WO2018095275A1 - 一种数据存取的方法、系统及装置 - Google Patents
一种数据存取的方法、系统及装置 Download PDFInfo
- Publication number
- WO2018095275A1 WO2018095275A1 PCT/CN2017/111538 CN2017111538W WO2018095275A1 WO 2018095275 A1 WO2018095275 A1 WO 2018095275A1 CN 2017111538 W CN2017111538 W CN 2017111538W WO 2018095275 A1 WO2018095275 A1 WO 2018095275A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identity identifier
- blockchain
- data
- stored
- storage
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- the present application relates to the field of information technology, and in particular, to a method, system, and device for data access.
- the general solution to the existing data storage technology is to implement data storage by using database technology, that is, to manage one or more devices storing data through a database management center, and to delete and delete the management data through the database management center (Create , Retrieve, Update, Delete, CRUD) operations.
- database technology that is, to manage one or more devices storing data through a database management center, and to delete and delete the management data through the database management center (Create , Retrieve, Update, Delete, CRUD) operations.
- the embodiment of the present application provides a data storage and query method, device, and system, which are used to solve In the existing data storage technology, the operation of acquiring data in multiple databases is complicated and inefficient due to data being stored in different databases that are independent of each other.
- a method of data storage comprising:
- Determining a data storage instruction wherein the data storage instruction carries an identity identifier and data to be stored;
- the data to be stored is stored in the blockchain according to the key pair.
- a method of data query comprising:
- a data access system includes a plurality of storage devices, a plurality of query devices, and a plurality of blockchain storage nodes, wherein:
- the blockchain storage node is configured to store a blockchain corresponding to the identity identifier
- Determining, by the storage device, a data storage instruction determining, according to the identity identifier carried in the data storage instruction, a corresponding blockchain of the identity identifier and a key pair corresponding to the identity identifier, according to the key pair,
- the to-be-stored data is stored in a blockchain corresponding to the identity identifier in the blockchain storage node;
- the data in the block chain node is queried.
- a device for data storage comprising:
- a first determining module determining a data storage instruction, wherein the data storage instruction carries a body Identification and data to be stored;
- a second determining module according to the identity identifier, determining a blockchain corresponding to the identity identifier and a key pair corresponding to the identity identifier;
- a storage module configured to store the to-be-stored data in the blockchain according to the key pair.
- a device for data query comprising a vibration motor and a sensor, comprising:
- a first determining module where the data query instruction is determined, where the data query instruction carries an identity identifier
- a second determining module determining, according to the identity identifier, a blockchain corresponding to the identity identifier and a private key corresponding to the identity identifier;
- the query module decrypts the data in the blockchain according to the private key and queries the data.
- the data storage instruction is first determined, and then the blockchain and the key pair corresponding to the identity identifier are determined according to the identity identifier carried in the data storage instruction, and finally, the data to be stored is stored according to the key pair.
- the data query instruction is first determined, and then the blockchain corresponding to the identity identifier and the private key are determined according to the identity identifier corresponding to the data query instruction, and finally, according to the private key, The data in the blockchain is decrypted and queried.
- FIG. 1 is a process of data storage provided by an embodiment of the present application
- FIG. 3 is a schematic structural diagram of a data access system according to an embodiment of the present application.
- FIG. 4 is a schematic structural diagram of another data access system according to an embodiment of the present application.
- FIG. 5 is a schematic structural diagram of an apparatus for data storage according to an embodiment of the present disclosure.
- FIG. 6 is a schematic structural diagram of another apparatus for data query according to an embodiment of the present disclosure.
- the block of "blockchain” is the basic unit that constitutes the blockchain, and the block can include two parts: one is the block header, and the other is the block body.
- the block header may include at least three aspects of information, that is, identification information of the block (such as HASH value), identification information of the previous block of the block, and time stamp. It is precisely because a block contains the identification information of the previous block that multiple blocks can form a chain, thereby forming a blockchain.
- Blockchain has many good and excellent features, such as decentralization: due to the use of distributed accounting and storage, there is no centralized hardware or management organization, the rights and obligations of any node are equal, and the data blocks in the system are Nodes with maintenance functions in the system are jointly maintained; autonomous: blockchains use consensus-based specifications and protocols (such as a set of transparent and transparent algorithms) to enable all nodes in the entire system to be free and secure in a trusted environment. Exchange data so that trust in "people" is changed to trust in the machine, any human intervention does not work; information cannot be tampered with: once the information is verified and added to the blockchain, it will be stored permanently unless At the same time, more than 51% of the nodes in the system are controlled. Otherwise, the modification of the database on the single node is invalid, so the data stability and reliability of the blockchain are extremely high.
- FIG. 1 is a process of data storage provided by an embodiment of the present application, which specifically includes the following steps:
- a device that performs data storage may store the data to be stored in a specified storage device according to a data storage instruction. For example, when storing data in a database, the device performing data storage may receive according to the data storage device.
- the device here may be a single device or a system composed of multiple devices, which may be a mobile phone, a personal computer, a tablet computer, a server, etc., or other devices, which is not specifically described in this application. limited. Since the embodiment of the present application will further provide a method and an apparatus for data query, for convenience of description (and not for the purpose of limitation), devices that will subsequently perform a data storage process are referred to as storage terminals.
- the data storage instruction can be determined by the storage terminal.
- the source of the data storage instruction may be generated by the storage terminal or may be received by the storage terminal.
- the data storage instruction is not limited in this application, as long as the storage terminal can determine The data storage instruction is sufficient.
- the embodiment of the present application can carry the identity identifier and the data to be stored. That is, when determining the data storage instruction, the storage terminal may determine an identity identifier carried by the data storage instruction and data to be stored for which the data storage instruction needs to perform a storage operation.
- the identity identifier may be a citizen's ID number, an account identifier, a mailbox identifier, etc., as long as the identity identifier is a globally unique identifier, the application does not specifically limit this, of course, in order to facilitate subsequent description, the following identity
- the identification number of the citizen is described as an example.
- S102 Determine, according to the identity identifier, a blockchain corresponding to the identity identifier and a key pair corresponding to the identity identifier.
- the storage terminal may further determine the identity identifier carried by the data storage instruction and the data to be stored, so the storage terminal may further determine according to the identity identifier.
- the blockchain corresponding to the identity and the identity The corresponding key pair.
- the to-be-stored data determined in step S101 is stored in the blockchain.
- the “blockchain corresponding to the identity identifier” indicates the relationship between the identity identifier and the blockchain.
- the identity identifier may be represented by at least two types according to its nature: a subject-discipline-type identity identifier and a transaction-differentiation-type identity identifier, and different types of identity identifiers may have different blockchains.
- different subjects for example, natural person A, natural person B
- different transactions for example, registration of books, aggregation activities
- Personal files usually include a variety of information from different government departments or related agencies.
- the file information may include household registration information formed by the public security organ to record A's household registration, and the civil affairs department.
- these pieces of information are formed at different times, and they can be stored in a blockchain by blockchain technology.
- this blockchain is a blockchain exclusive to (corresponding to) natural person A.
- natural B there may be a blockchain that stores the profile of B, and so on, and may have other massive blockchains formed by the identity of natural persons.
- the first person who initiated the purchase of Book B sent the serial number and name to the WeChat group, and so on, forming a blockchain (block) for purchasing Book B.
- Chain B the person who needs to add information to the chain needs to find the corresponding blockchain. For example, the person who purchases the book A needs to find the blockchain A. The person who buys Book B needs to find the blockchain B.
- the blockchain corresponding to the identity identifier may be a federated blockchain, that is, not all terminals have the right to perform data storage operations on the blockchain, and only the designated terminal has the right
- the blockchain performs the operation permission of the data storage to ensure the data security and the authenticity of the data in the blockchain when the data is stored.
- the blockchain may also be The nature of public and private chains. It should be noted that how to specify the terminal in the actual process is related to factors such as the nature of the blockchain, and the present application is not specifically limited.
- the blockchain is an alliance blockchain, and the designated terminal can be determined by the alliance.
- the storage terminal that performs step S101, step S102, and subsequent data storage processes may be the designated terminal, that is, the terminal that has the authority to perform data storage on the blockchain. ).
- the storage terminal may determine, according to the identity identifier determined in step S101, and the correspondence between the pre-stored identity identifier, the key pair, and the blockchain, whether the identity exists in the blockchain storage node.
- the corresponding blockchain is identified. If there are multiple blockchain storage nodes, the blockchain corresponding to the identity identifier may be determined by searching in at least one of the blockchain storage nodes.
- the correspondence between the identity identifier and the blockchain may be stored in the storage terminal, or may be stored in each node in the network formed by the blockchain storage node, or even stored in a third-party device, in practice, Where is the specific situation, can be based on the convenience of reading, reading speed, security and other angles Line considerations.
- storing the correspondence between the identity identifier and the blockchain locally in the storage terminal may be more convenient for reading and writing.
- the storage location can also be selected according to the actual situation.
- the blockchain storage node and the storage terminal may be the same device or different devices, which is not specifically limited in this application.
- a node fails (for example, downtime, data loss, etc.), it can continue to work by any other blockchain storage node that does not fail, and can store data stored in the node according to the blockchain without failure (ie, , the data stored in the blockchain), repairing the failed blockchain storage node.
- the key pair corresponding to the identity identifier may be further determined; if there is no block corresponding to the identity identifier
- the chain generates a blockchain corresponding to the identity and a key pair corresponding to the identity. in particular:
- the storage terminal may be a designated storage terminal, and the storage terminal may further store the key pair corresponding to the identity identifier in advance, and the storage terminal may determine The blockchain corresponding to the identity identifier and a key pair corresponding to the identity identifier.
- the determined blockchain stores an encrypted data packet corresponding to the identity identifier
- the key pair is used to decrypt and encrypt the encrypted data packet corresponding to the identity identifier
- the storage terminal determines the blockchain and The key pair can continue the subsequent data storage process.
- the storage terminal may send a request for acquiring a key pair corresponding to the identity identifier to another designated device when determining the key pair, where The request may carry the identifier of the storage terminal, so that the other designated device determines that the storage terminal also belongs to the designated device, has the right to acquire the key pair, and returns the key pair to enable the storage terminal to obtain the key. Correct. It should be noted that, when determining the key pair, the storage terminal may adopt different methods according to the needs of the actual application, which is not specifically limited in this application.
- the storage terminal may generate the identity tag Identifying a corresponding blockchain and a key pair corresponding to the identity, wherein the generated blockchain is used to store data corresponding to the identity, and in order to ensure data security, the data may be packaged and encrypted.
- the key pair may be used to enable the designated device to store data in the blockchain, that is, the secret
- the key pair can be used to decrypt and encrypt the encrypted data packet corresponding to the identity, so that the designated device can store data in the blockchain.
- S103 Store the to-be-stored data in the blockchain according to the key pair.
- the storage terminal may store the data to be stored carried in the data storage instruction. In the blockchain to complete the data storage process.
- step S102 since the storage terminal determines that there is a difference between the blockchain and the key pair in step S102, the following describes the two situations separately:
- Scenario 1 When the storage terminal determines through judgment that the blockchain corresponding to the identity identifier exists, the storage terminal may first call the blockchain storage node from the blockchain corresponding to the identity identifier. Encrypting the data packet, and then the storage terminal may decrypt the encrypted data packet according to the private key in the key pair to obtain all data corresponding to the identity identifier in the encrypted data packet, and then the storage terminal may Updating all the data according to the to-be-stored data to obtain update data corresponding to the identity identifier.
- the storage terminal may encrypt the update data by using a public key in the key pair, as an update encrypted data packet, and After the timestamp is added to the updated encrypted data packet, the blockchain is stored in the blockchain, and the blockchain storing the updated encrypted data packet and the timestamp is stored in the blockchain storage node.
- the blockchain storage node may store other blockchains of the blockchain broadcast. In the node, so that the blockchains stored in all the blockchain storage nodes are consistent.
- Case 2 When the storage terminal is determined to determine that the blockchain corresponding to the identity identifier does not exist The storage terminal may generate a blockchain corresponding to the identity identifier and a key pair corresponding to the identity identifier, where the storage terminal may first generate initial data corresponding to the identity identifier according to the identity identifier, and then And updating the initial data as the update data, and then generating the key pair corresponding to the identity identifier, and encrypting the update data by using the public key of the key pair as the encryption corresponding to the identity identifier. a data packet, and finally, generating the blockchain corresponding to the identity identifier, storing the encrypted data packet in the blockchain, and storing the blockchain storing the updated encrypted data packet in a blockchain storage In the node.
- the initial data of the identity identifier specifically includes the data.
- the application is not specifically limited, and may be determined according to actual needs.
- the to-be-stored data is stored in the data block in the blockchain that is generated at the latest time.
- the storage terminal may be based on each data in the blockchain.
- the generation time of the block determines the data block with the latest generation time, and since a plurality of encrypted data packets corresponding to the identity identifier can be stored in one data block, the storage terminal can also be based on each encrypted data in the present application.
- the timestamp carried by the packet determines the encrypted data packet with the latest storage time as the encrypted data packet corresponding to the identity identifier.
- the storage terminal may include the encrypted data packet stored in the blockchain after the storage terminal stores the data to be stored, and the encrypted data packet corresponding to the identity identifier is updated. All the data corresponding to the identity identifier, that is, all the data corresponding to the identity identifier is included in each encrypted data packet, so that when the encrypted data packet is called according to the time stamp, the device that invokes the encrypted data packet can obtain The identity corresponds to all the data without having to call other data.
- the storage terminal may further send the key pair and the identity identifier to each preset device, where the preset device.
- the storage terminal may send the key pair and the identity identifier to each device according to the address of each device set in advance, where the preset device may be each designated device, that is, the device has A device that performs the right to store data in the blockchain corresponding to the identity.
- the blockchain is stored in the blockchain storage node, where Any of the blockchain storage nodes may be a system of one device or multiple devices and used to store the blockchain.
- An encrypted data packet corresponding to the identity identifier is stored in the blockchain, and the blockchain is stored in different blockchain storage nodes, and the blockchain in the different blockchain storage nodes is consistent.
- the blockchain is not the same concept as the blockchain storage node and needs to be understood differently.
- the data to be stored is stored in the blockchain corresponding to the identity identifier by using the data storage method as shown in FIG. 1, so that all data corresponding to the identity identifier can be stored in the data chain, thereby avoiding the identity.
- the steps of repeatedly calling data are needed, which improves the efficiency of data storage and data query.
- the designated storage terminal has the right to store the data corresponding to the identity identifier, and any operation based on the characteristics of the blockchain technology on the data corresponding to the identity identifier Both are recorded in the blockchain, so that the security of the data corresponding to the identity is guaranteed, and the possibility of tracing the change of the data corresponding to the identity is provided.
- the storage terminal may determine the key pair corresponding to the identity identifier in step S102, so that the storage terminal may decrypt the encrypted data packet corresponding to the identity identifier that is invoked, and obtain all data corresponding to the identity identifier. And the storage terminal further needs to encrypt the update data according to the key, so that the encrypted data packet corresponding to the identity identifier is stored in the blockchain, so that only the key pair corresponding to the identity identifier is owned.
- the storage terminal can store the data in the blockchain, and in the present application, only the designated device can obtain the key pair, thereby ensuring the security of the data in the blockchain.
- the encrypted data packet in the blockchain may only be called and determined. Only the data encrypted by the private key in the key pair is trusted and secure.
- the identity identifier may correspond to basic data (eg, user attribute, user type, etc.), or may correspond to account data (eg, account balance, account) Types, etc., may also correspond to operational habits (eg, historical behavior data, etc.), and the basic data may be maintained by a device responsible for the basic information corresponding to the identity (eg, a user center), and the account data may be responsible for The billing device is maintained, and the operating habit data can be maintained by the advertisement pushing device. That is to say, in the present application, different devices can maintain different types of data corresponding to the identity identifier.
- different key pairs may be assigned to different designated devices in the alliance blockchain, where different key pairs have the same private key, and are used to decrypt the encrypted data packet corresponding to the identity identifier.
- different key pairs have different public keys, and different public keys can only encrypt data of a specified type, so that devices with different key pairs can only store data of a specified type.
- the configuration of the key pair can be determined by a staff member, and the specific configuration is not described in this application. As long as the key pair is used, different devices have the right to encrypt data of different types of data.
- device A, device B, and device C respectively have different key pairs X, Y, and Z, and the key pairs X, Y, and Z can be of the x, y, and z types in all data corresponding to the identity a.
- the data is encrypted as shown in Table 1.
- the data of the x, y, and z types includes all the data corresponding to the identity a, and the different keys are used, so that the devices A, B, and C can only perform part of the data corresponding to the identity a.
- Storage improves the security of data storage and reduces the chance of misoperation of the data corresponding to the identity.
- step S101 and steps The execution body of S102 may be device 1, and the execution body of step S103 may be device 2; for example, the execution body of step S101 may be device 1, the execution body of step S102 and step S103 may be device 2;
- the embodiment of the present application further provides a data query method, as shown in FIG. 2 .
- FIG. 2 is a process of data query according to an embodiment of the present disclosure, which specifically includes the following steps:
- the data query instruction may be determined by the terminal, and the subsequent data query process may be continued, where the terminal may be a mobile phone, a tablet computer, a personal computer, a server, etc., and the terminal may be a single device. It may also be a system composed of multiple devices, which is not specifically limited in this application.
- the data query instruction may carry an identity identifier for determining a blockchain when the data is subsequently determined.
- the data query instruction may be generated and determined by the terminal.
- the terminal may also receive the data query instruction and determine the data query instruction, and the application does not limit how the data query instruction is generated. As long as the terminal can determine the data query command.
- the execution subject ie, the terminal
- the terminal that performs the data query process is represented by the query terminal, and the terminal that the storage terminal indicates to execute the data storage process.
- S202 Determine, according to the identity identifier, a blockchain corresponding to the identity identifier and a private key corresponding to the identity identifier.
- the query terminal only needs to query the data corresponding to the identity identifier, so the query terminal may determine, according to the identity identifier, a blockchain corresponding to the identity identifier and a private key corresponding to the identity identifier.
- the query terminal may be based on the pre-stored identity identifier
- the private key is determined corresponding to the private key of the key pair.
- the query terminal may further send a request for acquiring a private key to the designated terminal (that is, the foregoing storage terminal) described in FIG. Receive the returned private key.
- the request for obtaining the private key may carry the device identifier of the query terminal and the identity identifier, so that the storage terminal may determine the private key in the key pair according to the identity identifier, and determine the private identity by using the device identifier.
- the key is returned to the query device.
- the data corresponding to the identity identifier is stored in the blockchain corresponding to the identity identifier.
- the query terminal may further determine the identity identifier by using the blockchain storage node according to the identity identifier. Corresponding blockchain to continue subsequent data query operations.
- the query terminal may search for a blockchain corresponding to the identity identifier in the blockchain storage node according to the identity identifier, and determine the blockchain, of course, if in the blockchain storage node When the blockchain corresponding to the identity is not found, the query terminal can throw an error and display the information of the query error.
- S203 Decrypt the data in the blockchain according to the private key and perform a query.
- the data may be queried according to the determined blockchain corresponding to the identity identifier and the private key.
- the query terminal may first determine, from the blockchain storage node, each encrypted data packet corresponding to the identity identifier in the blockchain, and according to the chronological order of each encrypted data packet (ie, according to each encryption) The chronological order of the timestamp carried in the data packet, determining the most recently stored encrypted data packet as the encrypted data packet corresponding to the identity identifier, and after extracting the encrypted data packet corresponding to the identity identifier, according to the private key, The encrypted data packet is decrypted to obtain all the data corresponding to the identity identifier, and finally the data query is performed on all the data according to the data query instruction.
- the queried terminal can only decrypt the encrypted data packet corresponding to the identity identifier, but cannot encrypt the queried terminal, and the queried terminal cannot be corresponding to the identity identifier.
- the terminal may first determine a generation time of each data block in the blockchain, and generate data from the latest generation time.
- Each encrypted data packet is determined in the block, that is, it is determined that each encrypted data packet is stored in the data block with the latest generation time in the blockchain, and the subsequent operations are continued.
- the execution bodies of the steps of the method provided by the embodiment of the present application may all be the same device, or the method may also be performed by different devices.
- the execution subject of step S201 and step S202 may be device 1
- the execution subject of step S203 may be device 2
- the execution subject of step S201 may be device 1
- the execution subject of step S202 and step S203 may be device 2 ;and many more.
- a data access system is also provided in the embodiment of the present application, as shown in FIG. 3.
- FIG. 3 is a schematic structural diagram of a data access system according to an embodiment of the present disclosure.
- the data access system includes: a plurality of storage devices, a plurality of query devices, and a plurality of blockchain storage nodes, wherein:
- the blockchain storage node is configured to store a blockchain corresponding to the identity identifier
- the storage device determines a data storage instruction, and determines, according to the identity identifier carried in the data storage instruction, a corresponding blockchain of the identity identifier and a corresponding identifier of the identity identifier.
- the key pair stores the data to be stored in the blockchain corresponding to the identity identifier in the blockchain storage node according to the key pair.
- the querying device determines a data query instruction, and determines, according to the identity identifier carried in the data query instruction, a corresponding blockchain of the identity identifier and a corresponding identifier of the identity identifier.
- the private key decrypts the data in the blockchain node through the private key and performs a query.
- the storage device that generates the identity identifier may send the identity identifier and the key pair corresponding to the identity identifier. To the specified other storage device. And the storage device that generates the identity identifier may generate the blockchain in only one blockchain storage node, and the blockchain storage node may store the data The other blockchain storage nodes in the system broadcast the blockchain to keep the data in all blockchain storage nodes in the data access system consistent.
- the data querying device may send a request for acquiring the private key to any of the storage devices to obtain the private key, and perform a subsequent data query operation.
- the key pairs corresponding to the identity identifiers stored in advance may not be identical, and different key pairs may be used to encrypt different types of data.
- any device can obtain the encrypted data packet corresponding to the identity identifier, and decrypt and obtain the data corresponding to the identity identifier, so in order to ensure the security of the data in the blockchain.
- the storage device ie, the device specified by the federation blockchain
- the blockchain storage node stores The encrypted data is the trusted data.
- the data query device and the storage device obtain the data corresponding to the identity identifier through the blockchain storage node, and only the encrypted data in the blockchain storage node can be obtained. package.
- each blockchain storage node may be used in each blockchain storage node for each storage device. And each data query device accesses, other blockchain storage nodes may be standby nodes, and when the blockchain storage node fails to work normally, select any spare blockchain storage node to continue working, and pass any The spare blockchain storage node recovers the blockchain storage node that is not working properly.
- the blockchain storage node and the storage device may be the same, that is, each blockchain storage node is also a storage device, or when in the data access system
- each blockchain storage node is also a storage device
- some of the blockchain storage nodes in the blockchain storage nodes are also storage devices, and the remaining blockchain storage nodes are only blocks.
- the chain storage node, or some storage devices in all storage devices are also blockchain storage nodes, and the remaining storage devices are only storage devices.
- the identity identifier may be a citizen's ID number
- the storage device may be a data storage device of a credible unit such as a government agency or a government unit
- the data query device may be a society. Any device that needs to perform data query, as shown in Figure 4.
- the data access can be as shown in FIG. 4.
- the blockchain storage node may be a data storage node provided by the government, and all data corresponding to the citizen ID number may be the citizen's archive data, credit data, bank account data, etc., of course, any The citizen-related data can be written into the blockchain corresponding to the citizen ID number.
- the data storage device of the credible unit such as different government agencies and government units may be used to store different types of data in the blockchain corresponding to the citizen ID card.
- the public security bureau may The citizen's criminal record, account information, etc. perform data storage operations
- the civil affairs department may perform data storage operations on the citizen's marital status
- the bank may perform data storage operations on the citizen's account data and credit data, etc.
- the specific process may be This is achieved by different key pairs as described in step S102 and in FIG.
- the data query device may be a device held by the citizen, or may be a data query device of other public and private organizations.
- the visa approval department may send a request for calling a private key to the above government agency or government unit.
- the storage device may be a storage device corresponding to a plurality of companies or units having a federation relationship, for example, a storage device corresponding to a car rental company, a bank, a traffic authority, and the like, respectively.
- the inquiry device may be a terminal held by the driver or a terminal held by the traffic police. Then, since all the data corresponding to the citizen can be stored in the blockchain, there is no need to establish a special inquiry system, and the data access system as shown in FIG. 4 can conveniently check the vehicles and drivers on the road. .
- the embodiment of the present application further provides a device for data storage, as shown in FIG. 5 .
- FIG. 5 is a schematic structural diagram of an apparatus for data storage according to an embodiment of the present disclosure, including:
- the first determining module 301 is configured to determine a data storage instruction, where the data storage instruction carries an identity identifier and data to be stored;
- the second determining module 302 determines, according to the identity identifier, a blockchain corresponding to the identity identifier and a key pair corresponding to the identity identifier;
- the storage module 303 stores the to-be-stored data in the blockchain according to the key pair.
- the storage module 303 stores the to-be-stored data in a data block in the blockchain to generate the latest time.
- the second determining module 302 determines, according to the pre-stored identity identifier, the key pair, and the corresponding relationship of the blockchain, whether the blockchain storage node has a blockchain corresponding to the identity identifier. If yes, determining, by the blockchain storage node, a blockchain corresponding to the identity identifier and a key pair corresponding to the identity identifier, and if not, generating a blockchain corresponding to the identity identifier And a key pair corresponding to the identity.
- the storage module 303 invokes the blockchain corresponding to the identity identifier.
- Encrypting the data packet decrypting the encrypted data packet by using a private key of the key pair, obtaining all data corresponding to the identity identifier in the encrypted data packet, and updating the data according to the to-be-stored data packet
- the packet is time stamped and stored in the blockchain, and the blockchain storing the updated encrypted data packet and time stamp is stored in the blockchain storage node.
- the storage module 303 When the second determining module 302 determines that there is a blockchain corresponding to the identity identifier, the storage module 303 generates initial data corresponding to the identity identifier according to the identity identifier, according to the to-be-stored data. And updating the initial data as the update data, generating the key pair corresponding to the identity identifier, and encrypting the update data by using a public key of the key pair, as the encryption corresponding to the identity identifier And generating, by the data packet, the blockchain corresponding to the identity identifier, and storing the encrypted data packet in the blockchain, where the blockchain storing the updated encrypted data packet and a timestamp is stored Stored in the blockchain storage node.
- the second determining module 302 sends the key pair corresponding to the identity identifier and the identity identifier to each preset device.
- the device for storing data as shown in FIG. 5 may be located in a terminal, the terminal may be a device such as a mobile phone or a tablet computer, or the device for storing the data may be located in a server, and the server may be a separate device.
- the terminal may be a device such as a mobile phone or a tablet computer
- the device for storing the data may be located in a server
- the server may be a separate device.
- the embodiment of the present application further provides a device for querying data, as shown in FIG. 6.
- FIG. 6 is a schematic structural diagram of another apparatus for querying data according to an embodiment of the present disclosure, including:
- the first determining module 401 is configured to determine a data query instruction, where the data query instruction carries an identity identifier
- the second determining module 402 determines, according to the identity identifier, a blockchain corresponding to the identity identifier and a private key corresponding to the identity identifier;
- the query module 403 decrypts the data in the blockchain according to the private key and performs a query.
- the second determining module 402 determines the private key according to the pre-stored correspondence between the identity identifier and the private key of the key pair, or sends the identifier to the designated device according to the identity identifier.
- the private key request is taken and the returned private key is received.
- the query module 403 determines, from the blockchain storage node, each encrypted data packet corresponding to the identity identifier in the blockchain, and determines the most recently stored encrypted data according to the chronological order of the stored encrypted data packets.
- the packet is used as an encrypted data packet corresponding to the identity identifier, and the encrypted data packet is decrypted according to the private key and then queried.
- the device for querying data as shown in FIG. 6 may be located in a terminal, and the terminal may be a device such as a mobile phone or a tablet computer, or the device for storing the data may be located in a server, and the server may be a separate device.
- the terminal may be a device such as a mobile phone or a tablet computer, or the device for storing the data may be located in a server, and the server may be a separate device.
- embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
- processors CPUs
- input/output interfaces network interfaces
- memory volatile and non-volatile memory
- the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
- RAM random access memory
- ROM read only memory
- Memory is an example of a computer readable medium.
- Computer readable media includes both permanent and non-persistent, removable and non-removable media.
- Information storage can be implemented by any method or technology.
- the information can be computer readable instructions, data structures, modules of programs, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
- computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
- embodiments of the present application can be provided as a method, system, or computer program product.
- the present application can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment in combination of software and hardware.
- the application may employ calculations in one or more of them
- the computer usable program code may be in the form of a computer program product embodied on a storage medium (including but not limited to disk storage, CD-ROM, optical storage, etc.).
Abstract
Description
设备 | 密钥对 | 数据类型 |
设备A | 密钥对X | x类型数据 |
设备B | 密钥对Y | y类型数据 |
设备C | 密钥对Z | z类型数据 |
Claims (20)
- 一种数据存储的方法,其特征在于,所述方法包括:确定数据存储指令,所述数据存储指令中携带有身份标识和待存储数据;根据所述身份标识,确定所述身份标识对应的区块链以及所述身份标识对应的密钥对;根据所述密钥对,将所述待存储数据存储在所述区块链中。
- 如权利要求1所述的方法,其特征在于,将所述待存储数据存储在所述区块链中,具体包括:将所述待存储数据存储在所述区块链中生成时间最晚的数据块中。
- 如权利要求1所述的方法,其特征在于,确定所述身份标识对应的区块链以及与所述身份标识对应的密钥对,具体包括:根据预先存储的所述身份标识、所述密钥对以及所述区块链的对应关系,判断区块链存储节点是否存在与所述身份标识对应的区块链;若是,则在区块链存储节点中,确定与所述身份标识对应的区块链以及与所述身份标识对应的密钥对;若否,则生成与所述身份标识对应的区块链以及与所述身份标识对应的密钥对。
- 如权利要求3所述的方法,其特征在于,当确定存在与所述身份标识对应的区块链时,根据所述密钥对,将所述待存储数据存储在所述区块链中,具体包括:从区块链存储节点中,调用所述区块链中与所述身份标识对应的加密数据包;通过所述密钥对的私钥,对所述加密数据包进行解密,获得所述加密数据包中与所述身份标识对应的所有数据;根据所述待存储数据更新所述加密数据包中与所述身份标识对应的所有 数据,以获得更新数据;通过所述密钥对的公钥,对所述更新数据进行加密,作为更新加密数据包;为所述更新加密数据包添加时间戳,并存储在所述区块链中;将存储有所述更新加密数据包和时间戳的所述区块链存储到区块链存储节点中。
- 如权利要求3所述的方法,其特征在于,当确定不存在与所述身份标识对应的区块链时,根据所述密钥对,将所述待存储数据存储在所述区块链中,具体包括:根据所述身份标识,生成所述身份标识对应的初始数据;根据所述待存储数据,更新所述初始数据,作为更新数据;生成所述身份标识对应的所述密钥对,并使用所述密钥对的公钥对所述更新数据进行加密,作为所述身份标识对应的加密数据包;生成所述身份标识对应的所述区块链,并将所述加密数据包存储在所述区块链中;将存储有所述更新加密数据包的所述区块链存储到区块链存储节点中。
- 如权利要求3所述方法,其特征在于,生成所述身份标识对应的所述密钥对,具体包括:将生成所述身份标识对应的所述密钥对以及所述身份标识发送至各预设的设备。
- 一种数据查询方法,其特征在于,包括:确定数据查询指令,其中,所述数据查询指令中携带有身份标识;根据所述身份标识,确定所述身份标识对应的区块链以及所述身份标识对应的私钥;根据所述私钥,将所述区块链中的数据解密后进行查询。
- 如权利要求7所述的方法,其特征在于,根据所述身份标识,确定对应密钥对的私钥,具体包括:根据所述预先存储的所述身份标识与所述密钥对的私钥的对应关系,确定所述私钥;或者根据所述身份标识向指定设备发送获取私钥请求,并接收返回的所述私钥。
- 如权利要求7所述的方法,其特征在于,根据所述私钥,将所述区块链中的数据解密后进行查询,具体包括:从区块链存储节点中,确定所述区块链中与所述身份标识对应的各加密数据包;根据各加密数据包存储的时间先后顺序,确定最近存储的加密数据包,作为与所述身份标识对应的加密数据包;根据所述私钥,将所述加密数据包进行解密后查询。
- 一种数据存取的系统,其特征在于,所述系统包括:若干存储设备、若干查询设备以及若干区块链存储节点,其中:所述区块链存储节点,用于存储身份标识对应的区块链;所述存储设备,确定数据存储指令,根据所述数据存储指令中携带的身份标识,确定所述身份标识对应区块链以及所述身份标识对应的密钥对,根据所述密钥对,将待存储数据存储在所述区块链存储节点中与所述身份标识对应的区块链中;所述查询设备,确定数据查询指令,根据所述数据查询指令中携带的身份标识,确定所述身份标识对应区块链以及所述身份标识对应的私钥,通过所述私钥解密所述区块链节点中的数据,并进行查询。
- 如权利要求10所述的系统,其特征在于,任一所述存储设备,生成所述身份标识对应的区块链时,将生成所述身份标识对应的所述密钥对以及所述身份标识发送至指定的各所述存储设备。
- 如权利要求11所述系统,其特征在于,任一所述查询设备,根据所述预先存储的所述身份标识与所述密钥对的私钥的对应关系,确定所述私钥; 或者根据所述身份标识向所述存储设备发送获取私钥请求,并接收返回的所述私钥。
- 一种数据存储的装置,其特征在于,包括:第一确定模块,确定数据存储指令,其中,所述数据存储指令中携带有身份标识和待存储数据;第二确定模块,根据所述身份标识,确定所述身份标识对应的区块链以及所述身份标识对应的密钥对;存储模块,根据所述密钥对,将所述待存储数据存储在所述区块链中。
- 如权利要求13所述的装置,其特征在于,所述存储模块,将所述待存储数据存储在所述区块链中生成时间最晚的数据块中。
- 如权利要求13所述的装置,其特征在于,所述第二确定模块,根据预先存储的所述身份标识、所述密钥对以及所述区块链的对应关系,判断区块链存储节点是否存在与所述身份标识对应的区块链,若是,则在区块链存储节点中,确定与所述身份标识对应的区块链以及与所述身份标识对应的密钥对,若否,则生成与所述身份标识对应的区块链以及与所述身份标识对应的密钥对。
- 如权利要求15所述的装置,其特征在于,当所述第二确定模块确定存在与所述身份标识对应的区块链时,所述存储模块,根据所述身份标识,生成所述身份标识对应的初始数据,根据所述待存储数据,更新所述初始数据,作为更新数据,生成所述身份标识对应的所述密钥对,并使用所述密钥对的公钥对所述更新数据进行加密,作为所述身份标识对应的加密数据包,生成所述身份标识对应的所述区块链,并将所述加密数据包存储在所述区块链中,将存储有所述更新加密数据包和时间戳的所述区块链存储到区块链存储节点中。
- 如权利要求15所述的装置,其特征在于,所述第二确定模块,将生成所述身份标识对应的所述密钥对以及所述身份标识发送至各预设的设备。
- 一种数据查询装置,其特征在于,包括:第一确定模块,确定数据查询指令,其中,所述数据查询指令中携带有身份标识;第二确定模块,根据所述身份标识,确定所述身份标识对应的区块链以及所述身份标识对应的私钥;查询模块,根据所述私钥,将所述区块链中的数据解密后进行查询。
- 如权利要求18所述的装置,其特征在于,所述第二确定模块,根据所述预先存储的所述身份标识与所述密钥对的私钥的对应关系,确定所述私钥,或者根据所述身份标识向指定设备发送获取私钥请求,并接收返回的所述私钥。
- 如权利要求18所述的装置,其特征在于,所述查询模块,从区块链存储节点中,确定所述区块链中与所述身份标识对应的各加密数据包,根据各加密数据包存储的时间先后顺序,确定最近存储的加密数据包,作为与所述身份标识对应的加密数据包,根据所述私钥,将所述加密数据包进行解密后查询。
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ES17873246T ES2809170T3 (es) | 2016-11-24 | 2017-11-17 | Método, sistema y aparato para el acceso a datos |
EP17873246.7A EP3547198B1 (en) | 2016-11-24 | 2017-11-17 | Method, system and apparatus for data access |
JP2019528138A JP6880188B2 (ja) | 2016-11-24 | 2017-11-17 | データアクセスのための方法、システム、および装置 |
PL17873246T PL3547198T3 (pl) | 2016-11-24 | 2017-11-17 | Sposób, system i aparat dostępu do danych |
KR1020197018096A KR102155462B1 (ko) | 2016-11-24 | 2017-11-17 | 데이터 액세스를 위한 방법, 시스템 및 장치 |
US16/422,641 US10536265B2 (en) | 2016-11-24 | 2019-05-24 | Method, system and apparatus for data storage and data access |
US16/656,990 US10938550B2 (en) | 2016-11-24 | 2019-10-18 | Method, system and apparatus for data storage and data access |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611050311.4A CN106991334B (zh) | 2016-11-24 | 2016-11-24 | 一种数据存取的方法、系统及装置 |
CN201611050311.4 | 2016-11-24 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/422,641 Continuation US10536265B2 (en) | 2016-11-24 | 2019-05-24 | Method, system and apparatus for data storage and data access |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018095275A1 true WO2018095275A1 (zh) | 2018-05-31 |
Family
ID=59414265
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/111538 WO2018095275A1 (zh) | 2016-11-24 | 2017-11-17 | 一种数据存取的方法、系统及装置 |
Country Status (10)
Country | Link |
---|---|
US (2) | US10536265B2 (zh) |
EP (1) | EP3547198B1 (zh) |
JP (1) | JP6880188B2 (zh) |
KR (1) | KR102155462B1 (zh) |
CN (1) | CN106991334B (zh) |
ES (1) | ES2809170T3 (zh) |
PL (1) | PL3547198T3 (zh) |
SG (1) | SG10202100217PA (zh) |
TW (1) | TWI701572B (zh) |
WO (1) | WO2018095275A1 (zh) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110084690A (zh) * | 2019-03-18 | 2019-08-02 | 深圳壹账通智能科技有限公司 | 数据处理方法、装置、计算机装置及存储介质 |
CN110597840A (zh) * | 2019-09-26 | 2019-12-20 | 腾讯科技(深圳)有限公司 | 基于区块链的伴侣关系建立方法、装置、设备及存储介质 |
JP2020502861A (ja) * | 2018-11-27 | 2020-01-23 | アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited | コンソーシアムブロックチェーンネットワーク内の非対称鍵管理 |
CN111125187A (zh) * | 2019-11-29 | 2020-05-08 | 立旃(上海)科技有限公司 | 基于区块链的数据管理方法及装置 |
WO2021024717A1 (ja) * | 2019-08-06 | 2021-02-11 | ソニー株式会社 | 情報処理装置、情報処理方法及びプログラム |
Families Citing this family (95)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106991334B (zh) | 2016-11-24 | 2021-03-02 | 创新先进技术有限公司 | 一种数据存取的方法、系统及装置 |
US11631077B2 (en) * | 2017-01-17 | 2023-04-18 | HashLynx Inc. | System for facilitating secure electronic communications between entities and processing resource transfers |
CN107451175B (zh) * | 2017-05-23 | 2020-01-31 | 创新先进技术有限公司 | 一种基于区块链的数据处理方法及设备 |
CN107562775B (zh) * | 2017-07-14 | 2020-04-24 | 创新先进技术有限公司 | 一种基于区块链的数据处理方法及设备 |
US11093924B2 (en) * | 2017-07-31 | 2021-08-17 | Mastercard International Incorporated | Method and system for verification of device authenticity |
CN107241360B (zh) * | 2017-08-04 | 2019-01-18 | 北京明朝万达科技股份有限公司 | 一种数据安全共享交换方法和数据安全共享交换平台系统 |
CN107767478B (zh) * | 2017-09-06 | 2020-10-16 | 阿里巴巴集团控股有限公司 | 一种保存工作记录的方法及装置 |
CN107786639A (zh) * | 2017-09-28 | 2018-03-09 | 山东鲁能智能技术有限公司 | 一种基于区块链技术的电动汽车车联网系统及其工作方法 |
CN107862215B (zh) * | 2017-09-29 | 2020-10-16 | 创新先进技术有限公司 | 一种数据存储方法、数据查询方法及装置 |
CN109656882A (zh) * | 2017-10-10 | 2019-04-19 | 上海能链众合科技有限公司 | 数据记录方法、提取方法及装置、存储介质、终端 |
CN107907636A (zh) * | 2017-10-30 | 2018-04-13 | 深圳市世和丹利投资管理有限公司 | 农药残留物的检测结果管理系统及其检测结果管理方法 |
CN107945312A (zh) * | 2017-10-31 | 2018-04-20 | 深圳市轱辘车联数据技术有限公司 | 一种车辆检测方法及其设备 |
CN110019516B (zh) | 2017-11-10 | 2021-08-20 | 华为技术有限公司 | 一种信息管理方法、装置及系统 |
CN109784084B (zh) * | 2017-11-14 | 2022-03-22 | 中国电信股份有限公司 | 数据交易方法、装置和系统 |
CN110019463A (zh) * | 2017-11-22 | 2019-07-16 | 南京理工大学 | 一种多方共享的数据存储查询方法和系统 |
CN109903676A (zh) * | 2017-12-08 | 2019-06-18 | 上海仪电(集团)有限公司中央研究院 | 一种基于智能合约的广告牌及路灯 |
CN108023894B (zh) * | 2017-12-18 | 2020-09-11 | 苏州优千网络科技有限公司 | 基于区块链的签证信息系统及其处理方法 |
CN109981551A (zh) * | 2017-12-28 | 2019-07-05 | 航天信息股份有限公司 | 一种基于区块链的数据传输系统、方法及相关设备 |
CN108458724B (zh) * | 2017-12-29 | 2021-06-04 | 歌尔科技有限公司 | 一种计步方法和装置 |
CN108073829A (zh) * | 2017-12-29 | 2018-05-25 | 上海唯链信息科技有限公司 | 用于记录对象的运输数据的方法、介质、物联网设备、区块链平台和物联网系统 |
CN108335425A (zh) * | 2018-02-01 | 2018-07-27 | 深圳市轱辘车联数据技术有限公司 | 一种基于区块链的车辆信息处理方法及服务器 |
US10956075B2 (en) * | 2018-02-02 | 2021-03-23 | Bank Of America Corporation | Blockchain architecture for optimizing system performance and data storage |
US11176101B2 (en) | 2018-02-05 | 2021-11-16 | Bank Of America Corporation | System and method for decentralized regulation and hierarchical control of blockchain architecture |
GB2572389A (en) | 2018-03-28 | 2019-10-02 | Sony Corp | A device, requesting device, method and computer program |
CN108519862B (zh) * | 2018-03-30 | 2020-03-17 | 百度在线网络技术(北京)有限公司 | 区块链系统的存储方法、装置、系统和存储介质 |
CN108667717B (zh) * | 2018-04-20 | 2021-06-08 | 网易(杭州)网络有限公司 | 基于即时通信消息记录的区块链处理方法、介质、装置和计算设备 |
CN108764975A (zh) * | 2018-05-13 | 2018-11-06 | 深圳纬目信息技术有限公司 | 一种基于区块链的广告传播方法和装置 |
CN110492990B (zh) * | 2018-05-15 | 2021-10-15 | 华为技术有限公司 | 区块链场景下的私钥管理方法、装置及系统 |
CN108932297B (zh) * | 2018-06-01 | 2022-03-22 | 创新先进技术有限公司 | 一种数据查询、数据共享的方法、装置及设备 |
CN109241352A (zh) * | 2018-06-28 | 2019-01-18 | 平安科技(深圳)有限公司 | 个人档案信息的获取方法及服务器 |
KR102121930B1 (ko) * | 2018-07-03 | 2020-06-11 | 네이버 주식회사 | 블록체인 기반의 개인 데이터 처리 방법 및 시스템 |
CN109150968B (zh) * | 2018-07-13 | 2021-09-14 | 上海大学 | 一种基于秘密共享的区块链分布式存储方法 |
GB2593116A (en) * | 2018-07-16 | 2021-09-22 | Sita Information Networking Computing Uk Ltd | Self sovereign identity |
CN111897498A (zh) * | 2018-07-27 | 2020-11-06 | 创新先进技术有限公司 | 区块链数据的多级存储方法和装置 |
EP3831013A4 (en) * | 2018-07-27 | 2022-04-20 | HRL Laboratories, LLC | SYSTEM AND METHOD FOR PROTECTING LIGHT DEVICE DATA PRIVACY USING BLOCKCHAIN AND MULTI-PARTY COMPUTING |
CN109064173A (zh) * | 2018-08-01 | 2018-12-21 | 江苏恒宝智能系统技术有限公司 | 一种节点信息管理系统和方法 |
US11373258B2 (en) * | 2018-08-07 | 2022-06-28 | Mastercard International Incorporated | Financial institution mortgage portfolio asset inventory auction systems and methods |
CN109246192A (zh) * | 2018-08-10 | 2019-01-18 | 北斗链信息科技(广州)有限公司 | 基于北斗rdss的区块链系统及其实现方法 |
CN109165957A (zh) * | 2018-08-14 | 2019-01-08 | 海南高灯科技有限公司 | 基于区块链的发票数据报销方法、系统及相关设备 |
CN109255856B (zh) * | 2018-08-20 | 2019-11-19 | 深圳市长龙铁路电子工程有限公司 | 一种基于区块链技术的机车信号设备数据记录方法 |
CN109299188A (zh) * | 2018-08-21 | 2019-02-01 | 平安科技(深圳)有限公司 | 利用区块链数据存储方法、装置及电子设备 |
CN109087078B (zh) * | 2018-08-27 | 2023-03-24 | 深圳市智税链科技有限公司 | 关于电子票据的数据处理方法、装置、存储介质和设备 |
CN109118179A (zh) * | 2018-08-31 | 2019-01-01 | 篱笆墙网络科技有限公司 | 一种职员招聘方法及招聘平台 |
CN109493093A (zh) * | 2018-09-26 | 2019-03-19 | 百度在线网络技术(北京)有限公司 | 基于区块链的用户行为信息处理方法和装置 |
CN109583215B (zh) * | 2018-09-28 | 2022-11-15 | 创新先进技术有限公司 | 一种处理征信数据的方法及装置、区块链数据共享系统 |
CN109068318A (zh) * | 2018-10-08 | 2018-12-21 | 重庆邮电大学 | 一种智能手机中个人信息的保护方法 |
US11849047B2 (en) * | 2018-10-09 | 2023-12-19 | International Business Machines Corporation | Certifying authenticity of data modifications |
US10992456B2 (en) * | 2018-10-09 | 2021-04-27 | International Business Machines Corporation | Certifying authenticity of data modifications |
US11374762B2 (en) | 2018-10-09 | 2022-06-28 | International Business Machines Corporation | Certifying authenticity of data modifications |
CN110046517B (zh) * | 2018-11-07 | 2020-05-05 | 阿里巴巴集团控股有限公司 | 一种对写入区块链的交易进行隐匿的方法及装置 |
CN110011800B (zh) | 2018-11-07 | 2020-04-14 | 阿里巴巴集团控股有限公司 | 一种区块链数据读取方法及装置 |
WO2019072273A2 (en) | 2018-11-16 | 2019-04-18 | Alibaba Group Holding Limited | CHAIN INTERACTIONS USING A DOMAIN NAME SYSTEM IN BLOCK CHAIN SYSTEMS |
JP6688939B2 (ja) * | 2018-11-16 | 2020-04-28 | アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited | ブロックチェーンシステム内のクロスチェーン相互作用に対するドメイン名方式 |
PL3549324T3 (pl) | 2018-11-16 | 2021-07-19 | Advanced New Technologies Co., Ltd. | Schemat zarządzania nazwą domeny dla interakcji międzyłańcuchowych w systemach łańcuchów bloków |
CN110020945B (zh) | 2018-11-27 | 2020-10-30 | 创新先进技术有限公司 | 一种基于多个区块链网络的数据读取方法及系统 |
CN110060153B (zh) * | 2018-11-27 | 2020-11-17 | 创新先进技术有限公司 | 一种基于多个区块链网络的数据存证方法及系统 |
CN110060152B (zh) * | 2018-11-27 | 2020-10-30 | 创新先进技术有限公司 | 一种基于多个区块链网络的数据读取方法及系统 |
CN109758629B (zh) * | 2018-11-30 | 2023-03-21 | 平安科技(深圳)有限公司 | 透析数据的传输方法、装置、设备及存储介质 |
CN110033261B (zh) * | 2018-12-26 | 2021-07-13 | 创新先进技术有限公司 | 区块链数据处理方法、装置及系统 |
CN110011959B (zh) * | 2019-01-07 | 2021-09-10 | 诚镌科技有限公司 | 数据存储方法、数据查询方法和系统 |
CN109886026A (zh) * | 2019-01-11 | 2019-06-14 | 平安科技(深圳)有限公司 | 数据保存查询方法、装置、计算机系统及可读存储介质 |
US11368441B2 (en) * | 2019-01-29 | 2022-06-21 | Mastercard International Incorporated | Method and system for general data protection compliance via blockchain |
CN109828832B (zh) * | 2019-01-30 | 2021-12-28 | 百度在线网络技术(北京)有限公司 | 基于区块链的数据流通方法、装置、设备和介质 |
CN111783134B (zh) * | 2019-01-31 | 2024-04-16 | 创新先进技术有限公司 | 一种对写入区块链的交易进行隐匿的方法及装置 |
CN109981584B (zh) * | 2019-02-26 | 2021-10-26 | 符安文 | 一种基于区块链的分布式社交方法 |
CN109951295B (zh) * | 2019-02-27 | 2021-12-24 | 百度在线网络技术(北京)有限公司 | 密钥处理和使用方法、装置、设备及介质 |
CN109981622B (zh) * | 2019-03-15 | 2021-06-18 | 智链万源(北京)数字科技有限公司 | 区块链网络节点权限反向代理方法及设备 |
CN109918451B (zh) * | 2019-03-28 | 2021-06-25 | 中国联合网络通信集团有限公司 | 基于区块链的数据库管理方法及系统 |
US10999283B2 (en) | 2019-04-15 | 2021-05-04 | Advanced New Technologies Co., Ltd. | Addressing transaction conflict in blockchain systems |
CN110189121B (zh) * | 2019-04-15 | 2021-04-09 | 创新先进技术有限公司 | 数据处理方法、装置、区块链客户端和区块链节点 |
CN110035130B (zh) * | 2019-04-24 | 2021-07-13 | 中国联合网络通信集团有限公司 | 一种数据处理方法及装置 |
US11009859B2 (en) * | 2019-05-06 | 2021-05-18 | Fisher-Rosemount Systems, Inc. | Framework for privacy-preserving big-data sharing using distributed ledger |
CN110232080B (zh) * | 2019-05-23 | 2021-06-29 | 智慧谷(厦门)物联科技有限公司 | 一种基于区块链的快速检索方法 |
CN110458558A (zh) * | 2019-07-04 | 2019-11-15 | 重庆金融资产交易所有限责任公司 | 基于区块链的数据保密方法、装置和计算机设备 |
KR102064244B1 (ko) | 2019-08-06 | 2020-01-09 | 제주대학교 산학협력단 | 하이퍼체인을 이용한 블록체인 연결 방법 및 그 장치 |
CN112181976A (zh) * | 2019-08-08 | 2021-01-05 | 北京天德博源科技有限公司 | 基于区块链的小额贷款存证 |
US11847171B2 (en) * | 2019-08-20 | 2023-12-19 | International Business Machines Corporation | Facilitating blockchain transactions with an Internet of Things (IoT) device |
US11032062B2 (en) * | 2019-09-17 | 2021-06-08 | Switchbit, Inc. | Data processing permits system with keys |
CN110659967B (zh) * | 2019-09-26 | 2023-06-23 | 腾讯科技(深圳)有限公司 | 一种基于区块链的房屋管理方法及装置 |
JP6687798B1 (ja) * | 2019-10-01 | 2020-04-28 | データテック株式会社 | データ管理システムおよびデータ管理方法 |
CN111222169B (zh) * | 2019-10-10 | 2023-04-18 | 深圳创链数据科技有限公司 | 一种基于区块链技术的智能设备认证系统及方法 |
CN110765488B (zh) * | 2019-10-28 | 2021-11-16 | 联想(北京)有限公司 | 数据存储与读取方法和电子设备 |
US20210150632A1 (en) * | 2019-11-18 | 2021-05-20 | Willporttrust Llc | Systems and methods for authenticated voucher distribution using blockchain |
CN110909011A (zh) * | 2019-12-03 | 2020-03-24 | 北京海益同展信息科技有限公司 | 公民信息的处理方法、装置、设备及存储介质 |
CN111127206B (zh) * | 2019-12-25 | 2021-04-16 | 中国银联股份有限公司 | 一种基于智能合约的区块链数据访问控制方法及装置 |
WO2021137391A1 (ko) * | 2019-12-30 | 2021-07-08 | 재단법인 경주스마트미디어센터 | 비밀 공유를 이용한 블록 체인 생성 방법 |
CN111464500B (zh) * | 2020-03-06 | 2023-03-17 | 深圳壹账通智能科技有限公司 | 协议数据共享的方法、装置、设备及存储介质 |
CN111737362B (zh) * | 2020-07-22 | 2020-12-22 | 百度在线网络技术(北京)有限公司 | 区块链处理方法、装置、设备和存储介质 |
CN112087439B (zh) * | 2020-09-02 | 2022-05-17 | 杭州趣链科技有限公司 | 区块链交易查询方法、系统、计算机设备和存储介质 |
CN112115434B (zh) * | 2020-09-28 | 2023-06-27 | 上海对外经贸大学 | 一种基于区块链的舆情存证信息组织跨层级异构授权方法 |
CN112350438A (zh) * | 2020-10-28 | 2021-02-09 | 广东电网有限责任公司 | 一种电量管理的方法、装置、设备及存储介质 |
CN112702419B (zh) * | 2020-12-21 | 2023-03-24 | 杭州趣链科技有限公司 | 基于区块链的数据处理方法、装置、设备和存储介质 |
CN112995205B (zh) * | 2021-04-13 | 2021-08-20 | 北京百度网讯科技有限公司 | 基于区块链的查询方法、装置、设备和存储介质 |
CN113222344A (zh) * | 2021-04-15 | 2021-08-06 | 卓尔智联(武汉)研究院有限公司 | 一种区块链数据处理方法、装置及存储介质 |
CN113132950B (zh) * | 2021-06-21 | 2022-02-15 | 智己汽车科技有限公司 | 一种基于区块链处理行驶数据的方法和装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105975868A (zh) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | 一种基于区块链的证据保全方法及装置 |
CN106055993A (zh) * | 2016-08-13 | 2016-10-26 | 深圳市樊溪电子有限公司 | 一种用于区块链的加密存储系统及其使用方法 |
CN106096444A (zh) * | 2016-06-12 | 2016-11-09 | 杨鹏 | 一种基于生物信息的身份识别与社会信息记录方法及系统 |
CN106130779A (zh) * | 2016-07-18 | 2016-11-16 | 布比(北京)网络技术有限公司 | 一种物联设备及用该设备的物联网构建方法 |
CN106991334A (zh) * | 2016-11-24 | 2017-07-28 | 阿里巴巴集团控股有限公司 | 一种数据存取的方法、系统及装置 |
Family Cites Families (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS5858507B2 (ja) | 1979-09-21 | 1983-12-26 | ヨツギ株式会社 | 支線への葛の巻上り防止具 |
JP4196561B2 (ja) * | 2001-12-12 | 2008-12-17 | 日本電気株式会社 | コンテンツ配信方法、サーバ端末、中継サーバ、サーバクラスタ及びプログラム |
JP3978046B2 (ja) * | 2002-02-25 | 2007-09-19 | 日本電信電話株式会社 | ファイルアクセス制御方法、プログラム及び記憶媒体 |
JP2003333038A (ja) * | 2002-05-15 | 2003-11-21 | Sogo Keibi Hosho Co Ltd | 電子検証装置、電子検証方法およびその方法をコンピュータに実行させるプログラム |
US20190111255A1 (en) * | 2009-03-20 | 2019-04-18 | Electrocore, Inc. | Systems and methods for initial provisioning and refilling of medical devices |
US10778659B2 (en) * | 2012-05-24 | 2020-09-15 | Smart Security Systems Llc | System and method for protecting communications |
US9898782B1 (en) * | 2013-06-28 | 2018-02-20 | Winklevoss Ip, Llc | Systems, methods, and program products for operating exchange traded products holding digital math-based assets |
CN103634307A (zh) * | 2013-11-19 | 2014-03-12 | 北京奇虎科技有限公司 | 一种对网页内容进行认证的方法和浏览器 |
WO2016175914A2 (en) * | 2015-02-27 | 2016-11-03 | Visa International Service Association | Transaction signing utilizing asymmetric cryptography |
US9965628B2 (en) * | 2015-03-02 | 2018-05-08 | Dell Products Lp | Device reporting and protection systems and methods using a secure distributed transactional ledger |
US10158480B1 (en) * | 2015-03-16 | 2018-12-18 | Winklevoss Ip, Llc | Autonomous devices |
US20160283920A1 (en) * | 2015-03-28 | 2016-09-29 | Justin Fisher | Authentication and verification of digital data utilizing blockchain technology |
JP6364132B2 (ja) * | 2015-03-31 | 2018-07-25 | ナスダック, インコーポレイテッドNasdaq, Inc. | ブロックチェーン取引記録のシステムおよび方法 |
US9397985B1 (en) * | 2015-04-14 | 2016-07-19 | Manifold Technology, Inc. | System and method for providing a cryptographic platform for exchanging information |
EP3955146A1 (en) * | 2015-05-05 | 2022-02-16 | Ping Identity Corporation | Identity management service using a block chain |
JP5858507B1 (ja) * | 2015-05-18 | 2016-02-10 | 株式会社Orb | 仮想通貨管理プログラム、及び仮想通貨管理方法 |
US10089489B2 (en) * | 2015-06-02 | 2018-10-02 | ALTR Solutions, Inc. | Transparent client application to arbitrate data storage between mutable and immutable data repositories |
WO2017010455A1 (ja) * | 2015-07-13 | 2017-01-19 | 日本電信電話株式会社 | 契約合意方法、合意検証方法、契約合意システム、合意検証装置、契約合意装置、契約合意プログラム及び合意検証プログラム |
US20170031676A1 (en) * | 2015-07-27 | 2017-02-02 | Deja Vu Security, Llc | Blockchain computer data distribution |
US20170116693A1 (en) * | 2015-10-27 | 2017-04-27 | Verimatrix, Inc. | Systems and Methods for Decentralizing Commerce and Rights Management for Digital Assets Using a Blockchain Rights Ledger |
US20180253702A1 (en) * | 2015-11-24 | 2018-09-06 | Gartland & Mellina Group | Blockchain solutions for financial services and other transactions-based industries |
US10841082B2 (en) * | 2015-11-24 | 2020-11-17 | Adi BEN-ARI | System and method for blockchain smart contract data privacy |
CN105701372B (zh) * | 2015-12-18 | 2019-04-09 | 布比(北京)网络技术有限公司 | 一种区块链身份构建及验证方法 |
CN105719185B (zh) * | 2016-01-22 | 2019-02-15 | 杭州复杂美科技有限公司 | 区块链的数据对比及共识方法 |
US20170243193A1 (en) * | 2016-02-18 | 2017-08-24 | Skuchain, Inc. | Hybrid blockchain |
CN106130728B (zh) * | 2016-04-29 | 2019-07-26 | 北京太一云科技有限公司 | 一种基于区块链的数字资产登记方法及其服务器 |
US11341243B2 (en) * | 2016-04-29 | 2022-05-24 | Vladimir Mickael LEAL MONTEIRO | Mobile communication peripheral, system for protecting a mobile terminal and communication method |
US10046228B2 (en) * | 2016-05-02 | 2018-08-14 | Bao Tran | Smart device |
US9774578B1 (en) * | 2016-05-23 | 2017-09-26 | Accenture Global Solutions Limited | Distributed key secret for rewritable blockchain |
US10198325B2 (en) * | 2016-05-24 | 2019-02-05 | Mastercard International Incorporated | Method and system for desynchronization recovery for permissioned blockchains using bloom filters |
CN105959119A (zh) * | 2016-06-09 | 2016-09-21 | 惠众商务顾问(北京)有限公司 | 随机加密物理信息区块链防伪方法、系统和装置 |
CN106100847B (zh) * | 2016-06-14 | 2021-10-26 | 惠众商务顾问(北京)有限公司 | 非对称加密区块链身份信息验证方法及装置 |
US10454683B2 (en) * | 2016-06-17 | 2019-10-22 | Capital One Services, Llc | Blockchain systems and methods for user authentication |
CN106097073A (zh) * | 2016-06-20 | 2016-11-09 | 深圳市淘淘谷信息技术有限公司 | 一种用区块链来赋予数字账户交易过程独有id的方法 |
CN106157040A (zh) * | 2016-07-12 | 2016-11-23 | 詹博凯 | 一种基于智能移动终端的协同交易方法及系统 |
US11258587B2 (en) * | 2016-10-20 | 2022-02-22 | Sony Corporation | Blockchain-based digital rights management |
GB201617913D0 (en) * | 2016-10-24 | 2016-12-07 | Trustonic Limited | Multi-stakeholder key setup for lot |
US20180144292A1 (en) * | 2016-11-22 | 2018-05-24 | Wal-Mart Stores, Inc. | Apparatus and method for tracking consumer premises inventory |
US20180254898A1 (en) * | 2017-03-06 | 2018-09-06 | Rivetz Corp. | Device enrollment protocol |
US10404455B2 (en) * | 2017-09-01 | 2019-09-03 | Accenture Global Solutions Limited | Multiple-phase rewritable blockchain |
US10992454B2 (en) * | 2018-01-30 | 2021-04-27 | Disney Enterprises, Inc. | Blockchain configuration for secure content delivery |
CN111727594B (zh) * | 2018-01-31 | 2023-04-04 | 有线电视实验室公司 | 使用数字分类账进行隐私管理的系统和方法 |
US10084600B1 (en) * | 2018-04-16 | 2018-09-25 | Xage Security, Inc. | Decentralized information protection for confidentiality and tamper-proofing on distributed database |
US20190325038A1 (en) * | 2018-04-21 | 2019-10-24 | Keir Finlow-Bates | Consensus based editable blockchain |
US10325079B1 (en) * | 2018-12-04 | 2019-06-18 | Capital One Services, Llc | Version management platform |
-
2016
- 2016-11-24 CN CN201611050311.4A patent/CN106991334B/zh active Active
-
2017
- 2017-09-12 TW TW106131153A patent/TWI701572B/zh active
- 2017-11-17 JP JP2019528138A patent/JP6880188B2/ja active Active
- 2017-11-17 SG SG10202100217PA patent/SG10202100217PA/en unknown
- 2017-11-17 KR KR1020197018096A patent/KR102155462B1/ko active IP Right Grant
- 2017-11-17 EP EP17873246.7A patent/EP3547198B1/en active Active
- 2017-11-17 ES ES17873246T patent/ES2809170T3/es active Active
- 2017-11-17 WO PCT/CN2017/111538 patent/WO2018095275A1/zh unknown
- 2017-11-17 PL PL17873246T patent/PL3547198T3/pl unknown
-
2019
- 2019-05-24 US US16/422,641 patent/US10536265B2/en active Active
- 2019-10-18 US US16/656,990 patent/US10938550B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105975868A (zh) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | 一种基于区块链的证据保全方法及装置 |
CN106096444A (zh) * | 2016-06-12 | 2016-11-09 | 杨鹏 | 一种基于生物信息的身份识别与社会信息记录方法及系统 |
CN106130779A (zh) * | 2016-07-18 | 2016-11-16 | 布比(北京)网络技术有限公司 | 一种物联设备及用该设备的物联网构建方法 |
CN106055993A (zh) * | 2016-08-13 | 2016-10-26 | 深圳市樊溪电子有限公司 | 一种用于区块链的加密存储系统及其使用方法 |
CN106991334A (zh) * | 2016-11-24 | 2017-07-28 | 阿里巴巴集团控股有限公司 | 一种数据存取的方法、系统及装置 |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2020502861A (ja) * | 2018-11-27 | 2020-01-23 | アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited | コンソーシアムブロックチェーンネットワーク内の非対称鍵管理 |
US10819509B2 (en) | 2018-11-27 | 2020-10-27 | Alibaba Group Holding Limited | Asymmetric key management in consortium blockchain networks |
CN110084690A (zh) * | 2019-03-18 | 2019-08-02 | 深圳壹账通智能科技有限公司 | 数据处理方法、装置、计算机装置及存储介质 |
WO2021024717A1 (ja) * | 2019-08-06 | 2021-02-11 | ソニー株式会社 | 情報処理装置、情報処理方法及びプログラム |
CN110597840A (zh) * | 2019-09-26 | 2019-12-20 | 腾讯科技(深圳)有限公司 | 基于区块链的伴侣关系建立方法、装置、设备及存储介质 |
CN110597840B (zh) * | 2019-09-26 | 2023-09-22 | 腾讯科技(深圳)有限公司 | 基于区块链的伴侣关系建立方法、装置、设备及存储介质 |
CN111125187A (zh) * | 2019-11-29 | 2020-05-08 | 立旃(上海)科技有限公司 | 基于区块链的数据管理方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
US10938550B2 (en) | 2021-03-02 |
ES2809170T3 (es) | 2021-03-03 |
KR20190085106A (ko) | 2019-07-17 |
US20200052888A1 (en) | 2020-02-13 |
CN106991334A (zh) | 2017-07-28 |
US10536265B2 (en) | 2020-01-14 |
KR102155462B1 (ko) | 2020-09-11 |
SG10202100217PA (en) | 2021-02-25 |
JP6880188B2 (ja) | 2021-06-02 |
CN106991334B (zh) | 2021-03-02 |
TWI701572B (zh) | 2020-08-11 |
TW201820199A (zh) | 2018-06-01 |
PL3547198T3 (pl) | 2020-11-30 |
EP3547198B1 (en) | 2020-07-22 |
EP3547198A1 (en) | 2019-10-02 |
EP3547198A4 (en) | 2019-11-13 |
US20190280855A1 (en) | 2019-09-12 |
JP2020500487A (ja) | 2020-01-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018095275A1 (zh) | 一种数据存取的方法、系统及装置 | |
US11425108B2 (en) | Blockchain-based service data encryption methods and apparatuses | |
US11269842B2 (en) | Data storage layer index for efficient information retrieval | |
US10621376B2 (en) | Personal ledger blockchain | |
US11726968B2 (en) | Methods, apparatuses, and devices for transferring data assets based on blockchain | |
CN102236766B (zh) | 安全的数据项级数据库加密方法 | |
US7694134B2 (en) | System and method for encrypting data without regard to application | |
US20210124730A1 (en) | Blockchain based distributed file systems | |
EP3964983B1 (en) | Demand based data acquisition methods using a trusted device | |
TW201738801A (zh) | 資料庫中密文資料換密失敗的處理方法和裝置 | |
CN114897536A (zh) | 一种基于rfid标签和区块链的商品防伪溯源方法 | |
US20190334705A1 (en) | Encrypted communication channels for distributed database systems | |
CN111404662B (zh) | 一种数据处理方法及装置 | |
CN115208630A (zh) | 基于区块链的数据获取方法、系统及区块链系统 | |
CN115712641A (zh) | 一种数据库字段检索方法及相关设备 | |
CA2832978C (en) | Method of obfuscating relationships between data in database tables | |
CN115017231A (zh) | 基于区块链的数据交易方法、装置、存储介质及电子装置 | |
CN117313140A (zh) | 信息查询方法、装置、计算机设备和存储介质 | |
CN111404863A (zh) | 一种数据处理方法及装置 | |
CN115640321A (zh) | 数据查询方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17873246 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019528138 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20197018096 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2017873246 Country of ref document: EP Effective date: 20190624 |