CN117411653A - Information storage method, information storage device, information storage medium and information storage apparatus - Google Patents

Information storage method, information storage device, information storage medium and information storage apparatus Download PDF

Info

Publication number
CN117411653A
CN117411653A CN202210808691.2A CN202210808691A CN117411653A CN 117411653 A CN117411653 A CN 117411653A CN 202210808691 A CN202210808691 A CN 202210808691A CN 117411653 A CN117411653 A CN 117411653A
Authority
CN
China
Prior art keywords
information
blockchain
encryption key
information storage
trusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210808691.2A
Other languages
Chinese (zh)
Inventor
王绪旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
3600 Technology Group Co ltd
Original Assignee
3600 Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 3600 Technology Group Co ltd filed Critical 3600 Technology Group Co ltd
Priority to CN202210808691.2A priority Critical patent/CN117411653A/en
Publication of CN117411653A publication Critical patent/CN117411653A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of blockchain, and discloses an information storage method, equipment, a storage medium and a device, wherein the method comprises the following steps: performing trusted authentication on the hardware equipment to obtain trusted hardware equipment, deploying an identity authentication system in the trusted hardware equipment, managing an encryption key through an identity authentication system, storing the encryption key into a blockchain intelligent contract, encrypting information to be stored through the encryption key in the blockchain intelligent contract to obtain encryption information, and storing the encryption information into a blockchain; the identity authentication system is arranged in the trusted hardware equipment to manage the encryption key, the information to be stored is stored in an encrypted mode through the encryption key, and the encryption key is stored in the blockchain intelligent contract, so that the leakage of private information stored in the blockchain is avoided, and the safety of information storage is improved.

Description

Information storage method, information storage device, information storage medium and information storage apparatus
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to an information storage method, apparatus, storage medium, and device.
Background
At present, privacy protection is a great difficulty of a decentralised blockchain, and the defects that privacy information is easy to reveal exist due to the fact that the privacy protection capability of the blockchain is weak.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present invention and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The invention mainly aims to provide an information storage method, equipment, a storage medium and a device, and aims to solve the technical problem that privacy information is easy to leak due to weak privacy protection capability of a block chain in the prior art.
To achieve the above object, the present invention provides an information storage method including the steps of:
performing trusted authentication on the hardware equipment to obtain trusted hardware equipment;
deploying an identity authentication system in the trusted hardware device;
managing an encryption key through the identity authentication system;
storing the encryption key in a blockchain intelligent contract;
encrypting the information to be stored through an encryption key in the blockchain intelligent contract to obtain encrypted information;
and storing the encrypted information into a blockchain.
Optionally, the step of performing trusted authentication on the hardware device to obtain a trusted hardware device includes:
performing trusted authentication on the hardware equipment based on the blockchain and a preset trusted authentication model;
and selecting the trusted hardware equipment from the hardware equipment according to the trusted authentication result.
Optionally, the step of deploying an identity authentication system in the trusted hardware device includes:
acquiring authentication information;
an identity authentication system is deployed in the trusted hardware device based on authentication information and a blockchain intelligence contract.
Optionally, after the step of storing the encrypted information in the blockchain, the method further includes:
when an information checking request is received, accessing the blockchain intelligent contract to obtain an encryption key;
and acquiring encryption information from the blockchain based on the encryption key.
Optionally, the step of accessing the blockchain smart contract to obtain the encryption key when the information viewing request is received includes:
detecting whether the information viewing request contains authorization information or not when the information viewing request is received;
if yes, accessing the blockchain intelligent contract based on the authorization information to obtain an encryption key.
Optionally, after the step of obtaining the encryption information from the blockchain based on the encryption key, the method further includes:
when a source verification request is received, verifying a request user;
and when the verification is passed, calling the blockchain intelligent contract to acquire the source information corresponding to the encryption information.
Optionally, before the step of encrypting the information to be stored by the encryption key in the blockchain intelligent contract to obtain the encrypted information, the method further includes:
collecting vehicle information through vehicle-mounted equipment, wherein the vehicle-mounted equipment is pre-deployed on a vehicle to be monitored;
and taking the vehicle information as information to be stored.
Optionally, the step of storing the encryption key in the blockchain smart contract includes:
acquiring key information of the encryption key;
verifying the encryption key according to the key information;
after the verification passes, the encryption key is stored in the blockchain smart contract.
Optionally, the step of encrypting the information to be stored by the encryption key in the blockchain intelligent contract to obtain the encrypted information includes:
acquiring an information type of information to be stored, and screening the information to be stored based on the information type to obtain target information;
and encrypting the target information through an encryption key in the blockchain intelligent contract to obtain encryption information.
Optionally, the step of storing the encrypted information in a blockchain includes:
acquiring a trusted memory space address of a block chain;
and storing the encrypted information into a trusted memory space of a blockchain based on the trusted memory space address.
In addition, in order to achieve the above object, the present invention also proposes an information storage device including a memory, a processor, and an information storage program stored on the memory and executable on the processor, the information storage program being configured to implement the information storage method as described above.
In addition, in order to achieve the above object, the present invention also proposes a storage medium having stored thereon an information storage program which, when executed by a processor, implements the information storage method as described above.
In addition, in order to achieve the above object, the present invention also proposes an information storage device including: the information storage device includes: the system comprises a device authentication module, a system deployment module, a key management module, a key storage module, an information encryption module and an information storage module;
the device authentication module is used for performing trusted authentication on the hardware device to obtain a trusted hardware device;
the system deployment module is used for deploying an identity authentication system in the trusted hardware device;
the key management module is used for managing the encryption key through the identity authentication system;
the key storage module is used for storing the encryption key into the blockchain intelligent contract;
the information encryption module is used for encrypting the information to be stored through an encryption key in the blockchain intelligent contract to obtain encrypted information;
the information storage module is used for storing the encrypted information into a blockchain.
Optionally, the device authentication module is further configured to perform trusted authentication on the hardware device based on the blockchain and a preset trusted authentication model;
the device authentication module is further used for selecting the trusted hardware device from the hardware devices according to the trusted authentication result.
Optionally, the system deployment module is further configured to obtain authentication information;
the system deployment module is further configured to deploy an identity authentication system in the trusted hardware device based on authentication information and a blockchain smart contract.
Optionally, the information storage device further includes: an information viewing module;
the information checking module is used for accessing the blockchain intelligent contract to obtain an encryption key when receiving an information checking request;
the information viewing module is further configured to obtain encryption information from the blockchain based on the encryption key.
Optionally, the information checking module is further configured to detect, when receiving an information checking request, whether the information checking request includes authorization information;
and the information checking module is further used for accessing the blockchain intelligent contract based on the authorization information if the information checking module is used for acquiring an encryption key.
Optionally, the information storage device further includes: a source verification module;
the source verification module is used for verifying a request user when receiving a source verification request;
and the source verification module is also used for calling the blockchain intelligent contract to acquire the source information corresponding to the encryption information when verification passes.
Optionally, the information storage device further includes: an information acquisition module;
the information acquisition module is used for acquiring vehicle information through vehicle-mounted equipment which is pre-deployed on a vehicle to be monitored;
the information acquisition module is further used for taking the vehicle information as information to be stored.
Optionally, the key storage module is further configured to obtain key information of the encryption key;
the key storage module is further used for verifying the encryption key according to the key information;
the key storage module is further used for storing the encryption key into the blockchain intelligent contract after the verification is passed.
The invention discloses a method for performing trusted authentication on hardware equipment to obtain the trusted hardware equipment, wherein an identity authentication system is arranged in the trusted hardware equipment, an encryption key is managed through an identity authentication system, the encryption key is stored in a blockchain intelligent contract, information to be stored is encrypted through the encryption key in the blockchain intelligent contract to obtain encryption information, and the encryption information is stored in a blockchain; the identity authentication system is arranged in the trusted hardware equipment to manage the encryption key, the information to be stored is stored in an encrypted mode through the encryption key, and the encryption key is stored in the blockchain intelligent contract, so that the leakage of private information stored in the blockchain is avoided, and the safety of information storage is improved.
Drawings
FIG. 1 is a schematic diagram of the structure of an information storage device of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart of a first embodiment of an information storage method according to the present invention;
FIG. 3 is a flowchart of a second embodiment of an information storage method according to the present invention;
FIG. 4 is a flowchart of a third embodiment of an information storage method according to the present invention;
fig. 5 is a block diagram showing the structure of a first embodiment of the information storage device of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, fig. 1 is a schematic structural diagram of an information storage device of a hardware running environment according to an embodiment of the present invention.
As shown in fig. 1, the information storage device may include: a processor 1001, such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002, a user interface 1003, a network interface 1004, a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display (Display), and the optional user interface 1003 may also include a standard wired interface, a wireless interface, and the wired interface for the user interface 1003 may be a USB interface in the present invention. The network interface 1004 may optionally include a standard wired interface, a Wireless interface (e.g., a Wireless-Fidelity (Wi-Fi) interface). The Memory 1005 may be a high-speed random access Memory (Random Access Memory, RAM) Memory or a stable Memory (NVM), such as a disk Memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the structure shown in fig. 1 is not limiting of the information storage device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 1, an operating system, a network communication module, a user interface module, and an information storage program may be included in a memory 1005, which is considered to be one type of computer storage medium.
In the information storage device shown in fig. 1, the network interface 1004 is mainly used for connecting to a background server, and performing data communication with the background server; the user interface 1003 is mainly used for connecting user equipment; the information storage device calls an information storage program stored in the memory 1005 through the processor 1001 and executes the information storage method provided by the embodiment of the present invention.
Based on the above hardware structure, an embodiment of the information storage method of the present invention is presented.
Referring to fig. 2, fig. 2 is a flowchart illustrating a first embodiment of an information storage method according to the present invention.
In a first embodiment, the information storage method includes the steps of:
step S10: and carrying out trusted authentication on the hardware equipment to obtain the trusted hardware equipment.
It should be understood that the execution body of the method of the present embodiment may be an information storage device having data processing, network communication, and program running functions, for example, a server, or other electronic devices capable of implementing the same or similar functions, which is not limited in this embodiment.
In order to avoid the loss of the encryption key, in this embodiment, an identity authentication system is also deployed in the trusted hardware device to manage the encryption key.
It may be understood that the trusted authentication of the hardware device may be to obtain a physical environment and an operating program of the hardware device, and perform the trusted authentication of the hardware device according to the physical environment and the operating program. The physical environment may be an operating environment of the hardware device, and the operating program may be a program in the hardware device.
Step S20: an identity authentication system is deployed in the trusted hardware device.
It will be appreciated that in order to facilitate management of subsequently stored encryption keys, in this embodiment, the identity authentication system may be deployed in the trusted hardware device based on blockchain intelligence.
Step S30: and managing the encryption key through the identity authentication system.
In a specific implementation, for example, a vehicle factory (or a regulatory unit) deploys an identity authentication system in a trusted hardware device, a user creates a digital identity a through the identity authentication system, and the user creates a digital identity B on a different device for managing the identity a and encryption keys corresponding to the identity a.
Step S40: the encryption key is stored in the blockchain smart contract.
It can be appreciated that in the prior art, the encryption key is usually stored by the user, so that the encryption key is easy to lose and has poor security. Thus, to overcome the above drawbacks, the present embodiment stores encryption keys in a blockchain smart contract.
It should be noted that the encryption key may be preset by the user, which is not limited in this embodiment.
Further, since the information is stored through the blockchain, the information can be supervised and traceable, and therefore, the scheme can be applied to the purchase of a second hand vehicle, and in this embodiment, in order to store the vehicle information on the blockchain, the step S50 further includes:
collecting vehicle information through vehicle-mounted equipment, wherein the vehicle-mounted equipment is pre-deployed on a vehicle to be monitored;
and taking the vehicle information as information to be stored.
The vehicle information may be accelerator pedal information, brake pedal information, speed information, or the like.
In a specific implementation, for example, a vehicle factory (or a supervision unit) deploys an intelligent contract on a blockchain, a user creates an encryption key on a device and stores the encryption key in a trusted storage chain contract, vehicle information (an accelerator pedal, a brake pedal, a speed and the like) acquired by vehicle-mounted devices is encrypted through the encryption key to obtain the encryption information, the encryption information is stored in the blockchain, the user calls the contract to obtain a report of a travel history (a brake use condition, whether collision exists or not and the like) in a second-hand vehicle circulation link, and a vehicle purchasing user verifies a report source (calls a contract function, a data source and the like).
Step S50: and encrypting the information to be stored through an encryption key in the blockchain intelligent contract to obtain the encrypted information.
It should be understood that, in order to avoid information leakage, in this embodiment, before storing information, the information to be stored is further encrypted by an encryption key in the blockchain smart contract, so as to improve the security of information storage.
Step S60: and storing the encrypted information into a blockchain.
It will be appreciated that in order to store information for outgoing calls, in this embodiment, encrypted information is stored in the area chain.
In a first embodiment, trusted authentication is performed on a hardware device to obtain a trusted hardware device, an identity authentication system is deployed in the trusted hardware device, an encryption key is managed through an identity authentication system, the encryption key is stored in a blockchain intelligent contract, information to be stored is encrypted through the encryption key in the blockchain intelligent contract to obtain encryption information, and the encryption information is stored in a blockchain; because the identity authentication system is deployed in the trusted hardware device to manage the encryption key, the information to be stored is stored in an encrypted manner through the encryption key, and the encryption key is stored in the blockchain intelligent contract, the disclosure of private information stored in the blockchain is avoided, and the security of information storage is improved.
Referring to fig. 3, fig. 3 is a flowchart illustrating a second embodiment of the information storage method according to the present invention, and the second embodiment of the information storage method according to the present invention is proposed based on the first embodiment shown in fig. 2.
In a second embodiment, after the step S60, the method further includes:
step S70: and when receiving the information checking request, accessing the blockchain intelligent contract to obtain an encryption key.
It should be appreciated that, in order to facilitate the user to view the encrypted information, in this embodiment, when the information viewing request is received, the encrypted information is also obtained from the blockchain based on the encryption key.
Further, in order to avoid leakage of the encrypted information, the step S40 includes:
when an information viewing request is received, whether the information viewing request contains authorization information is detected.
If yes, accessing the blockchain intelligent contract based on the authorization information to obtain an encryption key.
It will be appreciated that in order to avoid disclosure of encrypted information, the present embodiment also verifies whether the requesting user is authorized before obtaining the encryption key.
It should be noted that the authorization information may be issued to the requesting user by the creator of the encryption key.
It should be appreciated that when authorization information is included in the information viewing request, it is illustrated that the requesting user has been authorized, and thus, the encryption key may be obtained based on the authorization information accessing the blockchain smart contract.
Step S80: and acquiring encryption information from the blockchain based on the encryption key.
It is to be appreciated that retrieving encryption information from the blockchain based on the encryption key can be based on the encryption key looking up the encryption information in the blockchain.
In a second embodiment, it is disclosed that upon receiving an information viewing request, accessing a blockchain smart contract, obtaining an encryption key, obtaining encryption information from the blockchain based on the encryption key; in the embodiment, when the information viewing request is received, the encrypted information is acquired from the blockchain based on the encryption key, so that a user can conveniently view the encrypted information.
Further, in order to facilitate verification of the source of the encrypted information, after the step S80, the method further includes:
when a source verification request is received, verifying a request user;
and when the verification is passed, calling the blockchain intelligent contract to acquire the source information corresponding to the encryption information.
It should be understood that, in order to facilitate verifying the source of the encrypted information, the present embodiment further invokes the blockchain smart contract to obtain the source information corresponding to the encrypted information when receiving the source verification request.
It will be appreciated that in order to avoid leakage of source information, the present embodiment also authenticates the requesting user before invoking the source information.
Referring to fig. 4, fig. 4 is a schematic flow chart of a third embodiment of the information storage method according to the present invention, and the third embodiment of the information storage method according to the present invention is proposed based on the second embodiment shown in fig. 3.
In a third embodiment, the step S10 includes:
step S101: and performing trusted authentication on the hardware equipment based on the blockchain and a preset trusted authentication model.
It should be understood that, in order to improve the reliability of the trusted authentication, in this embodiment, a blockchain and a preset trusted authentication model are also introduced to perform the trusted authentication on the hardware device.
It should be noted that the preset trusted authentication model may be preset, for example, the preset trusted authentication model may be set as a trusted computing model.
It may be understood that the trusted authentication of the hardware device based on the blockchain and the preset trusted authentication model may be to obtain a physical environment and an operating program of the hardware device, and perform the trusted authentication of the hardware device according to the physical environment and the operating program through the blockchain and the preset trusted authentication model.
Step S102: and selecting the trusted hardware equipment from the hardware equipment according to the trusted authentication result.
It should be understood that selecting the trusted hardware device from the hardware devices according to the trusted authentication result may be to use the hardware device that has the trusted authentication result as authenticated as the trusted hardware device.
In a third embodiment, trusted authentication is performed on hardware equipment based on a blockchain and a preset trusted authentication model, and trusted hardware equipment is selected from the hardware equipment according to a trusted authentication result; the embodiment also introduces the blockchain and the preset trusted authentication model to perform the trusted authentication on the hardware equipment, so that the reliability of the trusted authentication can be improved.
In a third embodiment, the step S20 includes:
step S201: authentication information is acquired.
It should be appreciated that in order to increase the security of the identity authentication system, in this embodiment, the identity authentication system is deployed in a trusted hardware device based on authentication information and blockchain smart keys as well.
The authentication information may be information that needs to be input when the user uses the identity authentication system. For example, the authentication information may be biometric information, password information, and private information such as a reset management key.
Step S202: an identity authentication system is deployed in the trusted hardware device based on authentication information and a blockchain intelligence contract.
In a specific implementation, for example, an identity authentication system based on intelligent contracts is deployed in a trusted hardware device based on private information such as biometric information, password information, reset management key, and the like.
In a third embodiment, obtaining authentication information, deploying an identity authentication system approximately in a trusted hardware device based on the authentication information and blockchain intelligence; the embodiment also arranges the identity authentication system in the trusted hardware equipment based on the authentication information and the blockchain intelligent key, so that the security of the identity authentication system can be improved.
In a third embodiment, the step S40 includes:
step S401: and acquiring key information of the encryption key.
It should be appreciated that in order to avoid that the stored encryption key does not meet the storage requirements, in this embodiment, the encryption key is also verified before being stored in the blockchain smart contract.
The key information may be information such as a key format, key content, and key size.
Step S402: and verifying the encryption key according to the key information.
It can be understood that the verification of the encryption key according to the key information can be that the key information is matched with preset violation information, and when the matching is successful, the verification of the encryption key is judged not to pass; when the matching fails, the verification of the encryption key is judged to pass.
Step S403: after the verification passes, the encryption key is stored in the blockchain smart contract.
It should be appreciated that upon verification passing, the stored encryption key is described as conforming to the storage requirements. Thus, the encryption key may be stored directly in the blockchain smart contract.
In a third embodiment, it is disclosed to acquire key information of an encryption key, verify the encryption key according to the key information, and store the encryption key in a blockchain smart contract after the verification is passed; in the embodiment, before the encryption key is stored in the blockchain intelligent contract, the encryption key is checked, so that the stored encryption key is prevented from not meeting the storage requirement, and the reliability of information storage is improved.
In a third embodiment, the step S50 includes:
step S501: and acquiring the information type of the information to be stored, and screening the information to be stored based on the information type to obtain target information.
It will be appreciated that in practical applications, it may result in wasted resources if all information is stored in the blockchain. Therefore, in order to overcome the above-mentioned drawbacks, in this embodiment, the information to be stored is also filtered based on the information type of the information to be stored.
Step S502: and encrypting the target information through an encryption key in the blockchain intelligent contract to obtain encryption information.
In a specific implementation, for example, when the information to be stored is vehicle information, the information type is vehicle information type, and the target information is accelerator pedal information, brake information, speed information, and the like.
In a third embodiment, an information type of information to be stored is obtained, the information to be stored is screened based on the information type, target information is obtained, and the target information is encrypted through an encryption key in a blockchain intelligent contract, so that encrypted information is obtained; in the embodiment, the information to be stored is screened based on the information type of the information to be stored, so that the resource waste can be reduced, and the information storage efficiency is improved.
In a third embodiment, the step S60 includes:
step S601: a trusted memory space address of the blockchain is obtained.
It should be appreciated that in order to increase the security of information storage, in this embodiment, the encrypted information is also stored in the trusted memory space of the blockchain.
Step S602: and storing the encrypted information into a trusted memory space of a blockchain based on the trusted memory space address.
It is to be appreciated that storing the encrypted information into the trusted memory space of the blockchain based on the trusted memory space address can be determining a storage location for the encrypted information based on the trusted memory space address and storing the encrypted information into the trusted memory space of the blockchain based on the storage location.
In a third embodiment, obtaining a trusted memory space address of a blockchain, storing encrypted information into a trusted memory space of the blockchain based on the trusted memory space address; the embodiment also stores the encrypted information into the trusted storage space of the blockchain, so that the safety of information storage can be improved.
In addition, the embodiment of the invention also provides a storage medium, wherein an information storage program is stored on the storage medium, and the information storage program realizes the information storage method when being executed by a processor.
In addition, referring to fig. 5, an embodiment of the present invention further proposes an information storage device, including: a device authentication module 10, a system deployment module 20, a key management module 30, a key storage module 40, an information encryption module 50, and an information storage module 60;
the device authentication module 10 is configured to perform trusted authentication on a hardware device to obtain a trusted hardware device.
In order to avoid the loss of the encryption key, in this embodiment, an identity authentication system is also deployed in the trusted hardware device to manage the encryption key.
It may be understood that the trusted authentication of the hardware device may be to obtain a physical environment and an operating program of the hardware device, and perform the trusted authentication of the hardware device according to the physical environment and the operating program. The physical environment may be an operating environment of the hardware device, and the operating program may be a program in the hardware device.
The system deployment module 20 is configured to deploy an identity authentication system in the trusted hardware device.
It will be appreciated that in order to facilitate management of subsequently stored encryption keys, in this embodiment, the identity authentication system may be deployed in the trusted hardware device based on blockchain intelligence.
The key management module 30 is configured to manage an encryption key through the identity authentication hierarchy.
In a specific implementation, for example, a vehicle factory (or a regulatory unit) deploys an identity authentication system in a trusted hardware device, a user creates a digital identity a through the identity authentication system, and the user creates a digital identity B on a different device for managing the identity a and encryption keys corresponding to the identity a.
The key storage module 40 is configured to store the encryption key in the blockchain smart contract.
It can be appreciated that in the prior art, the encryption key is usually stored by the user, so that the encryption key is easy to lose and has poor security. Thus, to overcome the above drawbacks, the present embodiment stores encryption keys in a blockchain smart contract.
It should be noted that the encryption key may be preset by the user, which is not limited in this embodiment.
Further, since the information is stored through the blockchain, the information can be supervised and traceable, and therefore, the scheme can be applied to the purchase of a second hand vehicle, and in this embodiment, in order to store the vehicle information on the blockchain, the information storage device further includes: an information acquisition module;
the information acquisition module is used for acquiring vehicle information through vehicle-mounted equipment which is pre-deployed on a vehicle to be monitored;
the information acquisition module is further used for taking the vehicle information as information to be stored.
The vehicle information may be accelerator pedal information, brake pedal information, speed information, or the like.
In a specific implementation, for example, a vehicle factory (or a supervision unit) deploys an intelligent contract on a blockchain, a user creates an encryption key on a device and stores the encryption key in a trusted storage chain contract, vehicle information (an accelerator pedal, a brake pedal, a speed and the like) acquired by vehicle-mounted devices is encrypted through the encryption key to obtain the encryption information, the encryption information is stored in the blockchain, the user calls the contract to obtain a report of a travel history (a brake use condition, whether collision exists or not and the like) in a second-hand vehicle circulation link, and a vehicle purchasing user verifies a report source (calls a contract function, a data source and the like).
The information encryption module 50 is configured to encrypt information to be stored by using an encryption key in the blockchain intelligent contract to obtain encrypted information.
It should be understood that, in order to avoid information leakage, in this embodiment, before storing information, the information to be stored is further encrypted by an encryption key in the blockchain smart contract, so as to improve the security of information storage.
The information storage module 60 is configured to store the encrypted information in a blockchain.
It will be appreciated that in order to store information for outgoing calls, in this embodiment, encrypted information is stored in the area chain.
In the embodiment, trusted authentication is performed on hardware equipment to obtain trusted hardware equipment, an identity authentication system is deployed in the trusted hardware equipment, an encryption key is managed through an identity authentication system, the encryption key is stored in a blockchain intelligent contract, information to be stored is encrypted through the encryption key in the blockchain intelligent contract to obtain encryption information, and the encryption information is stored in a blockchain; because the identity authentication system is deployed in the trusted hardware device to manage the encryption key, the information to be stored is stored in an encrypted manner through the encryption key, and the encryption key is stored in the blockchain intelligent contract, the disclosure of private information stored in the blockchain is avoided, and the security of information storage is improved.
Other embodiments or specific implementations of the information storage device according to the present invention may refer to the above method embodiments, and are not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. read only memory mirror (Read Only Memory image, ROM)/random access memory (Random Access Memory, RAM), magnetic disk, optical disk), comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.
The invention discloses an A1, information storage method, the said information storage method includes the following steps:
performing trusted authentication on the hardware equipment to obtain trusted hardware equipment;
deploying an identity authentication system in the trusted hardware device;
managing an encryption key through the identity authentication system;
storing the encryption key in a blockchain intelligent contract;
encrypting the information to be stored through an encryption key in the blockchain intelligent contract to obtain encrypted information;
and storing the encrypted information into a blockchain.
A2, the information storage method as described in A1, wherein the step of performing trusted authentication on the hardware device to obtain the trusted hardware device comprises the following steps:
performing trusted authentication on the hardware equipment based on the blockchain and a preset trusted authentication model;
and selecting the trusted hardware equipment from the hardware equipment according to the trusted authentication result.
A3, the information storage method of A1, the step of disposing an identity authentication system in the trusted hardware device, includes:
acquiring authentication information;
an identity authentication system is deployed in the trusted hardware device based on authentication information and a blockchain intelligence contract.
A4. the information storage method according to any one of A1 to A3, further comprising, after the step of storing the encrypted information in a blockchain:
when an information checking request is received, accessing the blockchain intelligent contract to obtain an encryption key;
and acquiring encryption information from the blockchain based on the encryption key.
A5, the information storage method as described in A4, wherein the step of accessing the blockchain intelligent contract to obtain the encryption key when the information viewing request is received comprises the following steps:
detecting whether the information viewing request contains authorization information or not when the information viewing request is received;
if yes, accessing the blockchain intelligent contract based on the authorization information to obtain an encryption key.
A6, the information storage method according to A5, after the step of obtaining the encrypted information from the blockchain based on the encryption key, further comprises:
when a source verification request is received, verifying a request user;
and when the verification is passed, calling the blockchain intelligent contract to acquire the source information corresponding to the encryption information.
A7, the information storage method according to any one of A1 to A3, wherein the step of encrypting the information to be stored by the encryption key in the blockchain intelligent contract to obtain the encrypted information further comprises:
collecting vehicle information through vehicle-mounted equipment, wherein the vehicle-mounted equipment is pre-deployed on a vehicle to be monitored;
and taking the vehicle information as information to be stored.
A8. the information storage method of any of A1 to A3, the step of storing the encryption key in the blockchain smart contract includes:
acquiring key information of the encryption key;
verifying the encryption key according to the key information;
after the verification passes, the encryption key is stored in the blockchain smart contract.
A9, the information storage method according to any one of A1 to A3, wherein the step of encrypting the information to be stored by an encryption key in the blockchain smart contract to obtain encrypted information includes:
acquiring an information type of information to be stored, and screening the information to be stored based on the information type to obtain target information;
and encrypting the target information through an encryption key in the blockchain intelligent contract to obtain encryption information.
A10, the information storage method of any of A1 to A3, the step of storing the encrypted information into a blockchain, comprising:
acquiring a trusted memory space address of a block chain;
and storing the encrypted information into a trusted memory space of a blockchain based on the trusted memory space address.
The invention also discloses B11, an information storage device, the information storage device includes: the system comprises a memory, a processor and an information storage program stored on the memory and capable of running on the processor, wherein the information storage program realizes the information storage method when being executed by the processor.
The invention also discloses a C12, a storage medium, the storage medium stores an information storage program, and the information storage program realizes the information storage method when being executed by a processor.
The invention also discloses a D13, an information storage device, the information storage device includes: the system comprises a device authentication module, a system deployment module, a key management module, a key storage module, an information encryption module and an information storage module;
the device authentication module is used for performing trusted authentication on the hardware device to obtain a trusted hardware device;
the system deployment module is used for deploying an identity authentication system in the trusted hardware device;
the key management module is used for managing the encryption key through the identity authentication system;
the key storage module is used for storing the encryption key into the blockchain intelligent contract;
the information encryption module is used for encrypting the information to be stored through an encryption key in the blockchain intelligent contract to obtain encrypted information;
the information storage module is used for storing the encrypted information into a blockchain.
The information storage device as described in D14, the device authentication module further configured to perform trusted authentication on the hardware device based on the blockchain and a preset trusted authentication model;
the device authentication module is further used for selecting the trusted hardware device from the hardware devices according to the trusted authentication result.
D15, the information storage device as described in D13, where the system deployment module is further configured to obtain authentication information;
the system deployment module is further configured to deploy an identity authentication system in the trusted hardware device based on authentication information and a blockchain smart contract.
D16, the information storage device of any one of D13 to D15, the information storage device further comprising: an information viewing module;
the information checking module is used for accessing the blockchain intelligent contract to obtain an encryption key when receiving an information checking request;
the information viewing module is further configured to obtain encryption information from the blockchain based on the encryption key.
The information storage device of D17, the information viewing module is further configured to detect, when an information viewing request is received, whether the information viewing request includes authorization information;
and the information checking module is further used for accessing the blockchain intelligent contract based on the authorization information if the information checking module is used for acquiring an encryption key.
D18, the information storage device of D17, further comprising: a source verification module;
the source verification module is used for verifying a request user when receiving a source verification request;
and the source verification module is also used for calling the blockchain intelligent contract to acquire the source information corresponding to the encryption information when verification passes.
D19, the information storage device of any one of D13 to D15, further comprising: an information acquisition module;
the information acquisition module is used for acquiring vehicle information through vehicle-mounted equipment which is pre-deployed on a vehicle to be monitored;
the information acquisition module is further used for taking the vehicle information as information to be stored.
D20, an information storage device as in any one of D13 to D15, the key storage module further configured to obtain key information of the encryption key;
the key storage module is further used for verifying the encryption key according to the key information;
the key storage module is further used for storing the encryption key into the blockchain intelligent contract after the verification is passed.

Claims (10)

1. An information storage method, characterized in that the information storage method comprises the steps of:
performing trusted authentication on the hardware equipment to obtain trusted hardware equipment;
deploying an identity authentication system in the trusted hardware device;
managing an encryption key through the identity authentication system;
storing the encryption key in a blockchain intelligent contract;
encrypting the information to be stored through an encryption key in the blockchain intelligent contract to obtain encrypted information;
and storing the encrypted information into a blockchain.
2. The information storage method of claim 1, wherein the step of performing trusted authentication on the hardware device to obtain a trusted hardware device comprises:
performing trusted authentication on the hardware equipment based on the blockchain and a preset trusted authentication model;
and selecting the trusted hardware equipment from the hardware equipment according to the trusted authentication result.
3. The information storage method of claim 1, wherein the step of deploying an identity authentication system in the trusted hardware device comprises:
acquiring authentication information;
an identity authentication system is deployed in the trusted hardware device based on authentication information and a blockchain intelligence contract.
4. The information storage method of any one of claims 1 to 3, further comprising, after the step of storing the encrypted information in a blockchain:
when an information checking request is received, accessing the blockchain intelligent contract to obtain an encryption key;
and acquiring encryption information from the blockchain based on the encryption key.
5. The information storage method of claim 4, wherein the step of accessing the blockchain smart contract to obtain an encryption key upon receiving an information viewing request comprises:
detecting whether the information viewing request contains authorization information or not when the information viewing request is received;
if yes, accessing the blockchain intelligent contract based on the authorization information to obtain an encryption key.
6. The information storage method of claim 5, wherein after the step of acquiring the encrypted information from the blockchain based on the encryption key, further comprising:
when a source verification request is received, verifying a request user;
and when the verification is passed, calling the blockchain intelligent contract to acquire the source information corresponding to the encryption information.
7. The information storage method as claimed in any one of claims 1 to 3, wherein the step of encrypting the information to be stored by an encryption key in the blockchain smart contract, before the step of obtaining the encrypted information, further comprises:
collecting vehicle information through vehicle-mounted equipment, wherein the vehicle-mounted equipment is pre-deployed on a vehicle to be monitored;
and taking the vehicle information as information to be stored.
8. An information storage device, the information storage device comprising: memory, a processor and an information storage program stored on the memory and executable on the processor, which when executed by the processor implements the information storage method according to any one of claims 1 to 7.
9. A storage medium having stored thereon an information storage program which, when executed by a processor, implements the information storage method of any one of claims 1 to 7.
10. An information storage device, characterized in that the information storage device comprises: the system comprises a device authentication module, a system deployment module, a key management module, a key storage module, an information encryption module and an information storage module;
the device authentication module is used for performing trusted authentication on the hardware device to obtain a trusted hardware device;
the system deployment module is used for deploying an identity authentication system in the trusted hardware device;
the key management module is used for managing the encryption key through the identity authentication system;
the key storage module is used for storing the encryption key into the blockchain intelligent contract;
the information encryption module is used for encrypting the information to be stored through an encryption key in the blockchain intelligent contract to obtain encrypted information;
the information storage module is used for storing the encrypted information into a blockchain.
CN202210808691.2A 2022-07-07 2022-07-07 Information storage method, information storage device, information storage medium and information storage apparatus Pending CN117411653A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210808691.2A CN117411653A (en) 2022-07-07 2022-07-07 Information storage method, information storage device, information storage medium and information storage apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210808691.2A CN117411653A (en) 2022-07-07 2022-07-07 Information storage method, information storage device, information storage medium and information storage apparatus

Publications (1)

Publication Number Publication Date
CN117411653A true CN117411653A (en) 2024-01-16

Family

ID=89498743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210808691.2A Pending CN117411653A (en) 2022-07-07 2022-07-07 Information storage method, information storage device, information storage medium and information storage apparatus

Country Status (1)

Country Link
CN (1) CN117411653A (en)

Similar Documents

Publication Publication Date Title
US9930071B2 (en) System and methods for secure utilization of attestation in policy-based decision making for mobile device management and security
CN112016106B (en) Authentication calling method, device and equipment of open interface and readable storage medium
CN110071806B (en) Data processing method and system based on interface verification
CN106529218B (en) Application verification method and device
CA2923740A1 (en) Software code signing system and method
RU2691228C2 (en) Cancellation protection of possible confidential data elements
CN110908786A (en) Intelligent contract calling method, device and medium
CN114925141B (en) Cloud primary automation deployment management system and method based on block chain
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
CN111737232A (en) Database management method, system, device, equipment and computer storage medium
CN111966422A (en) Localized plug-in service method and device, electronic equipment and storage medium
EP3407241B1 (en) User authentication and authorization system for a mobile application
CN112804222B (en) Data transmission method, device, equipment and storage medium based on cloud deployment
CN108241798B (en) Method, device and system for preventing machine refreshing
CN113922975B (en) Security control method, server, terminal, system and storage medium
CN112597452A (en) Application program interface calling method and device, storage medium and electronic equipment
CN112637167A (en) System login method and device, computer equipment and storage medium
CN109905408B (en) Network security protection method, system, readable storage medium and terminal equipment
CN115242433B (en) Data processing method, system, electronic device and computer readable storage medium
CN115509556A (en) Application management method, device, equipment and medium
CN117411653A (en) Information storage method, information storage device, information storage medium and information storage apparatus
CN113868691B (en) Authorized operation method and device of block chain based on cloud-native technology
CN115913676A (en) Access control method and device for cloud native application, electronic equipment and storage medium
CN115129229A (en) Information storage method, device, storage medium and device
CN112364340A (en) Authority management method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination