CN117874774A - Directional disclosure method for information on block chain - Google Patents

Directional disclosure method for information on block chain Download PDF

Info

Publication number
CN117874774A
CN117874774A CN202310237642.2A CN202310237642A CN117874774A CN 117874774 A CN117874774 A CN 117874774A CN 202310237642 A CN202310237642 A CN 202310237642A CN 117874774 A CN117874774 A CN 117874774A
Authority
CN
China
Prior art keywords
information
result
module
encryption
contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310237642.2A
Other languages
Chinese (zh)
Inventor
李冠中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202310237642.2A priority Critical patent/CN117874774A/en
Publication of CN117874774A publication Critical patent/CN117874774A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for directionally disclosing information on a blockchain, which comprises a unidirectional mirror module, wherein the unidirectional mirror module comprises a contract encryption module, and the unidirectional mirror module is connected with the contract encryption module and is used for carrying out data statistics, address binding, data encryption transmission, data decryption transmission and data transmission verification on data information to be disclosed, wherein the contract encryption module is used for storing, calculating and setting encryption and decryption contracts corresponding to the unidirectional mirror module. The method solves the problem that all blockchain products cannot realize the directional disclosure function in the current domestic and foreign markets, provides a larger operation space for the supervision of blockchain, completely reserves the decentralized characteristic of blockchain, can disclose to appointed personnel with secret keys only, and only displays whether disclosure data are normal or not for other personnel without secret keys, but does not display key information such as specific types, quantity and the like of the disclosure data.

Description

Directional disclosure method for information on block chain
Technical Field
The invention relates to the technical field of digital encryption, in particular to a method for directionally disclosing information on a blockchain.
Background
Currently, from the financial field, the blockchain technology is rapidly penetrating into more fields, and in the future, the innovation effects are generated on payment, clearing, the internet of things and other fields based on credit endorsements, so that the wide application of the blockchain technology can be regarded as an important inflection point in the industry.
Through searching, china patent with application number CN109313685B discloses encryption application of a blockchain system, and aims to provide intelligent contracts through encryption applet container service to realize a data security communication mode.
Chinese patent application number CN111767559B discloses field level encrypted blockchain data, which aims to prevent key leakage, resulting in the whole message data being deciphered.
However, considering that the information on the blockchain is completely transparent and public, the directional transparency and public of specific people cannot be realized, and the requirement of key information confidentiality is presented for non-specific people. Therefore, if the information under the chain is directly linked and disclosed by using the blockchain, the disclosure of the information under the chain is equivalent to the disclosure of the information under the chain, and the fairness, disclosure and credibility of the information can be ensured, but the information can also have certain influence on the production, life, decision making, confidentiality and the like of individuals, groups, government authorities, institutions and the like. Therefore, the method has the advantages of keeping the excellent characteristics of the decentralised products such as fairness, disclosure, credibility and the like of the information of the block chain, taking account of the implementation of the information confidentiality work, and performing supervision work on the basis. All the block chain tools in the market at present cannot guarantee that the three points can be fully and reasonably considered.
Disclosure of Invention
The invention aims to solve the defects in the prior art, and provides a technology for realizing directional disclosure of information on a chain on the basis of maintaining the decentralization characteristic of a blockchain.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
the unidirectional mirror module comprises a contract encryption module, and the unidirectional mirror module is connected with the contract encryption module and is used for carrying out data statistics, address binding, data encryption transmission, data decryption transmission and data transmission verification on data information to be disclosed, wherein the contract encryption module is used for storing, calculating and setting encryption and decryption contracts corresponding to the unidirectional mirror module;
the method comprises the following steps:
s1: the method comprises the steps of importing data to be disclosed into a unidirectional mirror module, counting the information to be disclosed through a contract encryption module of the unidirectional mirror module, encrypting according to the unidirectional mirror module, and encrypting through an asymmetric special algorithm on the disclosed information;
s2: calculating a decimal encryption result according to a contract encryption module of the unidirectional mirror module, and arranging and combining the encryption result;
s3: binding and associating the revealed address with the information to be revealed through the unidirectional mirror module, automatically triggering the corresponding connection between the mark address and the revealed address, encrypting the finally generated decimal number by a contract encryption module in the unidirectional mirror module, grouping the result, and generating a corresponding pass on a blockchain according to the serial number and the field number in the serial number;
s4: after the address is revealed and the corresponding number of pass certificates are generated, the pass certificates are sent to a contract encryption module callback in the unidirectional mirror module, the contract encryption module verifies the result after receiving the information, and result data are produced, wherein:
if the output result is correct, the updating is successful, and the result is displayed outwards;
if the output result is incorrect, the updating fails, and the monitoring personnel is informed immediately when the result is displayed externally, and after the monitoring personnel checks the result, the unidirectional mirror module can be reset, and the step S3 is carried out again;
s5: after the output result is 'correct', after the instruction is successfully completed, the instruction passes through a contract encryption module, and is verified once at random time intervals of 1-86,400 seconds or is verified by manually setting time, and fixed or random check verification is performed at time intervals to prevent the information under the chain from being tampered with endless, wherein:
if the verification result is correct, continuing to wait for the next verification;
if the verification result is wrong, sequentially performing a corresponding wrong result processing mode;
s6: when the detailed information needs to be consulted, the information is decoded through the unidirectional mirror module and the contract encryption module, the decryption result is generalized, and finally the corresponding readable disclosure information content is output.
Further, in step S1, the encryption flow of the unidirectional mirror module and the contract encryption module is: after counting the property or information on the chain, generating a text file from the counting result in a fixed format, wherein the text file consists of 26 English letters plus digits 0-9.
Further, the process of converting the encryption result into the private key by the unidirectional mirror module and the contract encryption module is as follows: the encryption result is finally converted into decimal numbers and a string of private keys for decoding is generated, wherein the private keys are formed by upper and lower English letters plus 0-9 numbers randomly.
Further, in step S2, the way in which the unidirectional mirror module and the contract encryption module perform permutation and combination on the encryption result is as follows:
calculating the number of bits of the finally converted decimal encryption result, dividing the number of bits by 10 to obtain the required group number, wherein the group number is added with one if the remainder exists;
and randomly generating three to eight English capital letters in each group according to the number of the groups, taking the English capital letters as serial numbers representing the sequence, and inserting the converted decimal encryption result digits into one group every ten digits in sequence, wherein the converted decimal encryption result digits are divided by 10 to form remainder, and the last group only fills in the encryption result of the remainder.
Specifically, note that: if the first digit is 0 after grouping, the digits are sequentially pushed back to digits with the highest digits being not zero, and when the group only keeps digits with the highest digits being not zero, the field 0003456789 is divided into XXS groups, and the digits after division are 3456789.
Further, in step S5, the procedure of error result processing by the unidirectional mirror module and the contract encryption module is as follows: when the verification result is found to be wrong, immediately notifying a supervisor according to the contract encryption module, if the verification result is an asset account, freezing the corresponding transaction authority (settable expansion) by using external artificial intelligence, and sending information to a preset supervisor side to prompt warning;
after confirming the reason, if the supervisor finally checks the reason, the supervisor can manually confirm, and after confirming, the supervisor reconfirm the correlation between the disclosure address and the information to be disclosed from the step S3, and sequentially performs the following steps.
Further, in step S6, the specific procedures of information modification and referring to the processing through the unidirectional mirror module are as follows:
1: providing the one-way mirror module with the requirement of moving and changing, namely providing a prompt to the module in advance to inform the module that information changing is about to be performed instead of providing changed information to the one-way mirror;
2: after receiving the prompt, the unidirectional mirror starts to check the disclosure information with high frequency until the disclosure information is monitored to be changed;
3: the unidirectional mirror stops checking the disclosure information at high frequency and starts to encrypt the received and overlapped information by using an asymmetric special algorithm;
4: after encryption is completed, a new packet is formed according to a contract module, and finally the new packet is sent to an address on a chain to generate a new serial number and a new field digital certificate;
5: generating a pass corresponding to the field number on the chain according to the newly generated serial number, after all the passes are completed, sending the exposed address to a contract encryption module callback, and verifying the contract encryption module after receiving the information, wherein:
if the output result is correct, the result represents that the information is updated successfully and the result is displayed outwards;
if the output result is incorrect, the update fails, the supervision staff is notified while the result is displayed outwards, and after the supervision staff checks the result, the supervision staff waits for the instruction to repeat the step S6;
when the specified user needs to be referred to the real asset information rights: and (3) decrypting the private key generated in the step (S1) through the unidirectional mirror module again by using the private key, and summarizing the decryption result through the contract encryption module, and finally outputting readable corresponding detailed information content.
Further, the key is set to either a fixed form or a random dynamic change per minute, wherein before either mode is used, confirmation and setting are performed before step S1.
Compared with the prior art, the invention has the beneficial effects that: the method solves the problem that all blockchain products cannot realize the directional disclosure function in the current domestic and foreign markets, provides a larger operation space for the supervision of blockchain, and completely reserves the decentralization characteristic of the blockchain without violating the original fair, fair and credible characteristics of the blockchain products. The technology takes intelligent contracts and asymmetric encryption algorithms as core leading, has the characteristics of expandability, multiple application scenes and high fit with new generation artificial intelligence, and can combine the characteristics of blockchains (public blockchains, industry blockchains and private blockchains) to realize directional information disclosure on the decentralised blockchains.
By the technology, when one link address is needed to disclose the related property type, quantity or other key information, the key information can be only disclosed to appointed personnel with the key, and other personnel without the key only display whether the disclosed data are normal or not, but not display the specific type, quantity and other key information of the disclosed data.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention.
FIG. 1 is a flow chart of a method for information oriented disclosure on a blockchain chain according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments.
Referring to fig. 1, the method for directionally disclosing information on a blockchain includes a unidirectional mirror module, wherein the unidirectional mirror module includes a contract encryption module, and the unidirectional mirror module is connected with the contract encryption module and is used for implementing data statistics, address binding, data encryption transmission, data decryption transmission and data transmission verification on data information to be disclosed, and the contract encryption module is used for storing, calculating and setting corresponding encryption and decryption contracts;
the contract encryption module is also used for realizing intelligent contract and asymmetric encryption algorithm with the unidirectional mirror module;
the method comprises the following steps:
s1: the method comprises the steps of importing data to be disclosed into a unidirectional mirror module, counting the information to be disclosed through a contract encryption module of the unidirectional mirror module, encrypting according to the unidirectional mirror module, and encrypting through an asymmetric special algorithm on the disclosed information;
wherein the disclosed information package property information, text information, data information requiring encryption, etc.
It should be further noted that property information such as property type, quantity, remark information, dialogue information, time information, etc.;
the text information and the data requiring encryption are such as examination questions, competitive results, timing open texts and the like.
S2: calculating a decimal encryption result according to a contract encryption module of the unidirectional mirror module, and arranging and combining the encryption result;
s3: binding and associating the revealed address with the information to be revealed through the unidirectional mirror module, automatically triggering the corresponding connection between the mark address and the revealed address, encrypting the finally generated decimal number by a contract encryption module in the unidirectional mirror module, grouping the result, and generating a corresponding pass on a blockchain according to the serial number and the field number in the serial number;
the pass has the capability of casting and increasing the distribution, and can be increased or decreased at any time when the future disclosure information changes and the unidirectional mirror module generates a new encryption result again so as to correspond to the latest encryption result.
S4: after the address is revealed and the corresponding number of pass certificates are generated, the pass certificates are sent to a contract encryption module callback in the unidirectional mirror module, the contract encryption module verifies the result after receiving the information, and result data are produced, wherein:
if the output result is correct, the updating is successful, and the result is displayed outwards;
if the output result is incorrect, the updating fails, and the monitoring personnel is informed immediately when the result is displayed externally, and after the monitoring personnel checks the result, the unidirectional mirror module can be reset, and the step S3 is carried out again;
in this step, it is further explained that:
the processing of the changing information by the unidirectional mirror module generally includes two types:
(1) and (3) automatically monitoring and changing the asset account type data and the plain text data.
The unidirectional mirror can be expanded to be connected to an API interface for monitoring, which is set up under a supervision chain, so that data can be automatically scanned, when an asset is changed, a change person manually informs the unidirectional mirror in advance, the unidirectional mirror is verified with the API interface for monitoring according to a designated frequency after receiving an instruction until the change person finishes changing related information, the API sends corresponding change information to the unidirectional mirror, the unidirectional mirror stops high-frequency verification, and encryption is started to carry out subsequent steps.
(2) The monitoring & interchange is manually submitted for asset account type data, plain text type data.
When the API interface for asset account monitoring of the asset is not established under the chain of the supervision, each time the replacement occurs, an operator is required to manually package the replacement information, before the replacement information is uploaded to the unidirectional mirror, the unidirectional mirror is manually informed in advance, the unidirectional mirror is verified with the current disclosure according to the designated frequency after receiving the instruction, after the verification is started, the newly packaged content is uploaded to the unidirectional mirror to replace the old disclosure, when the unidirectional mirror detects the change part of the newly uploaded content data, the high-frequency verification is stopped, the encryption is started, and the follow-up steps are carried out
Further description: property types such as dollars, renminbi, euros, etc., and corresponding amounts, and other information such as text remark information for transfer in and out, redemption, etc
Further description: plain text data such as examination questions, competitive results, documents of timed disclosure.
S5: after the output result is 'correct', after the instruction is successfully completed, the instruction passes through a contract encryption module, and is verified once at random time intervals of 1-86,400 seconds or is verified by manually setting time, and fixed or random check verification is performed at time intervals to prevent the information under the chain from being tampered with endless, wherein:
if the verification result is correct, continuing to wait for the next verification;
if the verification result is wrong, sequentially performing a corresponding wrong result processing mode;
s6: when the information needs to be changed and consulted, the information is decoded through the one-way mirror module and the contract encryption module, the decryption result is generalized, and finally the corresponding readable disclosure information content is output.
Example two
On the basis of the first embodiment, in step S1, the encryption flow of the unidirectional mirror module and the contract encryption module is: after counting the property or information on the chain, generating a text file from the counting result in a fixed format, wherein the text file consists of 26 English letters plus digits 0-9.
The process of converting the encryption result into the private key by the unidirectional mirror module and the contract encryption module is as follows: the encryption result is finally converted into decimal numbers and a string of private keys for decoding is generated, wherein the private keys are formed by upper and lower English letters plus 0-9 numbers randomly.
In the specific embodiment of the present application, in step S2, the way in which the unidirectional mirror module and the contract encryption module perform permutation and combination on the encryption result is as follows:
calculating the number of bits of the finally converted decimal encryption result, dividing the number of bits by 10 to obtain the required group number, wherein the group number is added with one if the remainder exists;
and randomly generating three to eight English capital letters in each group according to the number of the groups, and inserting the converted decimal encryption result digits into one group every ten in sequence, wherein the converted decimal encryption result digits are divided by 10 to form a remainder, and the last group only fills the encryption result with the remainder.
Specifically, note that: if the first digit is 0 after grouping, the digits are sequentially pushed back to digits with the highest digits being not zero, and when the group only keeps digits with the highest digits being not zero, the field 0003456789 is divided into XXS groups, and the digits after division are 3456789.
In the specific embodiment of the present application, in step S5, the process of performing error result processing by the unidirectional mirror module and the contract encryption module is as follows: when the verification result is found to be wrong, immediately notifying a supervisor according to the contract encryption module, if the verification result is an asset account, freezing the corresponding transaction authority (settable expansion) by using external artificial intelligence, and sending information to a preset supervisor side to prompt warning;
after confirming the reason, if the supervisor finally checks the reason, the supervisor can manually confirm, and after confirming, the supervisor reconfirm the correlation between the disclosure address and the information to be disclosed from the step S3, and sequentially performs the following steps.
In the specific embodiment of the present application, in step S6, the specific procedures of information modification and referring to the processing through the unidirectional mirror module are as follows:
1: providing the one-way mirror module with the requirement of moving and changing, namely providing a prompt to the module in advance to inform the module that information changing is about to be performed instead of providing changed information to the one-way mirror;
2: after receiving the prompt, the unidirectional mirror starts to check the disclosure information with high frequency until the disclosure information is monitored to be changed;
3: the unidirectional mirror stops checking the disclosure information at high frequency and starts to encrypt the received and overlapped information by using an asymmetric special algorithm;
4: after encryption is completed, a new packet is formed according to a contract module, and finally the new packet is sent to an address on a chain to generate a new serial number and a new field digital certificate;
5: generating a pass corresponding to the field number on the chain according to the newly generated serial number, after all the passes are completed, sending the exposed address to a contract encryption module callback, and verifying the contract encryption module after receiving the information, wherein:
if the output result is correct, the result represents that the information is updated successfully and the result is displayed outwards;
if the output result is incorrect, the update fails, the supervision staff is notified while the result is displayed outwards, and after the supervision staff checks the result, the supervision staff waits for the instruction to repeat the step S6;
when the specified user needs to be referred to the real asset information rights: and (3) decrypting the private key generated in the step (S1) through the unidirectional mirror module again by using the private key, and summarizing the decryption result through the contract encryption module, and finally outputting readable corresponding detailed information content.
In a specific embodiment of the present application, the key is set in either a fixed form or randomly dynamically changed per minute, wherein before either mode is used, confirmation and setting is performed before step S1.
For a better understanding of the technical solution of the present invention, the following is further described with reference to examples.
The demand conditions are as follows:
when a scientific and technological company carries out the first public share-collecting on a chain, and carries out the public share-collecting through a legal on-chain transaction platform, the supervision of a supervision department and the supervision of all investors are required, so that the current key information such as technology, finance, personnel and the like of the scientific and technological company is required to be disclosed, the modification of the key information due to the personal benefit of related people is avoided, the falsification of the key information is avoided, and the share-collecting is carried out.
However, considering that the information of the company needs to be kept secret before the stock is overtly collected, so that the information is prevented from being revealed, risks of malicious business competition or infringement of technical patent rights are caused, and since the company performs stock collection related operations on a chain, a supervision department performs strict supervision and check on all relevant information of the company, and also considers the special property of the company, provides due secret measures for the company before the check is completed, and ensures consistency of the information of the company before and after the check is completed.
The specific steps are as follows:
(1) building (under chain) of public data information base
Firstly, establishing all information required to be disclosed by the company, packaging the information after all confirmation works are completed, outputting an information base of the disclosure data, namely 'disclosure data', wherein the information in the information base is the final edition information which is checked by the supervision department. The company needs to be responsible for the information, and the uploading information is not consistent with the actual information, has false components and is subjected to legal level sanctions.
(2) Introducing a unidirectional mirror module, and encrypting data (under chain) by the unidirectional mirror module
The disclosure data is imported into the one-way mirror module, and the one-way mirror module encrypts the disclosure data by an asymmetric special algorithm. Assuming that the "disclosure data" is "abcdefghijklmnopqrvuvwszabcdefghirphrsnonotuvwxyz 01234556789", after encryption by an asymmetric special algorithm, it is "U2FsdGVkX1e kx 5B1j9ROTFCQxk1 cjgidfqakaabaap 077us52", then the result after encryption is decimal to "3254234336566571717054418572729305526432297529967388580183609153654126798620322286560352", and a series of private keys for decoding are generated, the private keys are randomly composed of case english letters plus 0-9 digits, and it is assumed to be abcdefgABCDEFG1234567 (the private keys may be set to a unique fixed state, or a random state that dynamically changes every minute, which form is used, the private keys may be confirmed and set at this time, but once generated, the form may not be switched any more).
(3) After the encryption of the unidirectional mirror module is completed, the unidirectional mirror module is arranged and combined (under the chain)
The one-way mirror module determines that the decimal result bit number is 88 according to the data, divides the number by 10 to obtain 8 groups of required group numbers, and the number of groups is +1 and 9 groups because of the remainder of 8;
then three to eight english capital letters are randomly generated per group as serial numbers representing the sequence, such as the sequence XXS/OUI/RTU/DFG/YJH/DWY/BNM/CUF/GDL, and the sequence data is recorded in a one-way mirror module, the decimal result "3254234336566571717054418572729305526432297529967388580183609153654126798620322286560352" is divided into groups every 10 digits from left to right, and the final result is XXS3254234336/OUI5665717170/RTU5441857272/DFG9305526432/YJH2975299673/DWY8858018360/BNM9153654126/CUF7986203222/GDL86560352, and the final full encryption result is recorded.
(4) After the arrangement and combination of the unidirectional mirror modules are completed, the upper and lower links of the chain are connected (under and on the chain)
The unidirectional mirror module binds and associates the disclosure address with the information to be disclosed, and places the disclosure address into a correlation center to form a state that the disclosure information, the unidirectional mirror module and the disclosure address are mutually connected, and automatically triggers the corresponding connection of the disclosure information and the disclosure address.
(5) The chain disclosure address information is guided by the contract encryption module to generate appointed quantity and establish a pass (chain)
And generating a corresponding pass (Token) in the revealed address on the chain according to the final complete encryption result provided by the unidirectional mirror module, wherein the pass (Token) name is that each group randomly generates three English capital letters, and the upper limit of the pass (Token) is infinitely increased. The first generation amount depends on the final full encryption result.
If the address is first disclosed on the chain as a final full encryption result, the following generation should be:
name of general certificate: XXS corresponds to the number of passes: 3254234336
Name of general certificate: OUI corresponds to the number of passes: 5665717170
Name of general certificate: RTU corresponds to the number of passes: 5441857272
Name of general certificate: DFG corresponds to the number of passes: 9305526432
Name of general certificate: YJH corresponds to the number of passes: 2975299673
Name of general certificate: DWY corresponds to the number of passes: 8858018360
Name of general certificate: BNM corresponds to the number of passes: 9153654126
Name of general certificate: CUF corresponds to the number of passes: 7986203222
Name of general certificate: GDL corresponds to the number of passes: 86560352
Because the pass has the capability of random casting and increasing the distribution, when the future disclosure information changes, the one-way mirror module can randomly increase or decrease the pass number (increase continuously generates the corresponding pass and decrease the corresponding pass is driven into a black hole, and the black hole address refers to a special address in the blockchain, once any pass is put into the address, the address can be permanently removed from circulation in the blockchain, and is synonymous with destruction) so as to correspond to the latest encryption result, and the logic changed when the one-way mirror module receives an instruction to update the information on the disclosure address.
In addition, the disclosed address is limited by the contract encryption module of the unidirectional mirror module, the pass card can not be forwarded to any non-black hole address, and the pass card can be automatically transferred to the black hole when a new pass card is accessed from the outside. And if the one-way mirror module generates a new encryption result along with the change of the disclosure information, the contract encryption module discovers that the packet needs to be additionally increased or decreased when the pass is updated, and the contract encryption module can newly increase or decrease the packet according to the step (3).
(6) Complete the generation of the pass, and check the generated result (on-chain & off-chain)
When the verification result is generated, the address pair is disclosed to generate the verification names and the verification quantity after the completion of the generation, a callback is sent to a contract encryption module provided by the unidirectional mirror module, the contract encryption module verifies the on-chain result after receiving the corresponding callback, if the result is correct, the update is successful, and the successful result is displayed for operators and external non-core personnel; if the output result is incorrect, the result represents that the updating fails, the monitoring personnel is informed immediately when the result is displayed for the operator and the external non-core personnel, and after the monitoring personnel checks the result, the one-way mirror module can be reset, and the process is started from the step (2) again.
(7) Fixed or random checking at time intervals to prevent endless tampering of the information under the chain (on-chain & off-chain)
When the output result is "correct", it means that the directional disclosure encryption on the chain of the unidirectional mirror module is completed, the next time is counted from the completion, the next verification is performed by the contract encryption module, the random time is set every 1-86,400 seconds (the time can be set to be a fixed time, the time is set before the encryption is started), the verification content is whether the three are consistent, namely the disclosure information (data in the disclosure database), the unidirectional mirror (final full encryption result after encryption), the disclosure address (on-chain pass name and corresponding pass number) is consistent, if the verification result is consistent, the disclosure of the result is correct to the external owner, other information is not disclosed, then the next verification is continued to be performed, if any party of the verification result is wrong, the process is processed according to the update failure result in the step (6), and the verification process is terminated. If the account is an asset account, external artificial intelligence expansion can be used, operation authorities such as corresponding transactions are frozen, and information is sent to a preset supervisor side for warning.
(8) The supervisor decodes the disclosure address information (in-chain) by the private key
When a supervisor needs to acquire real disclosure information content through a disclosure address, only a secret key abcdefgABCDEFG1234567 needs to be input into a contract encryption module corresponding to a unidirectional mirror module, the unidirectional mirror module can decrypt information in the disclosure address through the setting of the contract encryption module, the decryption result is induced through an asymmetric special algorithm, and finally the corresponding readable disclosure information content is output.
In this embodiment, the specific logic (in-chain & out-of-chain) when the disclosure information needs to be modified is:
when the disclosure address has been generated and the disclosure address has been set by the contract encryption module, and when the disclosure address is verified once (in step (7)) at random time intervals of 1-86,400 seconds, if information needs to be changed, the changed and changed requirement information needs to be transmitted to the one-way mirror module manually (note that here, the changed information needs to be transmitted to the one-way mirror module, the changed behavior needs to be transmitted to the one-way mirror module, that is, the one-way mirror module receives the disclosure information, the fact that the disclosure information is about to change is about to happen), when the one-way mirror module receives the instruction, the one-way mirror module performs online verification at random at a frequency of once every 1-15 seconds, at this time, the verification object is "disclosure information (data in disclosure data base) — (final full encryption result after encryption)", the verification and the "disclosure information (data in disclosure data base) — one-way mirror (final full encryption result after encryption) at step" at the time of the first (step) need not to conflict with each other, and the three verification fail to be verified by any party immediately.
At this time, the operator can exchange the disclosure database and re-upload it until the one-way mirror module confirms that the new disclosure database is packaged and uploaded, and then encrypts the new data. After the unidirectional mirror module encrypts the information through an asymmetric special algorithm, the information is continuously grouped according to the flow of a corresponding contract encryption module, a finally generated encryption result is grouped on a chain disclosure address, a corresponding pass is generated according to a serial number and a new field, after all the information is completed, the disclosure address is sent to a contract encryption module callback, the contract encryption module verifies after receiving the information, if the output result is correct, the information updating is successful, and the result is displayed outwards; if the output result is incorrect, the update fails, the supervisor is notified while the result is displayed externally, and after the supervisor checks the result, the supervisor waits for the instruction to repeat the step until the output result is correct.
From the above, the information disclosure directed by the science and technology company is directed when the first overt share-up is performed on the chain.
It can be found that in the present application, the decentralization characteristic of the entire blockchain is not destroyed, the disclosure address information on the chain is changed in an environment which accords with decentralization fairness, credibility and transparency, all changes are made to be circulated, and when abnormal changes occur, the quick response and notification of the entire blockchain can be realized;
moreover, the method and the device ensure that only specific crowd with private keys can carry out directional information disclosure, and non-specific crowd can not provide back detailed information, but ensure that the integrity and the authenticity of the disclosure information are confirmed, and the confirmation result is disclosed;
through the method and the device, more operation space can be provided for the supervision of data on a blockchain chain and the information supervision of the uplink in the future.
In addition, for better understanding, based on the embodiments of the present application, a specific implementation application scenario is further provided:
application scenario (1): revealing in-chain sensitive information to specific regulatory populations and in-chain information privacy to non-specific populations
According to the upper-level requirements, after 20XX years, a certain public institution needs to upload own revenue information to an industry block chain of national supervision construction in a fixed time per month for supervision by a supervision department and supervision by people, but other countries can calculate various resident life information of China according to the data of the public institution in consideration of the special nature of the institution, if uploading detailed data on the block chain, a large amount of information can cause unnecessary trouble, but if the design of the industry block chain is directly modified only because of the special nature of the institution, the property of decentric of the block chain is violated, so that the public and trusted property is greatly reduced, and the disclosed revenue data cannot be convinced. Therefore, the current public institution urgently searches for a device which can enable an upper supervision department to check the detailed revenue data information at any time, enable people to know that the data information is checked by the upper supervision department, avoid private tampering before and after checking, and ensure that people only know the information and cannot know the revenue detailed data information so as to prevent unnecessary trouble of information leakage.
The solution is as follows:
binding the under-chain nutritive information with the on-chain public address through the one-way mirror module, generating the encrypted information corresponding to the nutritive information data by using a special encryption algorithm of the one-way mirror module on the on-chain public address, and generating a corresponding private key. When the upper supervision department holds the private key, the information of the public address on the chain can be consulted by reversely decoding the private key through the unidirectional mirror module again, and the real information of the nutrient and receipts can be obtained by decoding the information of the public address on the chain because the public address and the information of the information under the chain are in a binding relation.
Meanwhile, the unidirectional mirror module can conduct random time verification on the under-chain nutritive information and the information of the on-chain public address, and when the fact that the under-chain nutritive information is not matched once the verification is found, the fact that the under-chain nutritive information has the change of unknown reasons is explained, supervision personnel with private keys can be synchronized immediately, and possible risks are prevented.
In addition, for people, the unidirectional mirror module synchronously updates the comparison result of random time verification to the revealed address on the chain for other people without the private key to review, and at the moment, people without the private key can see whether the comparison result is correct or not, but cannot see the detailed information of the revealed address.
The method is formed by a special encryption algorithm and new product logic on the original product logic of the blockchain, and under the condition that the function of the blockchain product is not modified, the characteristics of the decentralization of the blockchain are reserved, and the requirements of directional disclosure and information security are met.
Application scenario (2): timing and fixed point presentation of secret information
The talents in China select examination contents, which are ordered by education institutions, and the contents are stored in a sealed manner after the examination is performed, and the examination is performed by issuing and unsealing before the examination is performed. However, with the continuous development of future electronic technology, online examination will occupy a place in future examination rooms, but online electronic examination is stored from propositions to information preservation and then to steps of issuing and unpacking, which may be subject to technical risks such as network attack, data loss and damage in the network transmission process, and in the process, opportunities for too many non-core personnel or illegal personnel to touch or tamper with data in an improper manner are easily generated, so that the risk of data leakage is caused.
The solution is as follows:
the problem is solved by not only hopefully uploading test question data to a network without losing the test question data, but also having strong attack resistance, ensuring that as few people as possible touch the core test questions, and avoiding the possibility of tampering, so that the test questions can be uploaded to a public blockchain which is regulated or approved by the country, and the unidirectional mirror module is combined, so that the data of the blockchain is prevented from being lost or damaged by the decentralization characteristic of the blockchain, the data of the blockchain can be combined and read only through a private key generated by the unidirectional mirror module, and any action of tampering the original data can lead to decryption failure of the private key due to the arrangement of the unidirectional mirror module, thereby being perceived by a supervisor, and being capable of furthest preventing internal personnel or illegal personnel from touching or tampering the data in an illegal way. And the unidirectional mirror module also supports timing disclosure, and can automatically restore data through a private key according to agreed disclosure data time and synchronize to a designated node on the chain or a related address under the chain.
The foregoing is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art, who is within the scope of the present invention, should make equivalent substitutions or modifications according to the technical scheme of the present invention and the inventive concept thereof, and should be covered by the scope of the present invention.

Claims (7)

1. The unidirectional mirror module comprises a contract encryption module, and is characterized in that the unidirectional mirror module is connected with the contract encryption module and is used for carrying out data statistics, address binding, data encryption transmission, data decryption transmission and data transmission verification on data information to be disclosed, wherein the contract encryption module is used for storing, calculating and setting corresponding encryption and decryption contracts;
the contract encryption module is also used for realizing intelligent contract and asymmetric encryption algorithm with the unidirectional mirror module;
the method comprises the following steps:
s1: the method comprises the steps of importing data to be disclosed into a unidirectional mirror module, counting the information to be disclosed through a contract encryption module of the unidirectional mirror module, encrypting according to the unidirectional mirror module, and encrypting through an asymmetric special algorithm on the disclosed information;
s2: calculating a decimal encryption result according to a contract encryption module of the unidirectional mirror module, and arranging and combining the encryption result;
s3: binding and associating the revealed address with the information to be revealed through the unidirectional mirror module, automatically triggering the corresponding connection between the mark address and the revealed address, encrypting the finally generated decimal number by a contract encryption module in the unidirectional mirror module, grouping the result, and generating a corresponding pass on a blockchain according to the serial number and the field number in the serial number;
s4: after the address is revealed and the corresponding number of pass certificates are generated, the pass certificates are sent to a contract encryption module callback in the unidirectional mirror module, the contract encryption module verifies the result after receiving the information, and result data are produced, wherein:
if the output result is correct, the updating is successful, and the result is displayed outwards;
if the output result is incorrect, the updating fails, and the monitoring personnel is informed immediately when the result is displayed externally, and after the monitoring personnel checks the result, the unidirectional mirror module can be reset, and the step S3 is carried out again;
s5: after the output result is 'correct', after the instruction is successfully completed, the instruction passes through a contract encryption module, and is verified once at random time intervals of 1-86,400 seconds or is verified by manually setting time, and fixed or random check verification is performed at time intervals to prevent the information under the chain from being tampered with endless, wherein:
if the verification result is correct, continuing to wait for the next verification;
if the verification result is wrong, sequentially performing a corresponding wrong result processing mode;
s6: when the detailed information needs to be consulted, the information is decoded through the unidirectional mirror module and the contract encryption module, the decryption result is generalized, and finally the corresponding readable disclosure information content is output.
2. The method of claim 1, wherein in step S1, the encryption process of the one-way mirror module and the contract encryption module is as follows: after counting the property or information on the chain, generating a text file from the counting result in a fixed format, wherein the text file consists of 26 English letters plus digits 0-9.
3. The method for directional disclosure of information on a blockchain of claim 2, wherein the process of converting the encryption result into the private key by the one-way mirror module and the contract encryption module is as follows: the encryption result is finally converted into decimal numbers and a string of private keys for decoding is generated, wherein the private keys are formed by upper and lower English letters plus 0-9 numbers randomly.
4. The method for directional disclosure of information on a blockchain of claim 3, wherein in step S2, the way that the one-way mirror module and the contract encryption module perform permutation and combination on the encryption result is:
calculating the number of bits of the finally converted decimal encryption result, dividing the number of bits by 10 to obtain the required group number, wherein the group number is added with one if the remainder exists;
and randomly generating three to eight English capital letters in each group according to the number of the groups, taking the English capital letters as serial numbers representing the sequence, and inserting the converted decimal encryption result digits into one group every ten digits in sequence, wherein the converted decimal encryption result digits are divided by 10 to form remainder, and the last group only fills in the encryption result of the remainder.
5. The method for directional disclosure of information on a blockchain of claim 4, wherein in step S5, the process of performing error result processing by the unidirectional mirror module and the contract encryption module is as follows: when the verification result is found to be wrong, immediately notifying a supervisor according to the contract encryption module, if the verification result is an asset account, freezing the corresponding transaction authority by using external artificial intelligence, and sending information to a preset supervisor side to prompt warning;
after confirming the reason, if the supervisor finally checks the reason, the supervisor can manually confirm, and after confirming, the supervisor reconfirm the correlation between the disclosure address and the information to be disclosed from the step S3, and sequentially performs the following steps.
6. The method for directional disclosure of information on a blockchain as in claim 5, wherein in step S6, the specific procedures for modifying information and referring to the information processed by the unidirectional mirror module are as follows:
1: providing the one-way mirror module with the requirement of moving and changing, namely providing a prompt to the module in advance to inform the module that information changing is about to be performed instead of providing changed information to the one-way mirror;
2: after receiving the prompt, the unidirectional mirror starts to check the disclosure information with high frequency until the disclosure information is monitored to be changed;
3: the unidirectional mirror stops checking the disclosure information at high frequency and starts to encrypt the received and overlapped information by using an asymmetric special algorithm;
4: after encryption is completed, a new packet is formed according to a contract module, and finally the new packet is sent to an address on a chain to generate a new serial number and a new field digital certificate;
5: generating a pass corresponding to the field number on the chain according to the newly generated serial number, after all the passes are completed, sending the exposed address to a contract encryption module callback, and verifying the contract encryption module after receiving the information, wherein:
if the output result is correct, the result represents that the information is updated successfully and the result is displayed outwards;
if the output result is incorrect, the update fails, the supervision staff is notified while the result is displayed outwards, and after the supervision staff checks the result, the supervision staff waits for the instruction to repeat the step S6;
when the specified user needs to be referred to the real asset information rights: and (3) decrypting the private key generated in the step (S1) through the unidirectional mirror module again by using the private key, and summarizing the decryption result through the contract encryption module, and finally outputting readable corresponding detailed information content.
7. The method of claim 6, wherein the key is set in either a fixed form or randomly dynamically changing every minute, and wherein prior to using either mode, the confirmation and setting is performed prior to step S1.
CN202310237642.2A 2023-03-13 2023-03-13 Directional disclosure method for information on block chain Pending CN117874774A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310237642.2A CN117874774A (en) 2023-03-13 2023-03-13 Directional disclosure method for information on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310237642.2A CN117874774A (en) 2023-03-13 2023-03-13 Directional disclosure method for information on block chain

Publications (1)

Publication Number Publication Date
CN117874774A true CN117874774A (en) 2024-04-12

Family

ID=90588913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310237642.2A Pending CN117874774A (en) 2023-03-13 2023-03-13 Directional disclosure method for information on block chain

Country Status (1)

Country Link
CN (1) CN117874774A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain
US20200193292A1 (en) * 2018-12-04 2020-06-18 Jinan University Auditable privacy protection deep learning platform construction method based on block chain incentive mechanism
CN113468570A (en) * 2021-07-15 2021-10-01 湖北央中巨石信息技术有限公司 Private data sharing method based on intelligent contract
CN114900290A (en) * 2022-03-07 2022-08-12 南京信息工程大学 Data transaction model and privacy protection method based on block chain
CN114900534A (en) * 2022-03-29 2022-08-12 中南大学 Big data supervision method based on block chain technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain
US20200193292A1 (en) * 2018-12-04 2020-06-18 Jinan University Auditable privacy protection deep learning platform construction method based on block chain incentive mechanism
CN113468570A (en) * 2021-07-15 2021-10-01 湖北央中巨石信息技术有限公司 Private data sharing method based on intelligent contract
CN114900290A (en) * 2022-03-07 2022-08-12 南京信息工程大学 Data transaction model and privacy protection method based on block chain
CN114900534A (en) * 2022-03-29 2022-08-12 中南大学 Big data supervision method based on block chain technology

Similar Documents

Publication Publication Date Title
Zhang et al. Research on a covert communication model realized by using smart contracts in blockchain environment
EP3509006B1 (en) Information sharing system
WO2022126967A1 (en) Blockchain-based data supervision method, apparatus and device, and storage medium
CN109409122A (en) File memory method and its electronic equipment, storage medium
CN102779284B (en) RFID (radio frequency identification device) label integrating comprehensive functions such as merchandise anti-counterfeiting, logistics control and the like
Schneier Why cryptography is harder than it looks
CN111835511A (en) Data security transmission method and device, computer equipment and storage medium
CN107301521A (en) Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain
CN109784870B (en) Contract management method, contract management device, computer equipment and computer readable storage medium
WO2018203817A1 (en) Method and system for registering digital documents
CN109447647A (en) A kind of safety payment system based on block chain
JP2007282295A (en) Cryptographic system and method with key escrow feature
NO330006B1 (en) System and method for electronic transmission, storage and recovery of authenticated documents
CN110729028A (en) Health data processing method and device, electronic equipment and storage medium
CN113469716A (en) Product tracing method and system based on block chain and identification analysis
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN110689348A (en) Income verification method, device, terminal and medium based on alliance chain
CN115085934A (en) Contract management method based on block chain and combined key and related equipment
CN107733936A (en) A kind of encryption method of mobile data
CN109889343A (en) Electronic invoice circulation control method and device
CN113111370A (en) Block chain cross-chain communication method
CN117313158A (en) Data processing method and device
CN103647650A (en) Rule definition based automatic signature/signature verification device and method
CN111444416A (en) Method, system and device for popularizing financial business
CN116436708A (en) Trusted data sharing method and system based on blockchain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination