and never generated by the air. The whole circulation process after the generation is also necessarily the participation of individuals or institutions. From this lifecycle, the rights are naturally occurring, then it should be feasible to determine the rights. In addition, in order to enable the circulation cooperation of the data elements to be orderly and legal compliance, the right is also necessarily required. If the data is compared to a property, then the right is to install a door for the property. With this door, it is clear that: who has a door key, who is allowed to enter, who can regulate monitoring, who is theft robber, etc., so that all reasonable and reasonable people who use the property feel comfortable.
In order to authenticate data, it is first necessary to define the various rights involved in the lifecycle of the data elements. Currently, the judicial level discussion is mainly a data property definition problem, and is not reiterated herein. Considering production practice, the present embodiment classifies the main weight types as follows:
ownership (master): typically the principal of the behavior that generates the data, which has the ultimate disposal rights. Typically, ownership of vehicle data by an individual at a taxi taking platform should be attributed to the individual.
Storage weight: is typically the subject of providing reliable preservation of data. The sensitivity, volatility, of the data itself determines that not all institutions have the right to store. Typically, government authorities have access to sky and eye surveillance video data.
Escrow right: typically a principal having administrative rights to the data, the data is handled according to a hosting contract.
Usage rights: typically a principal that has access to view and use the data. An authorized process is typically required before the usage rights are generated. Typically, before a bank loan, the credit investigation data of the customer is provided with inquiry and use rights under the condition of approving the customer.
And (3) supervision right: is a main body with supervision authority for the business related to the data, and performs examination and audit on the data according to supervision requirements. Typically, the relevant financial sector has administrative rights to large funds transactions and suspicious transaction data.
Gain right: some or all enjoy the subject of the value added benefit of the data generated during the transaction, use, etc. Typically, the enterprise information query APP enjoys the right to gain to mine the refined corporate equity penetration data.
The six types of rights relationships and the relationship of the lifecycle of the data elements are generally shown in fig. 5. Wherein the supervision and the income right are special and can relate to various links.
The kind and the function of the rights are clarified, and the adoption of the blockchain technology to construct a related data collaboration system can be considered. Key core technologies such as distributed account book, consensus synchronization, encryption algorithm and intelligent contract of the blockchain can be well matched with collaborative compliance, serial multiparty, information credibility and non-falsification and intelligent compliance requirements in the data element validation and circulation processes.
Therefore, the blockchain is suitable as a base of the data collaboration network, and particularly, the blockchain comprises an admission mechanism and a federation chain of a cryptographic algorithm, so that the reliability can be further improved.
On the basis, an identity system can be constructed by combining a distributed digital identity (Decentra l I zed I dent ity, D I D for short), and compared with a traditional centralized identity model, the identity system has the characteristics of decentralization, autonomous controllability and credibility declaration, and has the advantages of privacy security protection and strong portability. The technology of D I D is combined with the block chain, and a public trust mechanism is introduced to participate in digital identity authentication and management in business, so that the problem of' who I am is) can be effectively proved by individuals and mechanisms in a data collaboration website, and the problem is a basic premise that the authorization can be realized.
Second, for digital identity acquisition, reference may be made to FIG. 6.
After using the D I D technique, an individual user or institution may apply for a digital identity to the identity issuer, the purpose of this step being to prepare for later validation. Typically, the customer of the bank may be the applicant and the bank may be the issuer of the digital identity, typically with a personal process during the issuing process to ensure that the digital identity is not misused. The information of the whole digital identity acquisition process is stored in a blockchain system, and can be traced when disputes occur; the generated D id may disclose elements registered in the blockchain system for use and verification by parties.
Next, for confirmation of ownership, reference may be made to fig. 7 and 8.
Similar to the real identity, where house property rights can be confirmed, electronic data can be validated in the network after the digital identity is present. Ownership of electronic data may be performed actively or passively.
As shown in fig. 7, the implementation principle of the self-right is as follows:
self-validation refers to the initiation of an ownership statement by a user on data held directly by the user.
The data can be text data or a file, and the user fills in and uploads the text data in an operation platform (APP or webpage end) by himself. After filling, the platform operates on the data to generate a unique fingerprint of the data.
Alternatively, the fingerprint may be a data HASH value or a random number that ensures uniqueness.
After confirming the fingerprint, the user can supplement the data type and description and initiate a statement using his own digital identity private key, examples of the statement content being shown in the following table. The declaration is ultimately synchronized by the operating platform to the blockchain system as publicly trusted verifiable content.
Figure BDA0004045737850000151
TABLE 1
As shown in fig. 8, the implementation principle of the right of the other party is as follows:
in other scenarios, the individual or institution does not hold the data directly, but is hosted by a third party, e.g., the order data we produce at the taxi-taking platform, is typically stored at the taxi-taking platform side. At this time, the trusteeship party of the data needs to confirm the data, at this time, the claimant of the confirmation claim is a third party, the ownership party is a user, and the example of the contents of the claim is shown in the following table 2.
The process of the right of the other party can be classified into 2 types: the user applies or the trusteeship party carries out the development by himself. Compared with the self-confirmation right, the right of the other party has the characteristics of the certificate, and the credibility is further improved.
Figure BDA0004045737850000161
TABLE 2
For the above flows and data, the blockchain designs the corresponding flows and data.
Further, for confirmation of the usage rights, reference may be made to fig. 9 to 11.
Prior to data acquisition and use, informed consent of the data ownership party is required. The embodiment designs the following scheme to confirm the use right and ensure the safety compliance of the use and circulation of each piece of data.
1) And (5) searching a data catalog:
as shown in FIG. 9, since the ownership statement is publicly visible and verifiable, a user of the data or a third party platform can query the data validation statement which has completed the uplink in the blockchain system, aggregate the data validation statement into a data directory, and support retrieval by data fingerprints, types, descriptions, ownership parties and claimants to quickly find the data item which is wanted to be used. A typical scenario is that a bank loan may require acquisition of the user's property data, where the user's category data may need to be found and further a use application initiated.
2) Application of right of use
As shown in fig. 10, when the application for use is initiated, referring to the above-mentioned digital identity acquisition procedure, the party also needs to have a digital identity of its own. And preparing a use number application according to the information provided by the data catalogue and the use number requirement, and initiating through a use number approval workflow intelligent contract interface of the blockchain after the application signature is confirmed by using a secret key of the user. Because the same user may initiate multiple applications for the same data of the same owner, the blockchain platform may provide each application with a unique order I D for use as a credential in subsequent data consumption flows.
A typical usage application request is shown in table 3 below.
Figure BDA0004045737850000171
TABLE 3 Table 3
3) Approval of usage rights
As shown in fig. 11, the user application is stored in each node through a blockchain consensus synchronization mechanism. The corresponding electronic data ownership party can obtain the application information from the chain and approve the application information. Specifically, the application form may be obtained by active query, or may be pushed by a three-party service provider. At approval, it may be determined and verified whether the applicant is a legitimate user by the verifiable signature and applicant DI D. On the other hand, the data use times quota and the time limit can be checked according to the service scene. If the audit is passed, the party will get the right to use, and if the audit is not passed, the application can be refused. Only the ownership of the data may perform an agreement or denial operation in the blockchain intelligence contract.
After the above process is completed, the right to use the data is confirmed by the blockchain platform, and the confirmation can be verified by the digital identity of the approver, and has the characteristics of non-falsification and non-repudiation for the applicant and the approver.
For the data stream use, reference may be made to fig. 12.
As previously described, as public information, the data elements of a generic blockchain platform contain only some descriptive overview information of the data, while the electronic data originals themselves may be stored in other federated blockchain or database, ECS, etc. systems. Therefore, the original text acquisition of the data needs to be actively initiated by a plurality of parties. The main flow is shown in fig. 12, which comprises:
Initiating fetch: after the user signs the digital identity of the user, the user initiates a fetch request to the owner. This request may be an on-line or off-line notification. Upon request, an explicit data fingerprint and order I D are required.
And (5) taking and consuming: after receiving the request, the owner initiates the action of access consumption to the blockchain platform, and at this time, the blockchain helps the user to check the validity of the access, including whether the access is approved, the time quota is >0, the time limit is not exceeded, and the like.
Quota pre-buckling: because the data is subscribed on a per-strip basis, the blockchain platform performs a pre-deduction quota action, quota-1, in the corresponding order. It should be noted that this deduction has not been finally confirmed to be performed in order to protect the interests of the consumers at the same time.
Data original text: the owner transmits the data to the consumer in various ways.
And (5) taking and confirming: after the user correctly receives the data, the user initiates a fetch confirmation action to the blockchain platform.
Quota deduction: at this time, the blockchain platform obtains signals of both sides, the fetch is completed, the actual quota times deduction is executed, and the data flow and relationship on the blockchain platform are ensured to be consistent with the actual execution of both sides outside the chain.
In addition, the embodiment of the invention can also realize one-key tracing of the data.
Specifically, on the blockchain platform, all behavior operations of the blockchain platform can be traced according to a user according to the digital identity of the user as a key word (such as dId: abc: 123); the life cycle flow from right confirmation to use can be traced back according to single data by taking the data fingerprint as a key word; the whole flow of the one-time-use process can be traced back according to the order I D as a key word.
According to the scheme, the embodiment responds to the data operation instruction; according to the data operation instruction, carrying out corresponding data processing by combining an application service platform and a blockchain platform, wherein the data processing comprises the following steps: one or more of data validation, authorization, and circulation. The scheme of the embodiment can realize the trusted storage of the data, and ensure that all parties are willing to share, can share and safely and compliance share the data. The electronic data block chain authorization and circulation scheme can be adopted, and the block chain distributed consensus and chain type storage technology is used, so that the data storage certificate and the process record are safer and more reliable; the blockchain intelligent contract technology is used for realizing the replacement of the traditional text contracts, and other flows can be better embedded; using a blockchain identity authentication technology, associating public and private key pairs with entity identities, and solving the most core ownership problem in the data streaming process; and the sensitive data privacy security is protected to a certain extent by using the HASH fingerprint, symmetric encryption and other technologies.
Compared with the prior art, the scheme of the embodiment has the following advantages:
1. data uploading is right: the identity of the transaction sender (as a storage party with data hosting right) and the identity of the information main body (as an information main body with data ownership) are attached during uploading, and a blockchain identity authentication technology is used, so that public and private key pairs are associated with entity identities, and the most core ownership problem in the data streaming process is solved.
2. The application, approval, and registration process for data usage is completed using a blockchain smart contract. Specifically, fine granularity control can be performed according to the application using time range and the application using times range, substitution of the traditional text contract is achieved, and other processes can be better embedded.
3. One-key traceability: all relevant information of each node in the life cycle can be known according to the initiation trace of the data I D, so that the data can be stored in a trusted manner, and all parties are willing to share, can share and safely and compliance to share the data.
4. The data fingerprint mode is supported, the on-chain management and the off-chain storage mode of the sensitive data outside the chain are realized, the data fingerprint mode is more flexible, and the privacy security of the sensitive data is protected to a certain extent.
In addition, an embodiment of the present invention further provides a data processing system, where the data processing system includes: the data processing system comprises a memory, a processor and a data processing program stored in the memory and capable of running on the processor, wherein the data processing program realizes the data processing method when being executed by the processor.
The implementation principle of the data processing of the present invention may refer to the above embodiments, and will not be described herein.
In addition, the embodiment of the invention also provides a computer readable storage medium, wherein the computer readable storage medium stores a data processing program, and the data processing program realizes the data processing method when being executed by a processor.
The implementation principle of the data processing of the present invention may refer to the above embodiments, and will not be described herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as above, comprising instructions for causing a recommendation effect evaluation system (which may be a mobile phone, a computer, a server, a controlled terminal, or a network device, etc.) to perform the method of each embodiment of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (11)

1. A method of data processing, the method comprising the steps of:
Responding to a data operation instruction;
according to the data operation instruction, carrying out corresponding data processing by combining an application service platform and a blockchain platform, wherein the data processing comprises the following steps: one or more of data storage, data validation, authorization, and circulation.
2. The data processing method of claim 1, wherein the data manipulation instruction comprises a user self-confirming manipulation instruction: the step of carrying out corresponding data processing by combining an application service platform and a blockchain platform according to the data operation instruction comprises the following steps:
according to a data operation instruction of a user, receiving data to be authenticated uploaded by the user through an application operation platform, and operating the data to be authenticated to generate a unique fingerprint of the data;
after the user confirms the fingerprint, the type and description of the supplemental data uploaded by the user are received through the application operation platform, and a right confirmation statement based on the data fingerprint is initiated by using the digital identity private key of the user, and the statement is synchronized to the blockchain system by the application operation platform to serve as the content with public credibility and verifiability.
3. The data processing method of claim 1, wherein the data manipulation instruction comprises an other party right manipulation instruction: the step of carrying out corresponding data processing by combining an application service platform and a blockchain platform according to the data operation instruction comprises the following steps:
Receiving an acknowledgement request uploaded by a user through an application service platform according to a data operation instruction of the user, pushing a data list to the user according to the acknowledgement request, and selecting data by the user;
after the user selects data, determining to-be-determined weight data through the application service platform, and operating the to-be-determined weight data to generate a unique fingerprint of the data;
and initiating a right statement based on the data fingerprint through the application service platform, and synchronizing the statement to the blockchain system as publicly trusted and verifiable content.
4. A data processing method according to claim 2 or 3, wherein the step of performing corresponding data processing in combination with an application service platform and a blockchain platform according to the data operation instruction further comprises:
and receiving a data retrieval instruction initiated by a user or a third party platform of the data through the blockchain platform, and inquiring the data right-determining statement which is finished in the uplink in the blockchain system according to the retrieval instruction, and converging the data right-determining statement into a data directory, wherein the retrieval mode supports retrieval through data fingerprints, types, descriptions, ownership parties and statement parties.
5. The method according to claim 4, wherein the step of performing corresponding data processing in conjunction with an application service platform and a blockchain platform according to the data operation instruction further comprises:
Receiving a use number application initiated by a use number party through an application service platform, and acquiring information and use number requirements provided by a user party according to a data catalog according to the use number application;
after a user confirms the application signature by using a secret key of the user, initiating a use number application to a blockchain platform through an application service platform, initiating the application through a use number approval workflow intelligent contract interface of the blockchain platform, and acquiring a unique order ID (identity) provided by the blockchain platform to each use number application form for use by a data consumption transfer certificate;
and storing the user application data in each node through a block chain consensus synchronization mechanism by using a block chain platform, and obtaining application information from a block chain by a corresponding data ownership party and approving the application information in a block chain intelligent contract.
6. The data processing method of claim 1, wherein the data manipulation instruction comprises a data stream manipulation instruction: the step of carrying out corresponding data processing by combining an application service platform and a blockchain platform according to the data operation instruction comprises the following steps:
receiving an access consumption action initiated by an owner after receiving an access request initiated by a user through a block chain platform, and checking the validity of the access;
After verification is passed, executing the action of deducting quota in the corresponding order through the blockchain platform;
and receiving an access confirmation action initiated by the user after the owner transmits the data to the user through the blockchain platform, and executing an actual quota deduction action according to the access confirmation action.
7. The method according to claim 1, wherein the step of performing corresponding data processing in conjunction with an application service platform and a blockchain platform according to the data operation instruction further comprises:
and tracing the related behavior operation according to the user by using the blockchain platform according to the digital identity of the user as a keyword.
8. The data processing method according to claim 7, wherein the step of tracing the related behavior operation by the user according to the digital identity of the user as a key word through the blockchain platform comprises:
the block chain platform is used for tracing the life cycle flow from the right confirmation to the use according to single data by taking the data fingerprint as a key word; or alternatively
And tracing the whole flow of the one-time use number process by using the block chain platform according to the order ID as a key word.
9. The method according to claim 7, wherein the step of performing corresponding data processing in conjunction with an application service platform and a blockchain platform according to the data operation instruction further comprises:
Storing the data original text or the encrypted ciphertext in a block chain system according to the data operation instruction; or alternatively
After the fingerprint is calculated by the encryption algorithm, the fingerprint is stored in the blockchain for verification.
10. A data processing system, the data processing system comprising: memory, a processor and a data processing program stored on the memory and executable on the processor, which data processing program, when executed by the processor, implements the data processing method according to any one of claims 1 to 9.
11. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a data processing program which, when executed by a processor, implements the data processing method according to any one of claims 1 to 9.
CN202310028667.1A 2023-01-09 2023-01-09 Data processing method, system and computer readable storage medium Pending CN116305185A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310028667.1A CN116305185A (en) 2023-01-09 2023-01-09 Data processing method, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310028667.1A CN116305185A (en) 2023-01-09 2023-01-09 Data processing method, system and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN116305185A true CN116305185A (en) 2023-06-23

Family

ID=86829494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310028667.1A Pending CN116305185A (en) 2023-01-09 2023-01-09 Data processing method, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN116305185A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117235804B (en) * 2023-11-15 2024-02-23 浪潮(北京)电子信息产业有限公司 Data set right determining method, system, device and medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117235804B (en) * 2023-11-15 2024-02-23 浪潮(北京)电子信息产业有限公司 Data set right determining method, system, device and medium

Similar Documents

Publication Publication Date Title
US11777726B2 (en) Methods and systems for recovering data using dynamic passwords
US11818265B2 (en) Methods and systems for creating and recovering accounts using dynamic passwords
US11743038B2 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
US11055391B2 (en) System and method for identity management
US11038868B2 (en) System and method for identity management
US10887098B2 (en) System for digital identity authentication and methods of use
US20190149328A1 (en) System for digital identity authentication and methods of use
EP3036675B1 (en) Method for identity management
US20230033192A1 (en) Data management systems and methods
CN112231769A (en) Block chain-based numerical verification method and device, computer equipment and medium
CN116305185A (en) Data processing method, system and computer readable storage medium
KR20230153412A (en) identity delivery system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination