WO2020125512A1 - 信息处理方法及区块链节点、电子设备 - Google Patents

信息处理方法及区块链节点、电子设备 Download PDF

Info

Publication number
WO2020125512A1
WO2020125512A1 PCT/CN2019/124531 CN2019124531W WO2020125512A1 WO 2020125512 A1 WO2020125512 A1 WO 2020125512A1 CN 2019124531 W CN2019124531 W CN 2019124531W WO 2020125512 A1 WO2020125512 A1 WO 2020125512A1
Authority
WO
WIPO (PCT)
Prior art keywords
digital asset
blockchain node
authorization
signature
request
Prior art date
Application number
PCT/CN2019/124531
Other languages
English (en)
French (fr)
Inventor
刘新
周军
Original Assignee
深圳市元征科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市元征科技股份有限公司 filed Critical 深圳市元征科技股份有限公司
Priority to EP19900509.1A priority Critical patent/EP3761203A4/en
Publication of WO2020125512A1 publication Critical patent/WO2020125512A1/zh
Priority to US17/038,624 priority patent/US11483161B2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Definitions

  • the present application relates to the field of computer technology, and in particular, to an information processing method, a blockchain node, and an electronic device.
  • Digital assets refer to non-monetary assets obtained or controlled by enterprises or individuals, existing in the form of electronic data, held in daily activities for sale or in the process of production.
  • the present application provides an information processing method and device, which can effectively improve the authorization efficiency and security of digital assets.
  • an embodiment of the present application provides an information processing method, including:
  • the blockchain node receives a digital asset processing request, where the digital asset processing request is used to request permission to process digital assets;
  • the blockchain node When the blockchain node receives the digital asset processing request, the blockchain node sends an authorization request to each of the M electronic devices, the authorization request is used to request Authorize to process the digital assets;
  • the blockchain node determines each of the at least N electronic devices of the M electronic devices Device authorized to process the digital asset, the M is greater than or equal to the N;
  • the first blockchain node determines to obtain the authority to process the digital asset.
  • the blockchain node after receiving the digital asset processing request, the blockchain node sends an authorization request for requesting permission to process digital assets in the digital asset processing request to other M electronic Device, when the blockchain node determines that at least N electronic devices are authorized to process the digital asset, the blockchain node obtains the authority to process the digital asset.
  • the blockchain node can use the authorization The request is sent to other electronic devices.
  • the above-mentioned blockchain nodes determine the proportion of signature authorization of other electronic devices, and finally realize multi-party authorization transactions, which can effectively improve the efficiency of multi-party authorization.
  • the method before the blockchain node determines to obtain permission to process the digital asset, the method further includes:
  • the blockchain node authorizes the processing of the digital asset
  • the blockchain node determining to obtain the authority to process the digital asset includes:
  • the blockchain node determines to obtain the authority to process the digital asset.
  • the digital asset processing request is started only when the blockchain node authorizes the processing of the digital asset, which can effectively avoid the incorrect identity information of the blockchain node, resulting in The identity authorization of the blockchain node fails, and finally the digital asset processing request is erroneously executed. This can effectively improve the security of the authorization process.
  • the digital asset includes a digital asset encrypted by a target public key, the target private key corresponding to the target public key includes a first decentralized key, and the first decentralized key Stored in the blockchain node, the blockchain node authorizing the processing of the digital asset, including:
  • the blockchain node signs the digital asset through the first decentralized key to obtain a first authorized signature, and determines authorization to process the digital asset according to the first authorized signature.
  • the blockchain node itself can authorize the digital asset through the first decentralized key stored by the blockchain node, which can prevent illegal users from initiating an authorization request through the blockchain node to avoid Increases the risk of the digital asset being stolen and improves the security of the digital asset during the transaction
  • the target private key further includes M distributed keys, the M distributed keys are respectively stored in the M electronic devices, and the M distributed keys The key corresponds to the M electronic devices, and the N distributed keys among the M distributed keys are used to sign the digital asset to obtain N authorized signatures;
  • the method further includes:
  • the blockchain node synthesizes the first authorized signature and the N authorized signatures to obtain a target signature result
  • the blockchain node synthesizes the target private key according to the target signature result
  • the blockchain node determining to obtain the authority to process the digital asset includes:
  • the blockchain node decrypts the target public key through the target private key to determine the authority to process the digital asset.
  • the first authorized signature and N authorized signatures are combined into a target signature result, and the target private key is obtained through the target signature result, and finally the target private key is decrypted through the target public key encryption
  • the blockchain node finally determines to obtain the authority to process the digital asset, which can effectively guarantee the security of the authorization process.
  • the blockchain node determining to obtain permission to process the digital asset includes:
  • the blockchain node generates a signature record from the target signature result
  • the blockchain node stores the signature record in the blockchain ledger.
  • the transaction record of the above digital asset can be stored in time, which can effectively improve the accuracy of the digital asset in the transaction process.
  • an embodiment of the present application further provides an information processing method, including:
  • the electronic device receives an authorization request, and the authorization request is used to request authorization to process digital assets;
  • the electronic device authorizes the processing of the digital asset to obtain an authorization result
  • the electronic device sends the authorization result to a blockchain node.
  • the above-mentioned electronic device authorizes to process the above-mentioned authorization request, and in the case of the digital asset that is authorized, sends the authorization result to the above-mentioned blockchain node, which can improve the security of the authorization process.
  • the digital asset includes a digital asset encrypted by a target public key
  • the target private key corresponding to the target public key includes a second decentralized key
  • the second decentralized key Stored in the electronic device, the electronic device authorizing the processing of the digital asset to obtain an authorization result includes:
  • the electronic device obtains a second authorization signature by signing the digital asset through a second decentralized key, and determines authorization to process the digital asset according to the second authorization signature.
  • the electronic device signs the digital asset through the second decentralized key. Because the decentralized key is unique, not only the legality of the electronic device is guaranteed, but also the digital The confidentiality of assets in the transaction process can effectively improve the security of digital asset transactions.
  • an information processing apparatus including:
  • the first receiving unit is used for a blockchain node to receive a digital asset processing request, where the digital asset processing request is used to request permission to process digital assets;
  • a first sending unit for the blockchain node to send an authorization request to each of the M electronic devices when the blockchain node receives the digital asset processing request,
  • the authorization request is used to request authorization to process the digital asset
  • a first determining unit for the blockchain node to determine that each of at least N electronic devices in the M electronic devices is authorized to process the digital asset, and the M is greater than or equal to the N;
  • a second determining unit is used for the blockchain node to determine the authority to process the digital asset.
  • the apparatus further includes:
  • a first processing unit configured to authorize the blockchain node to process the digital asset
  • the second determining unit is specifically configured to, when the blockchain node authorizes the processing to pass the digital asset, the blockchain node determines to obtain the authority to process the digital asset.
  • the apparatus includes:
  • the first processing unit is specifically used for the blockchain node to sign the digital asset through the first decentralized key to obtain a first authorization signature, and determine authorization processing according to the first authorization signature The digital asset.
  • the apparatus further includes:
  • a synthesizing unit for the blockchain node to synthesize the first authorization signature and the N authorization signatures to obtain a target signature result
  • the second determining unit is further used for the blockchain node to decrypt the target public key by using the target private key to determine the authority to process the digital asset.
  • the apparatus further includes:
  • an embodiment of the present application further provides an information processing apparatus, including:
  • a second receiving unit configured to receive an authorization request from the electronic device, and the authorization request is used to request authorization to process digital assets
  • a processing unit configured to authorize the electronic device to process the digital asset and obtain an authorization result
  • a second sending unit is configured to send the authorization result to the blockchain node by the electronic device.
  • the apparatus includes:
  • the processing unit is further used for the electronic device to sign the digital asset through a second decentralized key to obtain a second authorized signature, and determine to authorize processing of the digital asset according to the second authorized signature
  • an embodiment of the present application further provides a blockchain node device, including: a processor and a memory; the processor is coupled to the memory, and the memory stores program instructions; When the program instructions are executed by the processor, the processor is caused to perform the corresponding function of the method according to the first aspect.
  • an embodiment of the present application further provides an electronic device, including: a processor and a memory
  • an embodiment of the present application provides a computer-readable storage medium having instructions stored therein, which when executed on a computer, causes the computer to perform the first aspect or the first The method described in the second aspect.
  • an embodiment of the present application provides a computer program product containing instructions that, when run on a computer, cause the computer to execute the method described in the first aspect or the second aspect.
  • FIG. 1 is a schematic structural diagram of an information processing system provided by an embodiment of the present application.
  • FIG. 2a is a schematic flowchart of an information processing method provided by an embodiment of the present application.
  • FIG. 2b is a schematic flowchart of another information processing method provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of an information processing method provided by an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of yet another information processing method provided by the example of the present application.
  • FIG. 5 is a schematic structural diagram of an information processing apparatus provided by an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of another information processing apparatus provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of yet another information processing apparatus provided by an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of an information processing apparatus provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of another information processing apparatus provided by an embodiment of the present application.
  • FIG. 1 is a schematic structural diagram of an information processing system provided by an embodiment of the present application.
  • the information processing system includes: a blockchain node 101 and an electronic device 102, where the foregoing electronic devices include M Electronic device; wherein, the communication connection between the blockchain node 101 and the electronic device 102, such as wireless connection, etc., the embodiment of the present application does not uniquely limit the communication connection between the blockchain node and the electronic device .
  • the blockchain platform can encrypt the digital asset through the target public key, and the target private key corresponding to the target public key can decrypt the digital asset, that is, the target public key and the target private key are paired appeared.
  • the digital asset can be encrypted by a public key encryption algorithm, such as the asymmetric encryption algorithm RSA and the elliptic curve public key cryptographic algorithm SM2. Then, divide the target private key into M+1 distributed keys, and store the M+1 distributed keys in the blockchain node and the electronic device (ie, 1 blockchain node and M electronic devices) ), and the blockchain node and M electronic devices only store a corresponding decentralized key. That is to say, the private key of the digital asset can be divided into M+1 copies, so as to be sent to 1 block chain node and M electronic devices, respectively.
  • the specific encryption algorithm is not limited in the embodiments of the present application.
  • the blockchain node receives a digital asset processing request, and the digital asset processing request is used to request permission to process the digital asset; the blockchain node sends an authorization to each of the M electronic devices Request, the authorization request is used to request permission to process digital assets; the electronic device receives the authorization request from the blockchain node and sends at least N authorization results from other blockchain nodes to the blockchain node; finally, the zone The blockchain node determines to obtain the authority to process the digital asset.
  • FIG. 2a is a schematic flowchart of an information processing method provided by an embodiment of the present application.
  • the information processing method may be applied to a blockchain node in the system framework shown in FIG. As shown in FIG. 2a, the method includes:
  • the blockchain node receives a digital asset processing request.
  • the above digital asset processing request is used to request permission to process digital assets.
  • the blockchain node may receive a digital asset processing request input by a user, or may also receive a digital asset processing request sent from other devices such as a blockchain platform or other server, etc.
  • the embodiment of the application does not uniquely limit the source of the digital asset processing request received by the blockchain node.
  • the foregoing blockchain node may be a computer in the blockchain network, including a mobile phone, a mining machine, a desktop computer, a server, and so on.
  • the above digital assets may be valuable files such as songs, videos, contracts, data files and so on.
  • the above digital asset can be a house rental contract, which can include the identity information of the lessor, the basic situation of the house, the rent and deposit payment period and method, water and electricity costs, cleaning fees, telephone fees and maintenance The payment method of the fee, the change of the lessor and the lessee, the responsibility of the lessee, the responsibility of the lessor, and the relevant provisions of the lease period and the expiration of the contract. It is understandable that the embodiments of the present application do not limit the specific content of the above digital assets.
  • the above-mentioned blockchain node may receive a digital asset processing request, wherein the digital asset processing request may be authorization, transaction, division, transfer, transfer, purchase, lease, copy of the above digital asset , View, etc. permissions processing request. It is understandable that the embodiments of the present application do not limit the specific content of the above processing request.
  • the blockchain node When the blockchain node receives the digital asset processing request, the blockchain node sends an authorization request to each of the M electronic devices, and the authorization request is used to request Authorize to process the above digital assets.
  • the foregoing electronic device may also be a blockchain node.
  • the above authorization request can be understood as an authorization signature for the above digital asset.
  • the above authorization request can be a house rental contract that requires Party A or Party B to sign and authorize, a property transfer agreement that requires signature authorization, a confidential document that requires multi-party authorization and signature, and so on. Understandably, the embodiments of the present application do not limit the specific form and content of the above authorization request.
  • the above-mentioned blockchain node sends an authorization request to each of the M electronic devices.
  • the above-mentioned blockchain node can send the above-mentioned authorization request by way of broadcasting the whole network.
  • the blockchain node may also individually send the authorization request to the M electronic devices one by one. It is understandable that the sending method is not limited in the implementation of this application.
  • the above-mentioned blockchain node can quickly and accurately send the above-mentioned authorization request to the above-mentioned electronic device, which effectively improves the efficiency of the transmission process. It can be understood that the embodiment of the present application does not limit the specific sending method.
  • the blockchain node determines that each of the at least N electronic devices in the M electronic devices is authorized to process the digital asset, and the M is greater than or equal to the N. [0099] In the embodiment of the present application, the blockchain node determines that each of the at least N electronic devices in the M electronic devices is authorized to pass the digital asset, and M is greater than or equal to N.
  • the digital asset is an encrypted file
  • the encrypted file is encrypted by a public key encryption algorithm, that is, the digital asset is encrypted by the public key
  • M can be understood as the The target private key corresponding to the target public key is divided into M+1 distributed keys, and the M+1 distributed keys are distributed to M+1 devices for safekeeping.
  • N+1 can be the minimum number of copies necessary for decrypting the above digital assets, M is greater than or equal to N, and M and N are integers greater than or equal to 1.
  • the above digital asset is used as an encrypted file for description, and the target private key of the above digital asset can be simply divided into k shares on average.
  • this method can achieve the segmentation of the above-mentioned digital asset target private key, it often fails to meet market demand in practical applications. Therefore, the embodiments of the present application provide a method for dividing the target private key of the above digital assets, as follows:
  • m split target private keys of the digital asset may be separately stored by m devices (that is, blockchain node devices and electronic devices). It can be understood that the embodiments of the present application may also divide the target private key of the digital asset into M+1 shares through the above method, and through M+1 devices respectively (That is, blockchain node equipment and electronic equipment) for safekeeping, no more details will be given here.
  • the blockchain node determines that each of the at least N electronic devices among the M electronic devices is authorized to pass the digital asset.
  • the above-mentioned blockchain node determines the above-mentioned N number by receiving the number of authorized signatures from the electronic device.
  • the necessary number for processing the above digital assets can be determined simply and quickly by determining the number of N, which can avoid processing requests for the above digital assets that cannot be completed because M+1 authorized signatures must be determined Situation, improving efficiency. It can be understood that the embodiments of the present application do not limit the above specific determination method.
  • the above-mentioned blockchain node determines to obtain the authority to process the digital asset.
  • the above-mentioned blockchain node determines to obtain the authority to process the digital asset corresponding to the specific processing request of the above digital asset. Specifically, if the above digital asset processing request is a processing request to authorize, trade, divide, transfer, transfer, purchase, rent, copy, view, etc. the above digital assets, then the above-mentioned blockchain node determines to obtain the above-mentioned digital asset processing request
  • the authority of assets refers to the specific operations of authorizing, trading, dividing, transferring, transferring, purchasing, renting, copying, viewing, etc. the above digital assets. It can be understood that the embodiments of the present application do not limit the specific content of the above digital asset authority.
  • the blockchain node when a blockchain node initiates a digital asset processing request, and the digital asset processing request includes an authorization request, the blockchain node can send the authorization request to other electronic devices to avoid double
  • the above-mentioned blockchain nodes finally realize the multi-party authorization transaction by judging the proportion of other electronic device signature authorization, which can effectively improve the efficiency of multi-party authorization.
  • FIG. 2b is a schematic flowchart of another information processing method provided by an embodiment of the present application.
  • the information processing method may be applied to a blockchain node in the system framework shown in FIG. As shown in FIG. 2b, the method includes: [0109] 211.
  • the blockchain node receives a digital asset processing request.
  • the above digital asset processing request is used to request permission to process digital assets.
  • the blockchain node authorizes the processing of the digital asset.
  • the above-mentioned blockchain node itself can authorize the above-mentioned digital assets, on the one hand, it can ensure that the digital asset transaction can be more efficient, on the other hand, it can prevent illegal users from stealing the blockchain node.
  • Identity information initiates an authorization request.
  • the digital asset includes a digital asset encrypted by a target public key, the target private key corresponding to the target public key includes a first distributed key, and the first distributed key is stored in the foregoing Among the blockchain nodes, the above-mentioned blockchain nodes are authorized to process the above-mentioned digital assets, including:
  • the blockchain node signs the digital asset through the first decentralized key to obtain a first authorized signature, and determines authorization to process the digital asset according to the first authorized signature.
  • the above-mentioned blockchain node may sign the digital asset through the first decentralized key held by itself. Since the first decentralized key is unique, it is performed through the first decentralized key The signature can effectively guarantee the authenticity of the first authorized signature.
  • the implementation of the embodiments of the present application can effectively prevent the identity information of the blockchain node from being tampered, and greatly improves the security of the digital asset authorization transaction process.
  • the blockchain node sends an authorization request to each of the M electronic devices.
  • the authorization request is used to request authorization to process the digital asset.
  • step 213 for the specific implementation manner of the foregoing step 213, reference may be made to the implementation manner shown in step 202 shown in FIG. 2a, and details are not described here one by one.
  • the blockchain node determines that each of the at least N electronic devices in the M electronic devices is authorized to process the digital asset, and M is greater than or equal to N.
  • step 214 for a specific implementation manner of the foregoing step 214, reference may be made to the implementation manner shown in step 203 shown in FIG. 2a, and details are not described here one by one.
  • each of the at least N electronic devices corresponds to an authorization signature.
  • the above authorization signature may be attached to the above digital asset.
  • the target private key further includes M distributed keys, the M distributed keys are respectively stored in the M electronic devices, and the M distributed keys and the M One electronic device corresponds to each other, and the N distributed keys among the M distributed keys are used to sign the digital assets to obtain N authorized signatures;
  • the method further includes:
  • the blockchain node synthesizes the first authorization signature and the N authorization signatures to obtain a target signature result
  • the blockchain node determines the target private key according to the target signature result
  • the above-mentioned blockchain node determines to obtain the authority to process the above-mentioned digital assets, including:
  • the blockchain node decrypts the target public key through the target private key to determine the authority to process the digital asset.
  • the result obtained by synthesizing the authorization signatures to obtain the target signature may be that the blockchain node may number at least N authorization signatures from the electronic device and the first authorization signature, and all at least The N authorized signatures and the above-mentioned first authorized signature are attached to the above digital asset in the form of an appendix, then the appendix is the target signature result.
  • the synthesis of the authorization signature (the authorization signature including the first authorization signature and the N authorization signatures) can be conveniently and efficiently completed in the above manner, thereby improving efficiency.
  • the above digital asset is used as an encrypted file for description.
  • An embodiment of the present application provides a method for synthesizing the above authorized signature into a target signature result. Since the above authorization signature is attached to the above digital asset, and the authorization signature is obtained by decentralized key signature, the synthesis process of the above target signature result can also be understood as the process of recovering the above target private key.
  • the embodiments of the present application provide a method for recovering the target private key of the above digital assets, as follows:
  • the method for recovering the target private key of the digital asset may be through a file
  • the security recovery algorithm realizes the recovery of the target private key. Specifically, it can be achieved by the following steps: First, extract the parameters M+l, N, block-num, excess and key information according to the given subfile, and the subfile can be understood as a signature result from the above electronic device Digital assets; then create a subfile access table based on the above parameters and key information; then create an empty original file, fill the corresponding bytes of the subfile into the original file according to the subfile access table; and finally fill the remaining part of any subfile, Attached to the end of the original file to complete the restoration of the original file, the original file corresponds to the target private key of the original digital asset divided into M+1 copies.
  • the digital assets from the above electronic devices are all accompanied by corresponding authorized signatures, so the target private key of the original digital asset that is restored is included in the authorized signature from the electronic device, that is, the goal of recovering the original digital assets is completed
  • the private key also completes the synthesis of the target signature result accordingly.
  • the target private key of the above digital assets can be efficiently and accurately recovered through the file security recovery algorithm, which improves efficiency. It is understandable that the specific synthesis method of the above target signature result is not limited in the embodiments of the present application.
  • the target public key of the digital asset can be decrypted by the target private key, so that the blockchain node can obtain processing authority for the digital asset, where,
  • the target private key and the target public key are a corresponding pair of public and private keys.
  • the above method further includes:
  • the blockchain node generates a signature record based on the target signature result
  • the blockchain node saves the signature record in the blockchain ledger.
  • the blockchain node generates a signature record according to the target signature result, and the signature record includes a time record generated by the target signature result, that is, a time stamp is added to the target signature result. Then, the blockchain node saves the signature record in the blockchain ledger.
  • the timestamp can be a self-built timestamp, that is, the timestamp is obtained by a time receiving device (such as GPS, CDMA, Beidou Satellite) to the timestamp server, and the timestamp certificate is issued through the timestamp server; then the above block Obtain the timestamp certificate on the chain node.
  • the timestamp may be a legally effective timestamp, that is, a third-party trusted timestamp authentication service constructed by the National Time Service Center of the Chinese Academy of Sciences and Beijing United Trust Technology Service Co., Ltd., and then obtained on the above-mentioned blockchain node The timestamp.
  • a legally effective timestamp that is, a third-party trusted timestamp authentication service constructed by the National Time Service Center of the Chinese Academy of Sciences and Beijing United Trust Technology Service Co., Ltd., and then obtained on the above-mentioned blockchain node The timestamp.
  • the blockchain node and the N electronic devices perform authorization signatures through their respective stored distributed keys. Due to the non-copyability of the distributed keys, the authenticity of the foregoing authorized signatures is greatly ensured And reliability, which can prevent the above authorization process from being tampered by illegal users, and effectively guarantee the rationality and security of the authorization process.
  • FIG. 3 is a schematic flowchart of an information processing method provided by an embodiment of the present application.
  • the information processing method may be applied to electronic devices in the system framework shown in FIG. As shown in FIG. 3, the method includes
  • An electronic device receives an authorization request.
  • the foregoing authorization request is used to request authorization to process digital assets.
  • the above authorization request may be understood as a processing request for authorization, transaction, damage 1J, transfer, transfer, purchase, rent, copy, view, etc. of the above digital asset. It is understandable that the embodiments of the present application do not limit the specific content of the above authorization request.
  • the electronic device authorizes the processing of the digital asset to obtain an authorization result.
  • the process of authorizing the digital asset may be understood as an authorization signature process for the digital asset sent by the blockchain node, and the authorization result is the authorization signature result.
  • the embodiments of the present application provide a method for authorizing the above digital assets, that is, a method for authorizing and signing the above digital assets. As follows:
  • the digital asset includes a digital asset encrypted by a target public key
  • the target private key corresponding to the target public key includes a second distributed key
  • the second distributed key is stored in the foregoing Among the electronic devices, the above-mentioned electronic devices authorize the above-mentioned digital assets, including:
  • the electronic device obtains a second authorization signature on the digital asset signature through the second decentralized key, and determines authorization to process the digital asset based on the second authorization signature.
  • step 212 shown in FIG. the embodiment of the present application only describes the process of authorizing the signature of any one of the N electronic devices.
  • the process of authorizing the signature of other electronic devices please refer to the process of authorizing the signature of the above electronic devices. Detailed.
  • the electronic device sends the authorization result to the blockchain node.
  • the above-mentioned electronic device may send the above-mentioned authorization result (ie, the second authorization signature) to the above-mentioned blockchain node.
  • the above-mentioned authorization result ie, the second authorization signature
  • the above-mentioned electronic device receives the above-mentioned authorization request; then signs the above-mentioned authorization request and attaches an authorization signature result; and finally sends the authorization result (ie, authorization signature) to the above-mentioned blockchain node.
  • the implementation of the embodiments of the present application can efficiently, simply and securely implement the authorized signature of digital assets, and effectively improve the efficiency.
  • FIG. 4 is a schematic flowchart of still another information processing method according to an embodiment of the present application.
  • the information processing method may be applied to the system shown in FIG. As shown in FIG. 4, the method includes:
  • a blockchain node receives a digital asset processing request.
  • the above digital asset processing request is used to request permission to process digital assets.
  • the digital assets may be valuable files such as songs, videos, contracts, data files and the like.
  • the digital asset processing request is to authorize, trade, divide, transfer, transfer, purchase, and issue the digital asset Processing requests for rent, copy, view, etc. permissions. It can be understood that the embodiments of the present application do not limit the specific content of the digital asset and the specific processing request.
  • the blockchain node sends an authorization request to each of the M electronic devices.
  • the electronic device receives the authorization request.
  • the authorization request is used to request authorization to process the digital asset.
  • the electronic device receives an authorization request from the blockchain node, and the authorization request is used to authorize the digital asset sent from the blockchain node.
  • the authorization request can be understood as a processing request for authorization, transaction, division, transfer, transfer, purchase, lease, copy, view, etc. of the above digital assets. It is understandable that the embodiments of the present application do not limit the specific content of the above authorization request.
  • the electronic device authorizes the processing of the digital asset to obtain an authorization result.
  • the process of authorizing the digital asset may be understood as an authorization signature process for the digital asset sent by the blockchain node, and the authorization result is the authorization signature. Understandably, the authorization result can be used to instruct blockchain nodes to authorize digital assets.
  • the electronic device sends the authorization result to the blockchain node, and the blockchain node receives the authorization result sent by the electronic device.
  • the electronic device may send the authorization result (that is, N authorized signatures) information carrying the authorization to the blockchain node.
  • the blockchain node determines that each of the at least N electronic devices in the M electronic devices is authorized to process through the digital asset, and the M is greater than or equal to the N.
  • the above-mentioned blockchain node can determine whether the number of authorization results from the electronic device reaches the necessary minimum predetermined number N (that is, a predetermined authorization ratio), and when the number of authorization results reaches the number N+1 ( When including the first authorization signature of the blockchain node itself, the blockchain node may continue to receive the authorization result from the electronic device, or may stop receiving the authorization result. It is understandable that the embodiment of the present application does not limit the specific number of authorization results received by the blockchain nodes.
  • the blockchain node determines to obtain the authority to process the digital asset.
  • the above-mentioned blockchain node may use the authorization result that reaches the authorization ratio to execute the above-mentioned digital asset processing request to realize the authorization, transaction, division, transfer, transfer, purchase, rental of the digital asset , Copy, view, etc. operations. It is understandable that the embodiments of the present application please The specific content requested is not limited.
  • the blockchain node when a blockchain node that obtains digital assets initiates a digital asset processing request, and the digital asset processing request includes an authorization request, the blockchain node can send the authorization request to other areas Blockchain nodes.
  • the above-mentioned blockchain nodes finally realize multi-party authorization transactions by judging the proportion of other blockchain nodes' signature authorization, which can effectively improve the efficiency of multi-party authorization.
  • FIG. 1, FIG. 2a, FIG. 2b, FIG. 3, and FIG. 4 each have their own emphasis. Details one by one.
  • FIG. 5 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application.
  • the information processing apparatus may be used to execute the methods shown in FIGS. 2a and 2b.
  • the information The processing device includes
  • the first receiving unit 501 is used for a blockchain node to receive a digital asset processing request, which is used for requesting permission to process digital assets;
  • the first sending unit 502 is used for the blockchain node to send an authorization request to each of the M electronic devices when the blockchain node receives the digital asset processing request,
  • the above authorization request is used to request authorization to process the above digital assets;
  • the first determining unit 503 is for the blockchain node to determine at least N of the M electronic devices, each of the electronic devices is authorized to process the digital asset, the M is greater than or equal to the N;
  • the second determining unit 504 is used for the above-mentioned blockchain node to determine to obtain the authority to process the digital asset.
  • the blockchain node when a blockchain node initiates a digital asset processing request, and the digital asset processing request includes an authorization request, the blockchain node can send the authorization request to other electronic devices. By judging the proportion of signature authorization of other electronic devices, the blockchain node finally realizes multi-party authorization transactions, which can effectively improve the efficiency of multi-party authorization.
  • FIG. 6 is a schematic structural diagram of another information processing apparatus provided by an embodiment of the present application. As shown in FIG. 6, the foregoing apparatus further includes:
  • the first processing unit 505 is configured to authorize the blockchain node to process the digital asset
  • the above-mentioned second determination unit 504 is specifically configured to, when the above-mentioned blockchain node authorizes the processing to pass the above-mentioned digital asset, the above-mentioned blockchain node determines to obtain the authority to process the digital asset.
  • the foregoing device includes:
  • the first processing unit 505 is used for the blockchain node to sign the digital asset through the first decentralized key to obtain a first authorized signature, and determine to authorize the digital asset to be processed according to the first authorized signature .
  • FIG. 7 is a schematic structural diagram of yet another information processing apparatus provided by an embodiment of the present application. As shown in FIG. 7, the foregoing apparatus further includes:
  • a third determining unit 507 for the blockchain node to determine the target private key according to the target signature result
  • the second determining unit 504 is further used for the blockchain node to decrypt the target public key with the target private key to determine the authority to process the digital asset.
  • the foregoing device further includes:
  • the generating unit 508 is used for the blockchain node to generate a signature record for the target signature result
  • the storage unit 509 is used for the blockchain node to store the signature record in the blockchain ledger.
  • FIG. 8 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application.
  • the information processing apparatus may be used to execute the method shown in FIG. 3.
  • the information processing apparatus includes :
  • the second receiving unit 801 is configured to receive an authorization request from the electronic device, and the foregoing authorization request is used to request authorization to process digital assets;
  • the processing unit 802 is configured to authorize the electronic device to process the digital asset and obtain an authorization result
  • the second sending unit 803 is configured to send the foregoing authorization result to the blockchain node by the electronic device.
  • the foregoing device includes:
  • the processing unit 802 is further used for the electronic device to sign the digital asset through the second decentralized key to obtain a second authorized signature, and determine to authorize processing of the digital asset according to the second authorized signature
  • the above-mentioned electronic device receives the above-mentioned authorization request;
  • the digital assets in are encrypted, and the authorization signature result is attached; finally, the authorization result (ie, authorization signature) is sent to the above-mentioned blockchain node.
  • FIG. 9 is a schematic structural diagram of another information processing apparatus provided by an embodiment of the present application.
  • the information processing device includes a processor 901, and may further include an input interface 902, an output interface 903, and a memory 904.
  • the input interface 902, the output interface 903, the memory 904 and the processor 901 are connected to each other through a bus.
  • Memory includes, but is not limited to, random access memory (random access memory, RAM), read-only memory (read-only memory, ROM), erasable programmable read-only memory (erasable programmable read only memory, EPROM) , Or compact disc read-only memory (CD-ROM), which is used for related instructions and data.
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable read only memory
  • CD-ROM compact disc read-only memory
  • the input interface is used to input data and/or signals
  • the output interface is used to output data and/or signals.
  • the output interface and the input interface can be independent devices or can be a whole device.
  • the processor may include one or more processors, for example, including one or more central processors (centr al processing)
  • CPU central processing unit
  • the CPU when the processor is a CPU, the CPU may be a single-core CPU or a multi-core CPU.
  • the memory is used to store program codes and data of the information processing apparatus.
  • the processor is used to call the program code and data in the memory to execute the steps in the above method embodiments
  • the processor may be used to execute the implementation shown in steps 202 to 204. And the processor can also be used to implement the implementation manners shown in step 211, step 212, and step 214 to step 216. And the processor can also be used to implement the implementation shown in 301 to 302. And the processor can also be used to implement the implementation manners shown in step 401, step 403, and step to step 406.
  • the processor may be further configured to execute the method shown in the first determining unit 503 and the second determining unit 504, and so on.
  • the input interface may be used to perform the method shown in the first receiving unit 501
  • the output interface may also be used to perform the method shown in the first sending unit 502
  • the processor may also be used to execute the method shown in the processing unit 802 and so on.
  • the input interface may be used to perform the method shown in the second receiving unit 801
  • the output interface may also be used to perform the method shown in the second sending unit 803
  • FIG. 9 only shows a simplified design of the information processing apparatus.
  • the information processing apparatus may also include other necessary elements, including but not limited to any number of input/output interfaces, processors, controllers, memories, etc., and all information processing apparatuses that can implement the embodiments of the present application All are within the scope of protection of this application.
  • a person of ordinary skill in the art may understand that all or part of the process in the method of the foregoing embodiment may be implemented.
  • the process may be completed by a computer program instructing relevant hardware.
  • the program may be stored in a computer-readable storage medium.
  • the aforementioned storage media include: ROM or random storage memory RAM, magnetic disks or optical disks and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Automation & Control Theory (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

本申请公开了一种信息处理方法及装置,其中方法包括:区块链节点接收数字资产处理请求,所述数字资产处理请求用于请求处理数字资产的权限;所述区块链节点在接收到所述数字资产处理请求的情况下,所述区块链节点向M个电子设备中的每个电子设备发送授权请求,所述授权请求用于请求授权处理所述数字资产;所述区块链节点确定所述M个电子设备中至少N个电子设备中的每个电子设备授权处理所述数字资产,所述M大于或等于所述N;所述区块链节点确定获得处理所述数字资产的权限。采用本申请,能够有效提高对数字资产授权的效率。

Description

信息处理方法及区块链节点、 电子设备
[0001] 技术领域
[0002] 本申请涉及计算机技术领域, 尤其涉及一种信息处理方法及区块链节点、 电子 设备。
[0003] 背景技术
[0004] 数字资产 (Digital assets) 是指企业或个人获得或控制的, 以电子数据形式存 在的, 在日常活动中持有以备出售或处于生产过程中的非货币性资产。
[0005] 网络时代的网络会计、 办公自动化、 电子支付系统平台等使现行的生产方式具 有了传统生产方式无法比拟的优越性。 由此产生了一种依托磁性介质而存在的 一连串“0”和“1”的代码, 这些代码是一种具有资产性质的数字化商品, 即数字资 产。 这种数字资产具有价格昂贵、 依附性强、 互动性强、 数量无上限以及成本 递减的特点。
[0006] 采用中央集权的方式管理数字资产的交易, 容易造成中央管理集中舞弊行为; 如果中央管理系统被攻破, 还会造成该中央管理系统被冒充, 因此, 这种中央 集权管理数字资产交易的方式安全性较低。
[0007] 由此, 数字资产是本领域技术人员正在研究的问题。
[0008] 发明内容
[0009] 本申请提供一种信息处理方法及装置, 可有效提高数字资产的授权效率和 安全性。
[0010] 第一方面, 本申请实施例提供了一种信息处理方法, 包括:
[0011] 区块链节点接收数字资产处理请求, 所述数字资产处理请求用于请求获得 处理数字资产的权限;
[0012] 所述区块链节点在接收到所述数字资产处理请求的情况下, 所述区块链节 点向 M个电子设备中的每个电子设备发送授权请求, 所述授权请求用于请求授权 处理所述数字资产;
[0013] 所述区块链节点确定所述 M个电子设备中至少 N个电子设备中的每个电子 设备授权处理所述数字资产, 所述 M大于或等于所述 N;
[0014] 所述第一区块链节确定获得处理所述数字资产的权限。
[0015] 本申请实施例中, 所述区块链节点在接收到数字资产处理请求之后, 则将 所述数字资产处理请求中用于请求处理数字资产的权限的授权请求发送至其他 M 个电子设备, 当所述区块链节点确定至少有 N个电子设备授权处理所述数字资产 时, 则区块链节点获得处理所述数字资产的权限。 实施本申请实施例, 对于某 一数字资产来说, 当区块链节点发起请求获得处理该数字资产处理的权限时, 且该数字资产处理请求包括授权请求, 上述区块链节点能够将该授权请求发送 给其他电子设备, 上述区块链节点通过判断其他电子设备签名授权的比例, 最 终实现多方授权交易, 能够有效提高多方授权的效率。
[0016] 在一种可能的实现方式中, 所述区块链节点确定获得处理所述数字资产的 权限之前, 所述方法还包括:
[0017] 所述区块链节点授权处理所述数字资产;
[0018] 所述区块链节点确定获得处理所述数字资产的权限, 包括:
[0019] 在所述区块链节点授权处理所述数字资产的情况下, 所述区块链节点确定 获得处理所述数字资产的权限。
[0020] 本申请实施例中, 在所述区块链节点授权处理所述数字资产的情况下, 才 开始执行所述数字资产处理请求, 可避免有效避免由于区块链节点身份信息错 误, 导致区块链节点身份授权失败, 最终错误执行所述数字资产处理请求。 由 此可有效提高授权过程的安全性。
[0021] 在一种可能的实现方式中, 所述数字资产包括经过目标公钥加密的数字资 产, 所述目标公钥对应的目标私钥包括第一分散密钥, 所述第一分散密钥存储 于所述区块链节点中, 所述区块链节点授权处理所述数字资产, 包括:
[0022] 所述区块链节点通过所述第一分散密钥对所述数字资产进行签名得到第一 授权签名, 根据所述第一授权签名确定授权处理所述数字资产。
[0023] 本申请实施例中, 区块链节点自身可通过该区块链节点存储的第一分散密 钥对该数字资产进行授权, 可以防止非法用户通过该区块链节点发起授权请求 , 避免了所述数字资产被盗用的风险, 提高了数字资产在交易过程中的安全性 [0024] 在一种可能的实现方式中, 所述目标私钥还包括 M个分散密钥, 所述 M个 分散密钥分别存储于所述 M个电子设备中, 且所述 M个分散密钥与所述 M个电子 设备 对应, 所述 M个分散密钥中的 N个分散密钥用于对所述数字资产进行签 名得到 N个授权签名;
[0025] 所述区块链节点确定所述 M个电子设备中至少 N个电子设备中的每个电子 设备授权处理所述数字资产之后, 所述方法还包括:
[0026] 所述区块链节点对所述第一授权签名和所述 N个授权签名进行合成, 得到 目标签名结果;
[0027] 所述区块链节点根据所述目标签名结果合成所述目标私钥;
[0028] 所述区块链节点确定获得处理所述数字资产的权限, 包括:
[0029] 所述区块链节点通过所述目标私钥解密所述目标公钥, 确定获得处理所述 数字资产的权限。
[0030] 本申请实施例中, 通过将第一授权签名和 N个授权签名合成为目标签名结 果, 并通过该目标签名结果得到目标私钥, 最终通过该目标私钥解密经过目标 公钥加密的所述数字资产, 最终所述区块链节点才确定获得处理所述数字资产 的权限, 可有效保证授权过程的安全性。
[0031] 在一种可能的实现方式中, 所述区块链节点确定获得处理所述数字资产的 权限, 包括:
[0032] 所述区块链节点将所述目标签名结果生成签名记录;
[0033] 所述区块链节点将所述签名记录保存在区块链账本中。
[0034] 本申请实施例中, 通过将所述签名记录保存在区块链账本中的方式, 可以 将上述数字资产的交易记录及时进行存储, 可有效提高数字资产在交易过程中 的准确率。
[0035] 第二方面, 本申请实施例还提供了一种信息处理方法, 包括:
[0036] 电子设备接收授权请求, 所述授权请求用于请求授权处理数字资产;
[0037] 所述电子设备授权处理所述数字资产, 得到授权结果;
[0038] 所述电子设备向区块链节点发送所述授权结果。 [0039] 本申请实施例中, 通过上述电子设备授权处理上述授权请求, 在授权通过 的所述数字资产的情况下, 将授权结果发送给上述区块链节点, 能够提高授权 过程的安全性。
[0040] 在一种可能的实现方式中, 所述数字资产包括经过目标公钥加密的数字资 产, 所述目标公钥对应的目标私钥包括第二分散密钥, 所述第二分散密钥存储 于所述电子设备中, 所述电子设备授权处理所述数字资产, 得到授权结果, 包 括:
[0041] 所述电子设备通过第二分散密钥对所述数字资产签名得到第二授权签名, 根据所述第二授权签名确定授权处理所述数字资产。
[0042] 本申请实施例中, 上述电子设备通过上述第二分散密钥对上述数字资产进 行签名, 由于该分散密钥具有唯一性, 不仅保证了该电子设备的合法性, 且保 证了上述数字资产在交易过程中保密性, 可有效提高数字资产交易的安全性。
[0043] 第三方面, 本申请实施例提供了一种信息处理装置, 包括:
[0044] 第一接收单元, 用于区块链节点接收数字资产处理请求, 所述数字资产处 理请求用于请求获得处理数字资产的权限;
[0045] 第一发送单元, 用于所述区块链节点在接收到所述数字资产处理请求的情 况下, 所述区块链节点向 M个电子设备中的每个电子设备发送授权请求, 所述授 权请求用于请求授权处理所述数字资产;
[0046] 第一确定单元, 用于所述区块链节点确定所述 M个电子设备中至少 N个电 子设备中的每个电子设备授权处理所述数字资产, 所述 M大于或等于所述 N;
[0047] 第二确定单元, 用于所述区块链节点确定获得处理所述数字资产的权限。
[0048] 在一种可能的实现方式中, 所述装置还包括:
[0049] 第一处理单元, 用于所述区块链节点授权处理所述数字资产;
[0050] 所述第二确定单元, 具体用于在所述区块链节点授权处理通过所述数字资 产的情况下, 所述区块链节点确定获得处理所述数字资产的权限。
[0051] 在一种可能的实现方式中, 所述装置包括:
[0052] 所述第一处理单元, 具体用于所述区块链节点通过所述第一分散密钥对所 述数字资产进行签名得到第一授权签名, 根据所述第一授权签名确定授权处理 所述数字资产。
[0053] 在一种可能的实现方式中, 所述装置还包括:
[0054] 合成单元, 用于所述区块链节点对所述第一授权签名和所述 N个授权签名 进行合成, 得到目标签名结果;
[0055] 第三确定单元, 用于所述区块链节点根据所述目标签名结果确定所述目标 私钥;
[0056] 所述第二确定单元, 还用于所述区块链节点通过所述目标私钥解密所述目 标公钥, 确定获得处理所述数字资产的权限。
[0057] 在一种可能的实现方式中, 所述装置还包括:
[0058] 生成单元, 用于所述区块链节点将所述目标签名结果生成签名记录;
[0059] 存储单元, 用于所述区块链节点将所述签名记录保存在区块链账本中。
[0060] 第四方面, 本申请实施例还提供了一种信息处理装置, 包括:
[0061] 第二接收单元, 用于电子设备接收授权请求, 所述授权请求用于请求授权 处理数字资产;
[0062] 处理单元, 用于所述电子设备授权处理所述数字资产, 得到授权结果;
[0063] 第二发送单元, 用于所述电子设备向区块链节点发送所述授权结果。
[0064] 在一种可能的实现方式中, 所述装置包括:
[0065] 所述处理单元, 还用于所述电子设备通过第二分散密钥对所述数字资产进 行签名得到第二授权签名, 根据所述第二授权签名确定授权处理所述数字资产
[0066] 第五方面, 本申请实施例还提供了一种区块链节点设备, 包括: 处理器和 存储器; 所述处理器与所述存储器耦合, 所述存储器中存储有程序指令; 所述 程序指令被所述处理器执行时, 使所述处理器执行如第一方面所述的方法的相 应功能。
[0067] 第六方面, 本申请实施例还提供了一种电子设备, 包括: 处理器和存储器
; 所述处理器与所述存储器耦合, 所述存储器中存储有程序指令; 所述程序指 令被所述处理器执行时, 使所述处理器执行如第二方面所述的方法的相应功能 [0068] 第七方面, 本申请实施例提供了一种计算机可读存储介质, 所述计算机可 读存储介质中存储有指令, 当其在计算机上运行时, 使得计算机执行上述第一 方面或第二方面所述的方法。
[0069] 第八方面, 本申请实施例提供了一种包含指令的计算机程序产品, 当其在 计算机上运行时, 使得计算机执行上述第一方面或第二方面所述的方法。
[0070] 附图说明
[0071] 为了更清楚地说明本申请实施例或背景技术中的技术方案, 下面将对本申请实 施例或背景技术中所需要使用的附图进行说明。
[0072] 图 1是本申请实施例提供的一种信息处理系统的架构示意图;
[0073] 图 2a是本申请实施例提供的一种信息处理方法的流程示意图;
[0074] 图 2b是本申请实施例提供的另一种信息处理方法的流程示意图;
[0075] 图 3是本申请实施例提供的一种信息处理方法的流程示意图;
[0076] 图 4是本申请例提供的又一种信息处理方法的流程示意图;
[0077] 图 5是本申请实施例提供的一种信息处理装置的结构示意图;
[0078] 图 6是本申请实施例提供的另一种信息处理装置的结构示意图;
[0079] 图 7是本申请实施例提供的又一种信息处理装置的结构示意图;
[0080] 图 8是本申请实施例提供的一种信息处理装置的结构示意图;
[0081] 图 9是本申请实施例提供的另一种信息处理装置的结构示意图。
[0082] 具体实施方式
[0083] 为了使本申请的目的、 技术方案和优点更加清楚, 下面将结合附图对本申请作 进一步地详细描述。
[0084] 本申请的说明书和权利要求书及上述附图中的术语“第一”、 “第二”等是用于区 别不同的对象, 而不是用于描述特定顺序。 此外, 术语“包括”和“具有”以及它们 任何变形, 意图在于覆盖不排他的包含。 例如包含了一系列步骤或单元的过程 、 方法、 系统、 产品或设备没有限定于已列出的步骤或单元, 而是可选地还包 括没有列出的步骤或单元, 或可选地还包括对于这些过程、 方法或设备固有的 其他步骤或单元。
[0085] 下面将结合附图对本申请实施例进行描述。 [0086] 图 1是本申请实施例提供的一种信息处理系统的架构示意图, 如图 1所示, 该信 息处理系统包括: 区块链节点 101和电子设备 102, 其中上述电子设备包括 M个电 子设备; 其中, 区块链节点 101和电子设备 102通信连接, 如可通过无线方式连 接等等, 本申请实施例对于该区块链节点和该电子设备之间的通信连接方式不 作唯一性限定。
[0087] 其中, 区块链平台可对数字资产通过目标公钥进行加密, 且通过该目标公钥对 应的目标私钥可以解密该数字资产, 即该目标公钥和该目标私钥是成对出现的 。 具体的, 可通过公钥加密算法对该数字资产进行加密, 如非对称加密算法 RSA 、 椭圆曲线公钥密码算法 SM2等。 然后, 将该目标私钥分割成 M+1个分散密钥, 并将该 M+1个分散密钥分别存储在区块链节点和电子设备 (即 1个区块链节点和 M个电子设备) 中, 且该区块链节点和 M个电子设备都只存储对应的一个分散密 钥。 也就是说, 该数字资产的私钥可被分割为 M+1份, 从而分别被发送给 1个区 块链节点以及 M个电子设备。 可理解, 本申请实施例中对于具体的加密算法不作 限定。
[0088] 本申请实施例中, 区块链节点接收数字资产处理请求, 该数字资产处理请求用 于请求处理数字资产的权限; 区块链节点向 M个电子设备中的每个电子设备发送 授权请求, 该授权请求用于请求处理数字资产的权限; 电子设备接收来自区块 链节点的授权请求, 并将至少 N个来自其他区块链节点的授权结果发送给区块链 节点; 最后, 区块链节点确定获得处理所述数字资产的权限。
[0089] 参见图 2a, 图 2a是本申请实施例提供的一种信息处理方法的流程示意图, 该信 息处理方法可应用于图 1所示的系统框架中的区块链节点。 如图 2a所示, 该方法 包括:
[0090] 201、 区块链节点接收数字资产处理请求, 上述数字资产处理请求用于请求获 得处理数字资产的权限。
[0091] 本申请实施例中, 该区块链节点可接收用户输入的数字资产处理请求, 或者, 也可以接收来自其他设备如区块链平台或其他服务器发送的数字资产处理请求 等等, 本申请实施例对于该区块链节点所接收到的数字资产处理请求的来源不 作唯一性限定。 [0092] 本申请实施例中, 上述区块链节点可以为区块链网络中的计算机, 包括手机、 矿机、 台式机和服务器等等。 其中, 上述数字资产可以为歌曲、 视频、 合同、 数据文件等有价值的文件。 举例来说, 上述数字资产可以为一份房屋出租合同 , 该房屋出租合同中可包括出租方的身份信息, 房屋基本情况, 租金和押金交 纳期及方式, 水电费、 保洁费、 电话费和维修费的缴费办法, 出租方和承租方 的变更, 承租方的职责, 出租方的责任, 以及租赁期间和合同期满的相关规定 等。 可理解, 本申请实施例对上述数字资产的具体内容不作限定。
[0093] 本申请实施例中, 上述区块链节点可以接收数字资产处理请求, 其中, 该数字 资产处理请求可以为对上述数字资产进行授权、 交易、 分割、 转让、 转移、 购 买、 出租、 拷贝、 查看等等权限的处理请求。 可理解, 本申请实施例对上述处 理请求的具体内容不作限定。
[0094] 202、 所述区块链节点在接收到所述数字资产处理请求的情况下, 上述区块链 节点向 M个电子设备中的每个电子设备发送授权请求, 上述授权请求用于请求授 权处理上述数字资产。
[0095] 本申请实施例中, 上述电子设备也可以为一种区块链节点。 上述授权请求可以 理解为对上述数字资产的授权签名。 举例来说, 上述授权请求可以为一份需要 甲方或乙方签字授权的房屋出租合同、 一份需要签字授权的财产转让协议、 一 份需要多方授权签名的机密文件等等。 可理解, 本申请实施例对于上述授权请 求的具体形式和具体内容不作限定。
[0096] 本申请实施例中, 上述区块链节点向 M个电子设备中的每个电子设备发送授权 请求。 其中, 上述区块链节点可通过全网广播的方式发送上述授权请求。 或者 , 上述区块链节点还可以单独的向上述 M个电子设备逐一发送上述授权请求。 可 理解, 本申请实施中对于该发送方式不作限定。
[0097] 实施本申请实施例, 上述区块链节点可以快速、 准确的将上述授权请求发送给 上述电子设备, 有效提高了传输过程的效率。 可理解, 本申请实施例对于具体 的发送方式不作限定。
[0098] 203、 上述区块链节点确定上述 M个电子设备中至少 N个电子设备中的每个电子 设备授权处理上述数字资产, 上述 M大于或等于上述 N。 [0099] 本申请实施例中, 上述区块链节点确定上述 M个电子设备中至少 N个电子设备 中的每个电子设备授权通过上述数字资产, M大于或等于 N。 实施本申请实施例 , 通过 N个上述电子设备对上述数字资产的授权处理, 可以确保数字资产的唯一 性, 即防止双花问题, 避免某一方对数字资产进行篡改, 能够有效保证数字资 产的合法性。
[0100] 其中, 在上述数字资产为一份加密文件的情况下, 通过公钥加密算法对该加密 文件进行加密, 即通过公钥对该数字资产进行加密, M可以理解为将上述数字资 产的目标公钥对应的目标私钥分割为 M+1份分散密钥, 并将该 M+1个分散密钥分 发给 M+1个设备一一保管。 N+1可以为解密上述数字资产必要的最少份数, M大 于或等于 N, 且 M和 N为大于或等于 1的整数。
[0101] 具体的, 以上述数字资产为一份加密文件进行说明, 可以将上述数字资产的目 标私钥简单的平均分割成 k份。 尽管这种方法可以实现对上述数字资产目标私钥 的分割, 但是在实际应用中往往不能满足市场需求。 因此, 本申请实施例提供 了一种对上述数字资产的目标私钥进行分割的方法, 如下所示:
[0102] 本申请实施例中, 上述对数字资产的目标私钥进行分割的方法可以为通过密钥 分解算法实现对数字资产的目标私钥的分割。 具体的, 可通过以下步骤实现: 首先, 输入原目标私钥, 即上述数字资产的目标私钥; 然后设置分割参数 m与 N , 计算^£ -16 1;11=(1!_111/\]^-1) , subkey-length=C_(m- 1)A(N-1); 生成 key-length长 密钥分解数组 N[i]=i, 然后通过密钥分解算法分配生成 m^ubkey-length长子密钥 数组; 以 subkey-length长为单位将上述数字资产的目标私钥分成 block-num块, 不足部分记为 excess字节; 创建 m个空子文件夹, 分别将参数 m, N, block-num , excess以及相应的子密钥填入 m个子文件的文件头, 依据子密钥信息将上述数 字资产的目标私钥每块内的相应字节填入子文件, 依次进行下去, 直到处理完 所有的块; 最后将剩余部分补进每个子文件尾部, 完成对上述数字资产的目标 私钥的分割, 即最终得到 M+1个分散密钥。 其中, 当完成对上述数字资产的目标 私钥的分割之后, 可以将分割之后的 m份上述数字资产的目标私钥通过 m个设备 (即区块链节点设备和电子设备) 分别进行保管。 可理解, 本申请实施例还可 以通过上述方法将数字资产的目标私钥分割为 M+1份, 以及分别通过 M+1个设备 (即区块链节点设备和电子设备) 保管, 这里不再一一详述。
[0103] 实施本申请实施例, 通过将上述数字资产的目标私钥分割成 M+1份分散密钥, 不仅可以实现“化大为小, 便于保管”的作用, 也可以避免当其中任意 M+1-N个子 数字资产的分散密钥损坏时仍能将原数字资产恢复, 而其中任意不足 N个子数字 资产的分散密钥泄密时也不足以将原数字资产暴露, 可有效提高上述数字资产 的保密性和安全性。 可理解, 上述对于数字资产的目标私钥的分割方法仅为举 例, 本申请实施例不作具体限定。
[0104] 本申请实施例中, 上述区块链节点确定上述 M个电子设备中至少 N个电子设备 中的每个电子设备授权通过上述数字资产。 其中, 上述区块链节点通过接收来 自电子设备的授权签名的个数来确定上述 N的数量。 实施本申请实施例, 可以通 过确定 N的数量的方式简单快速的确定对处理上述数字资产的必要数量, 可避免 因必须确定 M+1个授权签名而导致对上述数字资产的处理请求无法完成的情况, 提高了效率。 可理解, 本申请实施例对于上述具体的确定方式不作限定。
[0105] 204、 上述区块链节点确定获得处理所述数字资产的权限。
[0106] 本申请实施例中, 可理解上述区块链节点确定获得处理所述数字资产的权限与 上述数字资产的具体的处理请求对应。 具体的, 上述数字资产处理请求若为对 上述数字资产进行授权、 交易、 分割、 转让、 转移、 购买、 出租、 拷贝、 查看 等等权限的处理请求, 则上述区块链节点确定获得处理上述数字资产的权限即 为对上述数字资产进行授权、 交易、 分割、 转让、 转移、 购买、 出租、 拷贝、 查看等等的具体操作。 可理解, 本申请实施例对上述数字资产权限的具体内容 不作限定。
[0107] 实施本申请实施例, 当一个区块链节点发起数字资产处理请求时, 且该数字资 产处理请求包括授权请求, 上述区块链节点能够将该授权请求发送给其他电子 设备, 避免双花问题, 上述区块链节点通过判断其他电子设备签名授权的比例 , 最终实现多方授权交易, 能够有效提高多方授权的效率。
[0108] 参见图 2b, 图 2b是本申请实施例提供的另一种信息处理方法的流程示意图, 该 信息处理方法可应用于图 1所示的系统框架中的区块链节点。 如图 2b所示, 该方 法包括: [0109] 211、 区块链节点接收数字资产处理请求, 上述数字资产处理请求用于请求处 理数字资产的权限。
[0110] 本申请实施例中, 对于区块链节点接收数字资产处理请求的具体实现方式可以 参考图 2a所示步骤 201所示的实现方式, 这里不再一一详述。
[0111] 212、 上述区块链节点授权处理上述数字资产。
[0112] 本申请实施例中, 上述区块链节点自身可以对上述数字资产进行授权处理, 一 方面可以保证该数字资产交易可以更加高效, 另一方面可以防止非法用户盗用 该区块链节点的身份信息发起授权请求。
[0113] 在一种可能的实现方式中, 上述数字资产包括经过目标公钥加密的数字资产, 上述目标公钥对应的目标私钥包括第一分散密钥, 上述第一分散密钥存储于上 述区块链节点中, 上述区块链节点授权处理上述数字资产, 包括:
[0114] 上述区块链节点通过上述第一分散密钥对上述数字资产进行签名得到第一授权 签名, 根据上述第一授权签名确定授权处理上述数字资产。
[0115] 本申请实施例中, 上述区块链节点可以通过自身保存的第一分散密钥对数字资 产进行签名, 由于该第一分散密钥具有唯一性, 因此通过该第一分散密钥进行 签名可以有效保证上述第一授权签名的真实性。 实施本申请实施例, 可以有效 避免该区块链节点的身份信息被篡改, 极大的提高了数字资产授权交易过程的 安全性。
[0116] 213、 上述区块链节点向 M个电子设备中的每个电子设备发送授权请求, 上述 授权请求用于请求授权处理上述数字资产。
[0117] 本申请实施例中, 对于上述步骤 213的具体实现方式可以参考图 2a所示步骤 202 所示的实现方式, 这里不再一一详述。
[0118] 214、 上述区块链节点确定上述 M个电子设备中至少 N个电子设备中的每个电子 设备授权处理上述数字资产, M大于或等于 N。
[0119] 本申请实施例中, 对于上述步骤 214的具体实现方式可参考图 2a所示步骤 203所 示的实现方式, 这里不再一一详述。
[0120] 215、 上述区块链节点对上述第一授权签名和 N个授权签名进行合成, 得到目标 签名结果。 [0121] 本申请实施例中, 上述至少 N个电子设备中的每个电子设备对应一个授权签名 。 具体的, 上述授权签名可附在上述数字资产中。
[0122] 在一种可能的实现方式中, 上述目标私钥还包括 M个分散密钥, 上述 M个分散 密钥分别存储于上述 M个电子设备中, 且上述 M个分散密钥与上述 M个电子设备 一一对应, 上述 M个分散密钥中的 N个分散密钥用于对上述数字资产进行签名得 到 N个授权签名;
[0123] 上述区块链节点确定上述 M个电子设备中至少 N个电子设备中的每个电子设备 授权处理上述数字资产之后, 上述方法还包括:
[0124] 上述区块链节点对上述第一授权签名和上述 N个授权签名进行合成, 得到目标 签名结果;
[0125] 上述区块链节点根据上述目标签名结果确定上述目标私钥;
[0126] 上述区块链节点确定获得处理上述数字资产的权限, 包括:
[0127] 上述区块链节点通过上述目标私钥解密上述目标公钥, 确定获得处理上述数字 资产的权限。
[0128] 其中, 上述对授权签名进行合成得到目标签名结果可以为, 上述区块链节点可 以将来自电子设备的至少 N个授权签名和上述第一授权签名进行编号, 并将编号 之后的所有至少 N个授权签名和上述第一授权签名以附录的形式附在上述数字资 产中, 则该附录即为目标签名结果。 实施本申请实施例, 可通过上述方式方便 、 高效的完成对授权签名 (该授权签名包括第一授权签名和 N个授权签名) 的合 成, 提高效率。
[0129] 至于上述 M个分散密钥的来源, 可参考图 2a所示步骤 203所示的实现方式, 这 里不再一一详述。
[0130] 可选的, 以上述数字资产为一份加密文件进行说明, 本申请实施例提供了一种 将上述授权签名合成为目标签名结果的方法。 由于上述授权签名附在上述数字 资产中, 且该授权签名是通过分散密钥进行签名得到的, 因此对上述目标签名 结果的合成过程也可以理解为恢复上述目标私钥的过程。 相应的, 本申请实施 例提供了一种对上述数字资产的目标私钥进行恢复的方法, 如下所示:
[0131] 本申请实施例中, 上述对数字资产的目标私钥进行恢复的方法可以为通过文件 安全恢复算法实现对该目标私钥的恢复。 具体的, 可通过以下步骤实现: 首先 , 依据给定的子文件提取参数 M+l, N, block-num, excess及密钥信息, 该子文 件可以理解为来自上述电子设备的附有签名结果的数字资产; 然后根据上述参 数及密钥信息创建子文件访问表; 接着创建空原文件, 依据子文件访问表将子 文件的相应字节填入原文件; 最后将任一子文件剩余部分, 附加在原文件尾部 , 完成原文件的恢复工作, 该原文件对应于被分割成 M+1份的原数字资产的目标 私钥。 其中, 来自上述电子设备的数字资产均附有相应的授权签名, 因此被恢 复的原数字资产的目标私钥被被包含于来自电子设备的授权签名, 也就是说, 完成恢复原数字资产的目标私钥也就相应的完成了目标签名结果的合成。 实施 本申请实施例, 通过文件安全恢复算法可以高效、 准确的将上述数字资产的目 标私钥恢复, 提高了效率。 可理解, 本申请实施例中对于上述目标签名结果的 具体合成方式不作限定。
[0132] 本申请实施例中, 在得到上述目标私钥之后, 可以通过上述目标私钥解密上述 数字资产的目标公钥, 从而, 上述区块链节点可以获得该数字资产的处理权限 , 其中, 该目标私钥和该目标公钥为对应的一对公钥和私钥。
[0133] 实施本申请实施例, 通过将区块链节点自身的授权签名以及 N个电子设备的 N 个授权签名合成为目标签名结果, 并通过将该目标签名结果中确定目标私钥, 以及通过该目标私钥解密上述目标公钥, 最终获得处理上述数字资产的权限, 上述过程安全、 高效, 有效提高了数字资产授权过程的安全性和效率。
[0134] 216、 在上述目标签名结果授权处理通过的情况下, 上述区块链节点确定获得 处理所述数字资产的权限。
[0135] 本申请实施例中, 在上述目标签名结果授权处理通过的情况下, 对于上述区块 链节点执行上述数字资产处理请求的具体实现方式可参考图 1所示步骤 104所示 的实现方式, 这里不再一一详述。
[0136] 在一种可能的实现方式中, 上述区块链节点确定获得处理所述数字资产的权限 之后, 上述方法还包括:
[0137] 上述区块链节点根据上述目标签名结果生成签名记录;
[0138] 上述区块链节点将上述签名记录保存在区块链账本中。 [0139] 本申请实施例中, 上述区块链节点根据上述目标签名结果生成签名记录, 该签 名记录中包括上述目标签名结果生成的时间记录, 也就是说为上述目标签名结 果盖上时间戳。 然后, 上述区块链节点将上述签名记录保存在区块链账本中。 其中, 该时间戳可以为自建时间戳, 即通过时间接收设备 (如 GPS, CDMA, 北 斗卫星) 来获取时间戳到时间戳服务器上, 并通过时间戳服务器签发时间戳证 书; 然后上述区块链节点上获取该时间戳证书。 或者, 该时间戳可以为具有法 律效力的时间戳, 即由我国中科院国家授时中心与北京联合信任技术服务有限 公司负责建设的我国第三方可信时间戳认证服务, 然后上述区块链节点上获取 该时间戳。 可理解, 本申请实施例中对于如何得到该时间戳不作限定。 实施本 申请实施例, 可通过时间戳保证上述区块链账本的唯一性, 可避免信息欺诈等 虚假交易现象, 能够保证上述数字资产的安全性。
[0140] 本申请实施例中, 通过对上述数字资产进行授权并加密, 以及将签名结果生成 签名记录, 并保存在区块链账本中, 能够有效保证数字资产的安全性, 可避免 信息欺诈等虚假交易现象, 能够保证上述数字资产的安全性。
[0141] 实施本申请实施例, 上述区块链节点和上述 N个电子设备通过各自存储的分散 密钥进行授权签名, 由于分散密钥的不可复制性, 极大地保证了上述授权签名 的真实性和可靠性, 可避免上述授权过程被非法用户篡改, 有效保证了授权过 程的合理性和安全性。
[0142] 参见图 3 , 图 3是本申请实施例提供的一种信息处理方法的流程示意图, 该信息 处理方法可应用于图 1所示的系统框架中的电子设备。 如图 3所示, 该方法包括
[0143] 301、 电子设备接收授权请求, 上述授权请求用于请求授权处理数字资产。
[0144] 本申请实施例中, 上述授权请求可以理解为对上述数字资产的授权、 交易、 分 害 1J、 转让、 转移、 购买、 出租、 拷贝、 查看等等处理请求。 可理解, 本申请实 施例对上述授权请求的具体内容不作限定。
[0145] 302、 上述电子设备授权处理上述数字资产, 得到授权结果。
[0146] 本申请实施例中, 授权上述数字资产的过程可以理解为对上述区块链节点发送 的数字资产的授权签名过程, 则上述授权结果即为授权签名结果。 [0147] 具体的, 本申请实施例提供了一种对上述数字资产授权处理的方法, 即对上述 数字资产进行授权签名的方法。 如下所示:
[0148] 在一种可能的实现方式中, 上述数字资产包括经过目标公钥加密的数字资产, 上述目标公钥对应的目标私钥包括第二分散密钥, 上述第二分散密钥存储于上 述电子设备中, 上述电子设备授权上述数字资产, 包括:
[0149] 上述电子设备通过第二分散密钥对上述上述数字资产签名得到第二授权签名, 根据上述第二授权签名确定授权处理所述数字资产。
[0150] 本申请实施例中, 对上述数字资产进行授权签名的方法的具体实现方式可参考 图 2b所示步骤 212所示的实现方式, 这里不再一一详述。 可理解, 本申请实施例 中只描述了 N个电子设备中其中任意一个电子设备授权签名的过程, 至于其他电 子设备的授权签名过程可参考上述电子设备的授权签名过程, 在此不再一一详 述。
[0151] 实施本申请实施例, 通过 N个上述电子设备对上述数字资产的授权签名, 可以 确保数字资产的唯一性, 即防止双花问题, 避免某一方对数字资产进行篡改, 能够有效保证数字资产的合法性。
[0152] 303、 上述电子设备向区块链节点发送上述授权结果。
[0153] 本申请实施例中, 上述电子设备可以将携带有上述授权结果 (即第二授权签名 ) 发送给上述区块链节点。
[0154] 实施本申请实施例, 上述电子设备通过接收上述授权请求; 然后对上述授权请 求进行签名, 并附上授权签名结果; 最后将授权结果 (即授权签名) 发送给上 述区块链节点。 实施本申请实施例, 能够高效、 简单且安全的实现对数字资产 的授权签名, 有效提高效率。
[0155] 参见图 4, 图 4是本申请实施例提供的又一种信息处理方法的流程示意图, 该信 息处理方法可应用于图 1所示的系统。 如图 4所示, 该方法包括:
[0156] 401、 区块链节点接收数字资产处理请求, 上述数字资产处理请求用于请求处 理数字资产的权限。
[0157] 其中, 数字资产可以为歌曲、 视频、 合同、 数据文件等有价值的文件。 数字资 产处理请求即为对该数字资产进行授权、 交易、 分割、 转让、 转移、 购买、 出 租、 拷贝、 查看等等权限的处理请求。 可理解, 本申请实施例对于数字资产的 具体内容和具体处理请求不作限定。
[0158] 402、 上述区块链节点向 M个电子设备中的每个电子设备发送授权请求, 电子 设备接收上述授权请求, 上述授权请求用于请求授权处理上述数字资产。
[0159] 本申请实施例中, 上述电子设备接收来自上述区块链节点的授权请求, 该授权 请求用于授权来自上述区块链节点发送的数字资产。 其中, 该授权请求可以理 解为对上述数字资产的授权、 交易、 分割、 转让、 转移、 购买、 出租、 拷贝、 查看等等处理请求。 可理解, 本申请实施例对上述授权请求的具体内容不作限 定。
[0160] 403、 上述电子设备授权处理上述数字资产, 得到授权结果。
[0161] 本申请实施例中, 授权上述数字资产的过程可以理解为对上述区块链节点发送 的数字资产的授权签名过程, 则上述授权结果即为授权签名。 可理解, 该授权 结果可用于指示区块链节点授权数字资产。
[0162] 404、 上述电子设备向区块链节点发送上述授权结果, 区块链节点接收电子设 备发送的上述授权结果。
[0163] 本申请实施例中, 上述电子设备可以将携带有授权通过的授权结果 (即 N个授 权签名) 信息发送给上述区块链节点。
[0164] 405、 上述区块链节点确定上述 M个电子设备中至少 N个电子设备中的每个电子 设备授权处理通过上述数字资产, 上述 M大于或等于上述 N。
[0165] 本申请实施例中, 上述区块链节点能够判断来自电子设备的授权结果的数量是 否达到必要的最少预定数量 N (即预定授权比例) , 当授权结果的数量达到数量 N+1 (包括区块链节点自身的第一授权签名) 时, 上述区块链节点可以继续接收 来自上述电子设备的授权结果, 也可以停止接收该授权结果。 可理解, 本申请 实施例对于区块链节点接收的授权结果具体数量不作限定。
[0166] 406、 上述区块链节点确定获得处理上述数字资产的权限。
[0167] 本申请实施例中, 上述区块链节点可以将达到授权比例的授权结果用于执行上 述数字资产处理请求, 实现对该数字资产的授权、 交易、 分割、 转让、 转移、 购买、 出租、 拷贝、 查看等等操作。 可理解, 本申请实施例对上述执行处理请 求的具体内容不作限定。
[0168] 实施本申请实施例, 当获得数字资产的一个区块链节点发起数字资产处理请求 时, 且该数字资产处理请求包括授权请求, 上述区块链节点能够将该授权请求 发送给其他区块链节点, 上述区块链节点通过判断其他区块链节点签名授权的 比例, 最终实现多方授权交易, 能够有效提高多方授权的效率。
[0169] 可理解, 图 1、 图 2a、 图 2b、 图 3和图 4所示的方法各有侧重, 因此在一个实施 例中未详尽描述的实现方式还可参考其他实施例, 这里不再一一详述。
[0170] 上述详细阐述了本申请实施例的方法, 下面提供了本申请实施例的装置。
[0171] 参见图 5 , 图 5是本申请实施例提供的一种信息处理装置的结构示意图, 该信息 处理装置可用于执行图 2a、 图 2b所示的方法, 如图 5所示, 该信息处理装置包括
[0172] 第一接收单元 501, 用于区块链节点接收数字资产处理请求, 上述用于请求处 理数字资产的权限;
[0173] 第一发送单元 502, 用于所述区块链节点在接收到所述数字资产处理请求的情 况下, 上述区块链节点向 M个电子设备中的每个电子设备发送授权请求, 上述授 权请求用于请求授权处理上述数字资产;
[0174] 第一确定单元 503 , 用于上述区块链节点确定上述 M个电子设备中至少 N个电子 设备中的每个电子设备授权处理上述数字资产, 上述 M大于或等于上述 N;
[0175] 第二确定单元 504, 用于上述区块链节点确定获得处理所述数字资产的权限。
[0176] 实施本申请实施例, 当一个区块链节点发起数字资产处理请求时, 且该数字资 产处理请求包括授权请求, 上述区块链节点能够将该授权请求发送给其他电子 设备, 上述区块链节点通过判断其他电子设备签名授权的比例, 最终实现多方 授权交易, 能够有效提高多方授权的效率。
[0177] 可选的, 图 6是本申请实施例提供的另一种信息处理装置的结构示意图, 如图 6 所示, 上述装置还包括:
[0178] 第一处理单元 505 , 用于上述区块链节点授权处理上述数字资产;
[0179] 上述第二确定单元 504, 具体用于在上述区块链节点授权处理通过上述数字资 产的情况下, 上述区块链节点确定获得处理所述数字资产的权限。 [0180] 可选的, 如图 6所示, 上述装置包括:
[0181] 上述第一处理单元 505 , 用于上述区块链节点通过上述第一分散密钥对上述数 字资产进行签名得到第一授权签名, 根据所述第一授权签名确定授权处理所述 数字资产。
[0182] 可选的, 图 7是本申请实施例提供的又一种信息处理装置的结构示意图, 如图 7 所示, 上述装置还包括:
[0183] 合成单元 506 , 用于上述区块链节点对上述第一授权签名和上述 N个授权签名进 行合成, 得到目标签名结果;
[0184] 第三确定单元 507 , 用于上述区块链节点根据上述目标签名结果确定上述目标 私钥;
[0185] 上述第二确定单元 504, 还用于上述区块链节点通过上述目标私钥解密上述目 标公钥, 确定获得处理上述数字资产的权限。
[0186] 可选的, 如图 7所示, 上述装置还包括:
[0187] 生成单元 508 , 用于上述区块链节点将上述目标签名结果生成签名记录;
[0188] 存储单元 509 , 用于上述区块链节点将上述签名记录保存在区块链账本中。
[0189] 可理解, 图 5、 图 6、 和图 7所示的信息处理装置的具体实现方式还可参考图 2a 、 图 2b所示的方法, 这里不再一一详述。
[0190] 参见图 8 , 图 8是本申请实施例提供的一种信息处理装置的结构示意图, 该信息 处理装置可用于执行图 3所示的方法, 如图 8所示, 该信息处理装置包括:
[0191] 第二接收单元 801, 用于电子设备接收授权请求, 上述授权请求用于请求授权 处理数字资产;
[0192] 处理单元 802, 用于上述电子设备授权处理上述数字资产, 得到授权结果;
[0193] 第二发送单元 803 , 用于上述电子设备向区块链节点发送上述授权结果。
[0194] 可选的, 如图 8所示, 上述装置包括:
[0195] 上述处理单元 802, 还用于上述电子设备通过第二分散密钥对上述数字资产进 行签名得到第二授权签名, 根据上述第二授权签名确定授权处理上述数字资产
[0196] 本申请实施例中, 上述电子设备通过接收上述授权请求; 然后对上述授权请求 中的数字资产进行加密, 并附上授权签名结果; 最后将授权结果 (即授权签名 ) 发送给上述区块链节点。 实施本申请实施例, 能够高效、 简单且安全的实现 对数字资产的授权签名, 有效提高效率。
[0197] 可理解, 图 8所示的信息处理装置的具体实现方式还可参考图 3所示的方法, 这 里不再一一详述。
[0198] 参见图 9 , 图 9是本申请实施例提供的另一种信息处理装置的结构示意图。 该信 息处理装置包括处理器 901, 还可以包括输入接口 902、 输出接口 903和存储器 90 4。 该输入接口 902、 输出接口 903、 存储器 904和处理器 901之间通过总线相互连 接。
[0199] 存储器包括但不限于是随机存储记忆体 (random access memory, RAM) 、 只 读存储器 (read-only memory, ROM) 、 可擦除可编程只读存储器 (erasable programmable read only memory , EPROM) 、 或便携式只读存储器 (compact disc read-only memory , CD-ROM) , 该存储器用于相关指令及数据。
[0200] 输入接口用于输入数据和 /或信号, 以及输出接口用于输出数据和 /或信号。 输 出接口和输入接口可以是独立的器件, 也可以是一个整体的器件。
[0201] 处理器可以包括是一个或多个处理器, 例如包括一个或多个中央处理器 (centr al processing
unit, CPU) , 在处理器是一个 CPU的情况下, 该 CPU可以是单核 CPU, 也可以 是多核 CPU。
[0202] 存储器用于存储信息处理装置的程序代码和数据。
[0203] 处理器用于调用该存储器中的程序代码和数据, 执行上述方法实施例中的步骤
[0204] 如在一个实施例中, 处理器可用于执行步骤 202至步骤 204所示的实现方式。 以 及该处理器还可用于执行步骤 211、 步骤 212以及步骤 214至步骤 216所示的实现 方式。 以及该处理器还可用于执行 301至 302所示的实现方式。 以及该处理器还 可用于执行步骤 401、 步骤 403以及步骤至步骤 406所示的实现方式。
[0205] 又如在一个实施例中, 处理器还可用于执行第一确定单元 503和第二确定单元 5 04所示的方法等等。 [0206] 又如在一个实施例中, 在一些可能的实现方式中, 该输入接口可用于执行第一 接收单元 501所示的方法, 输出接口还可用于执行第一发送单元 502所示的方法
[0207] 又如在一个实施例中, 处理器还可用于执行处理单元 802所示的方法等等。
[0208] 又如在一个实施例中, 在一些可能的实现方式中, 该输入接口可用于执行第二 接收单元 801所示的方法, 输出接口还可用于执行第二发送单元 803所示的方法
[0209] 对于处理器和 /或输入输出接口的具体实现方式可参见方法实施例中的描述, 在此不再赘述。
[0210] 可以理解的是, 图 9仅仅示出了信息处理装置的简化设计。 在实际应用中, 信 息处理装置还可以分别包含必要的其他元件, 包含但不限于任意数量的输入 /输 出接口、 处理器、 控制器、 存储器等, 而所有可以实现本申请实施例的信息处 理装置都在本申请的保护范围之内。
[0211] 所属领域的技术人员可以清楚地了解到, 为描述的方便和简洁, 上述描述的装 置和单元的具体工作过程, 可以参考前述方法实施例中的对应过程, 在此不再 赘述。
[0212] 本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程, 该流 程可以由计算机程序来指令相关的硬件完成, 该程序可存储于计算机可读取存 储介质中, 该程序在执行时, 可包括如上述各方法实施例的流程。 而前述的存 储介质包括: ROM或随机存储记忆体 RAM、 磁碟或者光盘等各种可存储程序代 码的介质。
发明概述
技术问题
问题的解决方案
发明的有益效果

Claims

权利要求书
[权利要求 1] 一种信息处理方法, 其特征在于, 包括:
区块链节点接收数字资产处理请求, 所述数字资产处理请求用于请求 获得处理数字资产的权限;
所述区块链节点在接收到所述数字资产处理请求的情况下, 所述区块 链节点向 M个电子设备中的每个电子设备发送所述授权请求, 所述授 权请求用于请求授权处理所述数字资产;
所述区块链节点确定所述 M个电子设备中至少 N个电子设备中的每个 电子设备授权处理所述数字资产, 所述 M大于或等于所述 N;
所述区块链节点确定获得处理所述数字资产的权限。
[权利要求 2] 根据权利要求 1所述的方法, 其特征在于, 所述区块链节点确定获得 处理所述数字资产的权限之前, 所述方法还包括: 所述区块链节点授权处理所述数字资产;
所述区块链节点确定获得处理所述数字资产的权限, 包括: 在所述区块链节点授权处理通过所述数字资产的情况下, 所述区块链 节点确定获得处理所述数字资产的权限。
[权利要求 3] 根据权利要求 2所述的方法, 其特征在于, 所述数字资产包括经过目 标公钥加密的数字资产, 所述目标公钥对应的目标私钥包括第一分散 密钥, 所述第一分散密钥存储于所述区块链节点中, 所述区块链节点 授权处理所述数字资产, 包括:
所述区块链节点通过所述第一分散密钥对所述数字资产进行签名得到 第一授权签名, 根据所述第一授权签名确定授权处理所述数字资产。
[权利要求 4] 根据权利要求 3所述的方法, 其特征在于, 所述目标私钥还包括 M个 分散密钥, 所述 M个分散密钥分别存储于所述 M个电子设备中, 且所 述 M个分散密钥与所述 M个电子设备一一对应, 所述 M个分散密钥中 的 N个分散密钥用于对所述数字资产进行签名得到 N个授权签名; 所述区块链节点确定所述 M个电子设备中至少 N个电子设备中的每个 电子设备授权处理所述数字资产之后, 所述方法还包括:
所述区块链节点对所述第一授权签名和所述 N个授权签名进行合成, 得到目标签名结果;
所述区块链节点根据所述目标签名结果合成所述目标私钥; 所述区块链节点确定获得处理所述数字资产的权限, 包括: 所述区块链节点通过所述目标私钥解密所述目标公钥, 所述区块链节 点确定获得处理所述数字资产的权限。
[权利要求 5] 根据权利要求 4所述的方法, 其特征在于, 所述区块链节点确定获得 处理所述数字资产的权限之后, 所述方法还包括: 所述区块链节点根据所述目标签名结果生成签名记录;
所述区块链节点将所述签名记录保存在区块链账本中。
[权利要求 6] 一种信息处理方法, 其特征在于, 包括:
电子设备接收授权请求, 所述授权请求用于请求授权处理数字资产; 所述电子设备授权处理所述数字资产, 得到授权结果;
所述电子设备向区块链节点发送所述授权结果。
[权利要求 7] 根据权利要求 6所述的方法, 其特征在于, 所述数字资产包括经过目 标公钥加密的数字资产, 所述目标公钥对应的目标私钥包括第二分散 密钥, 所述第二分散密钥存储于所述电子设备中, 所述电子设备授权 处理所述数字资产, 得到授权结果, 包括:
所述电子设备通过第二分散密钥对所述数字资产签名得到第二授权签 名, 根据所述第二授权签名确定授权处理所述数字资产。
[权利要求 8] 一种区块链节点设备, 其特征在于, 包括: 处理器和存储器, 所述处 理器与所述存储器耦合, 所述存储器中存储有程序指令; 所述程序指 令被所述处理器执行时, 使所述处理器执行如权利要求 1至 5任意一项 所述的方法的相应功能。
[权利要求 9] 一种电子设备, 其特征在于, 包括: 处理器和存储器, 所述处理器与 所述存储器耦合, 所述存储器中存储有程序指令; 所述程序指令被所 述处理器执行时, 使所述处理器执行如权利要求 6或 7所述的方法的相 应功能。
[权利要求 10] 一种计算机可读存储介质, 其特征在于, 所述计算机可读存储介质中 存储有计算机程序, 所述计算机程序包括程序指令, 所述程序指令当 被信息处理装置的处理器执行时, 使所述处理器执行权利要求 1至 5任 意一项所述的方法; 或者, 使所述处理器执行权利要求 6或 7所述的方 法。
PCT/CN2019/124531 2018-12-20 2019-12-11 信息处理方法及区块链节点、电子设备 WO2020125512A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP19900509.1A EP3761203A4 (en) 2018-12-20 2019-12-11 INFORMATION PROCESSING METHODS, BLOCKCHAIN NODES AND ELECTRONIC DEVICE
US17/038,624 US11483161B2 (en) 2018-12-20 2020-09-30 Method for information processing and non-transitory computer readable storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811567036.2 2018-12-20
CN201811567036.2A CN109697365B (zh) 2018-12-20 2018-12-20 信息处理方法及区块链节点、电子设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/038,624 Continuation US11483161B2 (en) 2018-12-20 2020-09-30 Method for information processing and non-transitory computer readable storage medium

Publications (1)

Publication Number Publication Date
WO2020125512A1 true WO2020125512A1 (zh) 2020-06-25

Family

ID=66231853

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/124531 WO2020125512A1 (zh) 2018-12-20 2019-12-11 信息处理方法及区块链节点、电子设备

Country Status (4)

Country Link
US (1) US11483161B2 (zh)
EP (1) EP3761203A4 (zh)
CN (1) CN109697365B (zh)
WO (1) WO2020125512A1 (zh)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10951626B2 (en) * 2018-03-06 2021-03-16 Americorp Investments Llc Blockchain-based commercial inventory systems and methods
US11700265B2 (en) * 2018-03-06 2023-07-11 Americorp Investments Llc Customized view of restricted information recorded into a blockchain
CN109697365B (zh) * 2018-12-20 2023-04-07 深圳市元征科技股份有限公司 信息处理方法及区块链节点、电子设备
CN110009337B (zh) 2018-12-21 2020-04-21 阿里巴巴集团控股有限公司 一种基于区块链的数据处理方法和装置
CN110020543B (zh) 2018-12-21 2020-09-15 阿里巴巴集团控股有限公司 一种基于区块链的数据处理方法和装置
CN110224984A (zh) * 2019-05-07 2019-09-10 平安科技(深圳)有限公司 一种基于区块链技术的多方授权方法及装置
CN110177088B (zh) * 2019-05-08 2021-09-21 矩阵元技术(深圳)有限公司 一种临时身份认证方法、装置及系统
CN110188526B (zh) * 2019-05-31 2023-06-30 创新先进技术有限公司 基于区块链的约定信息处理方法、装置、系统及电子设备
CN111131336B (zh) * 2020-03-30 2020-07-17 腾讯科技(深圳)有限公司 多方授权场景下的资源访问方法、装置、设备及存储介质
CN112150143A (zh) * 2020-08-07 2020-12-29 北京乐智科技有限公司 一种基于区块链技术的资金管理方法及装置
CN112036850A (zh) * 2020-08-28 2020-12-04 光大科技有限公司 数字资产数据的访问方法及装置、数字资产的交易系统
CN113869901B (zh) * 2021-12-02 2022-05-10 腾讯科技(深圳)有限公司 密钥生成方法、装置、计算机可读存储介质及计算机设备
US20240037213A1 (en) * 2022-07-29 2024-02-01 Nutanix, Inc. Implementing multi-party authorizations to thwart a ransomware attack
CN115499175B (zh) * 2022-08-31 2023-08-15 临沂大学 一种基于私钥存储的数字产品授权方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2540977A (en) * 2015-07-31 2017-02-08 British Telecomm Expendable access control
CN107566116A (zh) * 2017-06-15 2018-01-09 中国银联股份有限公司 用于数字资产确权登记的方法及装置
CN109040026A (zh) * 2018-07-11 2018-12-18 深圳市网心科技有限公司 一种数字资产的授权方法、装置、设备及介质
CN109697365A (zh) * 2018-12-20 2019-04-30 深圳市元征科技股份有限公司 信息处理方法及区块链节点、电子设备

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9992028B2 (en) * 2015-11-26 2018-06-05 International Business Machines Corporation System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger
CN106778343A (zh) * 2016-12-12 2017-05-31 武汉优聘科技有限公司 一种基于区块链的涉及隐私数据的数据共享方法
WO2018111295A1 (en) * 2016-12-16 2018-06-21 Hitachi, Ltd. Blockchain monitoring and management
CN107018432B (zh) * 2017-03-28 2020-02-14 华为技术有限公司 媒体内容的许可方法以及设备
WO2018223125A1 (en) * 2017-06-02 2018-12-06 Visa International Service Association Methods and systems for ownership verification using blockchain
CN110019516B (zh) * 2017-11-10 2021-08-20 华为技术有限公司 一种信息管理方法、装置及系统
CN108809652B (zh) * 2018-05-21 2021-07-23 安徽航天信息有限公司 一种基于秘密共享的区块链加密账本
CN108765240B (zh) * 2018-07-16 2022-08-16 创新先进技术有限公司 基于区块链的机构间客户验证方法、交易监管方法和装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2540977A (en) * 2015-07-31 2017-02-08 British Telecomm Expendable access control
CN107566116A (zh) * 2017-06-15 2018-01-09 中国银联股份有限公司 用于数字资产确权登记的方法及装置
CN109040026A (zh) * 2018-07-11 2018-12-18 深圳市网心科技有限公司 一种数字资产的授权方法、装置、设备及介质
CN109697365A (zh) * 2018-12-20 2019-04-30 深圳市元征科技股份有限公司 信息处理方法及区块链节点、电子设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3761203A4 *

Also Published As

Publication number Publication date
US20210014072A1 (en) 2021-01-14
CN109697365B (zh) 2023-04-07
CN109697365A (zh) 2019-04-30
EP3761203A1 (en) 2021-01-06
EP3761203A4 (en) 2021-11-03
US11483161B2 (en) 2022-10-25

Similar Documents

Publication Publication Date Title
WO2020125512A1 (zh) 信息处理方法及区块链节点、电子设备
CN109144961B (zh) 授权文件共享方法及装置
US7975312B2 (en) Token passing technique for media playback devices
WO2020062668A1 (zh) 一种身份认证方法、身份认证装置及计算机可读介质
US8843415B2 (en) Secure software service systems and methods
WO2018024061A1 (zh) 一种共享数字内容的许可证的方法、装置及系统
JP2020528222A (ja) ブロックチェーンにおけるスマートコントラクトに基づくトランザクション活動の取扱注意データを保護するための方法及びデバイス
WO2017024934A1 (zh) 实现电子签章的方法、装置及签章服务器
KR100895462B1 (ko) 디지털 저작권 관리 시스템에서의 콘텐츠 유통 관리 방법
CN101883100B (zh) 一种数字内容分布式授权方法
CA3014737A1 (en) Blockchain-implemented method for control and distribution of digital content
CN103491098A (zh) 基于公钥密码体制的软件授权方法
CN103491097A (zh) 基于公钥密码体制的软件授权系统
EP3920056B1 (en) Digital artwork display device, management method, and electronic device
CN111476573B (zh) 一种账户数据处理方法、装置、设备及存储介质
CN110611657A (zh) 一种基于区块链的文件流处理的方法、装置及系统
KR100873314B1 (ko) 안전한 콘텐트 배포를 위한 방법 및 장치
TW201220122A (en) Software authorization system and method
US11258601B1 (en) Systems and methods for distributed digital rights management with decentralized key management
WO2024011863A9 (zh) 通信方法、装置、sim卡、电子设备和终端设备
EP4016921A1 (en) Certificate management method and apparatus
CN113342802A (zh) 区块链数据存储的方法和装置
US8755521B2 (en) Security method and system for media playback devices
CN107070648B (zh) 一种密钥保护方法及pki系统
Kitahara et al. A method of digital rights management based on Bitcoin protocol

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19900509

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019900509

Country of ref document: EP

Effective date: 20200930

NENP Non-entry into the national phase

Ref country code: DE