WO2020134712A1 - Blockchain data processing method, device and system - Google Patents
Blockchain data processing method, device and system Download PDFInfo
- Publication number
- WO2020134712A1 WO2020134712A1 PCT/CN2019/119312 CN2019119312W WO2020134712A1 WO 2020134712 A1 WO2020134712 A1 WO 2020134712A1 CN 2019119312 W CN2019119312 W CN 2019119312W WO 2020134712 A1 WO2020134712 A1 WO 2020134712A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- blockchain
- hash data
- obfuscation
- target hash
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Definitions
- This specification relates to the field of data processing technology, and in particular, to a blockchain data processing method, device, and system.
- the data stored on the blockchain has the characteristics of true transparency and irremovability. Even if the plaintext is encrypted or hashed, the public can still parse the blockchain to obtain the real data on the blockchain, such as The actual calling level of the blockchain can be inferred from the magnitude of the hash to obtain real data. It can be seen that the existing way of storing data on the blockchain is not very safe for users, especially in the scenario where the blockchain is used to store transaction data, the transparency of transaction data will bring a certain degree of risk to users.
- the purpose of one or more embodiments of this specification is to provide a blockchain data processing method, device, and system to achieve the purpose of ensuring data security while using blockchain technology.
- one or more embodiments of this specification provide a blockchain data processing method, including:
- the performing obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation includes:
- the target hash data contained in each segment corresponding to the segmentation process is not more than a predetermined number.
- the storing of the hashed target hash data into the second blockchain includes:
- the method before acquiring multiple pieces of hash data corresponding to multiple pieces of business data recorded in the block in the first blockchain, the method further includes:
- the data viewing authority of the first blockchain is only visible to the first designated user group; and, the data viewing authority of the second blockchain is determined to be visible to all users.
- the method further includes:
- one or more embodiments of this specification provide a blockchain data processing device, including:
- An obtaining module configured to obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain
- An obfuscation module configured to perform obfuscation and encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;
- a sharding module configured to perform sharding processing on the at least one target hash data
- the first storage module is used to store the fragmented target hash data into the second blockchain respectively.
- one or more embodiments of this specification provide a blockchain data processing system, including a first blockchain, a data processing node, and a second blockchain; wherein:
- the first blockchain is used to record multiple hash data corresponding to multiple business data
- the data processing node is used to obtain the multiple hash data of the block records in the first block chain
- the data processing node is further configured to perform obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation; and to the at least one target hash data Perform sharding; store the target hash data after sharding into the second blockchain;
- the second blockchain is used to store the hashed target hash data.
- one or more embodiments of this specification provide a blockchain data processing device, including:
- a memory arranged to store computer-executable instructions, which when executed, causes the processor to:
- an embodiment of the present application provides a storage medium for storing computer-executable instructions, which when executed are implemented as follows:
- multiple hash data corresponding to multiple business data recorded in the block in the first blockchain is obtained, and multiple hash data are processed according to the preset obfuscation encryption processing method.
- the hash data is obfuscated and encrypted to obtain at least one target hash data after obfuscation, and the at least one target hash data is fragmented, and then the fragmented target hash data is separately stored in the second block In the chain.
- the technical solution obfuscates multiple hash data corresponding to multiple business data, so that the final stored target hash data can be accessed by external users, but it is difficult for external users to analyze it to know the transaction size and transaction volume Level and other information. Therefore, while ensuring the true and transparent data in the blockchain, it can also ensure the security of the data, which is conducive to users to better protect their business when using the blockchain.
- FIG. 1 is a schematic flowchart of a blockchain data processing method according to an embodiment of the present specification
- FIG. 2 is a schematic block diagram of a blockchain data processing device according to an embodiment of the present specification
- FIG. 3 is a schematic block diagram of a blockchain data processing system according to an embodiment of this specification.
- FIG. 4 is a schematic block diagram of a blockchain data processing device according to an embodiment of the present specification.
- One or more embodiments of this specification provide a blockchain data processing method, device, and system to achieve the purpose of ensuring data security while using blockchain technology.
- FIG. 1 is a schematic flowchart of a blockchain data processing method according to an embodiment of the present specification. As shown in FIG. 1, the method includes:
- S102 Acquire multiple pieces of hash data corresponding to multiple pieces of business data recorded in the block in the first blockchain.
- S104 Perform obfuscation encryption processing on multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation.
- S106 Perform fragmentation processing on at least one target hash data.
- S108 Store the target hash data after fragmentation in the second blockchain.
- the multiple hash data corresponding to the multiple business data recorded in the block in the first blockchain is the ledger of the transaction recorded in the first blockchain.
- the ledger may be The nodes in the blockchain are accessible.
- the ledger is stored in the second blockchain after obfuscation and encryption processing, and the obfuscated and encrypted ledger stored in the second blockchain may be accessible to external users. Therefore, on the one hand, external users such as the public can access the ledger to ensure the authenticity and transparency of the data.
- the external user obtains the obfuscated encrypted ledger, it is difficult to parse the obfuscated encrypted ledger. Obtaining relevant information about real transaction volume also guarantees the security of transaction information.
- the above technical solution obfuscates multiple hash data corresponding to multiple business data, so that the final stored target hash data can be accessed by external users, but it is difficult for external users to analyze it to know the transaction size and transaction Information such as magnitude. Therefore, while ensuring the true and transparent data in the blockchain, it can also ensure the security of the data, which is conducive to users to better protect their business when using the blockchain.
- the obfuscation and encryption processing of hash data may include multiple manners.
- content composed of multiple hash data may be hashed to obtain one hash data.
- HashABCD Hash(HashA+HashB+HashC +HashD)
- Hash() represents a hash calculation function, such as MD5, SHA-1, SHA-256, SHA-384, SHA-512, and so on.
- the hash algorithm used is SHA-256.
- the content of any one of the hash data may be divided into multiple parts and hash calculations may be separately performed to obtain multiple pieces of hash data corresponding to the content of the multiple parts.
- HashA1' HashA1
- HashA can also split HashA into 3 parts, 4 parts, or even more parts. How many parts you want to split and how to split them is configurable.
- the content composed of multiple hash data may be further divided into multiple parts of content, and the content of each part is separately hashed to obtain the multiple parts of Multiple hash data corresponding to the content.
- HashABCD hashA+HashB+HashC+HashD
- HashABCD hashABCD1 and HashABCD2 respectively to obtain Hash(HashABCD1) and Hash(HashABCD2), Hash(HashABCD1) and Hash(HashABCD2) are multiple hash corresponding to the content of the multiple parts data.
- the obfuscation scheme of the embodiment of the present application may also perform multi-layer obfuscation encryption processing, that is, hash data after one layer of obfuscation encryption processing, and then one or more layers of obfuscation encryption processing.
- multi-layer obfuscation encryption processing that is, hash data after one layer of obfuscation encryption processing, and then one or more layers of obfuscation encryption processing.
- the algorithms for obfuscation and encryption in different layers can be the same or different.
- HashABCD Hash(HashA+ HashB+HashC+HashD)
- the hash data may be fragmented and/or hashed one or more times.
- the hash data may only be fragmented to obtain the target hash data, or the fragmentation processing and hash calculation may be combined to obfuscate and encrypt the hash data to obtain the target hash data.
- the specified sharding rules include: the rules for sharding according to the specified data length; for example, if the specified data length is 64KB, then the hash data is divided according to the rule that each data fragment size is 64KB; or, according to the specified duration
- the rules for sharding for example, if the specified duration is 1 second, then the sharding is performed according to the hash data stored in each second. For example, the hash data stored in the current 1 second is a piece of data, and the hash stored in the next 1 second Hope data is the next piece of data.
- hash calculation is performed on each first data segment to obtain multiple second data segments.
- the obfuscated encrypted target hash data is determined according to multiple second data fragments.
- the second data segment may be directly determined as the target hash data, and the second data segment may be fragmented and/or hashed one or more times again to finally obtain the target hash data.
- a confusion encryption processing method in which hash data is first fragmented and then hashed is calculated on the data fragments obtained after fragmentation.
- obfuscation encryption a variety of other methods of obfuscation encryption can also be used to perform obfuscation encryption on hash data, including a combination of multiple fragmentation processing and multiple hash calculations, and The order of multiple fragmentation processing and multiple hash calculations is not limited. The more fragmentation processing and/or hash calculations, that is, the more complicated the obfuscation encryption processing method, the higher the security of the target hash data.
- the data viewing authority of the first blockchain may be determined that the data viewing authority of the first blockchain is only visible to the first designated user group, such as only Visible to all nodes in the first blockchain; and, determine the data viewing authority of the second blockchain to be visible to all users, such as external users such as the public can access the data.
- the first designated user group may be one user or multiple users.
- the multiple hash data corresponding to the multiple business data stored in the block in the first blockchain is very large It is difficult for external users to know, so as to ensure the security of multiple hash data corresponding to multiple business data; in addition, because the second blockchain is visible to all users, that is, all users can learn about the storage in the second blockchain Obfuscated encrypted target hash data, thus ensuring the transparency and authenticity of the data in the blockchain, and even if external users learn the obfuscated encrypted target hash data stored in the second blockchain, because the target is not known
- the hash data corresponds to the obfuscated encryption processing method, so it is impossible to obtain the real data of the business data, thereby ensuring the security of the business data, which is beneficial for users to better protect their business when using the blockchain.
- the obfuscated and encrypted at least one target hash data when the obfuscated and encrypted at least one target hash data is stored in the second blockchain, the obfuscated and encrypted at least one target hash data may be first fragmented, and then fragmented The target hash data is stored in the second blockchain.
- the target hash data contained in each shard corresponding to the sharding process is not more than a predetermined number, where the total length of the predetermined number of target hash data should not be greater than the second blockchain The maximum length of data recorded in the middle block. Therefore, when performing fragmentation processing on at least one target hash data after obfuscation and encryption, fragmentation can be performed in such a manner that each fragment contains a fixed number of target hash data, where the fixed number should not be greater than a predetermined number number.
- the target hash data after fragmentation is stored in the second blockchain, the target hash data contained in each fragment can be stored in the second blockchain as a business record.
- the obfuscated encryption processing method may be stored in the third blockchain, and the data viewing authority of the third blockchain may be determined to be visible only to the second designated user group.
- the second designated user group may be one user or multiple users.
- the second designated user group may be the same as or different from the first designated user group (ie, the user group visible to the first blockchain).
- the second designated user group may be workers related to the data stored in the first blockchain/second blockchain, such as the maintenance personnel of the blockchain, the user(s) may
- the hash data stored in the second blockchain is managed, such as storage, update, etc.; or, the user(s) can also manage the obfuscated encryption processing methods stored in the third blockchain, such as storage, Modify and other operations.
- the obfuscated encryption processing method is separately stored in the third blockchain, so that the second designated user group can easily learn the obfuscated encryption processing method, so as to obtain the real data of the business data by acquiring the obfuscated encryption processing method.
- the third blockchain is only visible to the second designated user group and not visible to other external users, it is difficult for external users to know the obfuscated encryption processing method stored in the third blockchain, so it is difficult to know the trueness of business data Data ensures the security of business data.
- the obfuscated encryption processing method can also be stored in the first blockchain. Since the first blockchain is only visible to the first designated user group and other external users are not visible, the first blockchain The stored obfuscated encryption processing method is difficult to be known by external users, so that it is difficult for external users to know the real data of the business data, ensuring the security of the business data.
- storing the obfuscation encryption processing method together with the hash data corresponding to the business data in the first area chain can not only ensure the security of the business data, but also save the occupation of the blockchain by the obfuscation encryption processing method.
- FIG. 2 is a schematic block diagram of a blockchain data processing device according to an embodiment of the present specification. As shown in FIG. 2, the blockchain data processing device 200 includes:
- the obtaining module 210 is used to obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain;
- the obfuscation module 220 is configured to perform obfuscation encryption processing on multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;
- a sharding module 230 configured to perform sharding processing on the at least one target hash data
- the first storage module 240 is used to store the fragmented target hash data in the second blockchain, respectively.
- the obfuscation module 220 includes:
- the calculation unit is configured to perform hash calculation on each hash data at least once to obtain at least one target hash data.
- each fragment corresponding to the fragmentation process contains no more than a predetermined number of target hash data.
- the first storage module 240 includes:
- the storage unit is used to store the target hash data contained in each shard as a business record in the second blockchain.
- the apparatus 200 further includes:
- the first determining module is used to determine the data viewing authority of the first blockchain to only the first designated user before acquiring the multiple hash data corresponding to the multiple business data recorded in the block in the first blockchain
- the group is visible; and, the data viewing authority of the second blockchain is determined to be visible to all users.
- the apparatus 200 further includes:
- a storage and determination module for storing the obfuscated encryption processing method in the third blockchain; and, determining that the data viewing authority of the third blockchain is only visible to the second designated user group.
- the device of one or more embodiments of this specification by acquiring multiple hash data corresponding to multiple business data recorded in a block in the first blockchain, and processing multiple hash data according to a preset obfuscation encryption processing method It is hoped that the data is obfuscated and encrypted to obtain at least one target hash data after obfuscation, and the at least one target hash data is fragmented, and then the fragmented target hash data is separately stored in the second blockchain in.
- this technical solution obfuscates multiple hash data corresponding to multiple business data, so that the final stored target hash data can be accessed by external users, but it is difficult for external users to analyze it to know the transaction size and transaction volume Level and other information. Therefore, while ensuring the transparency of the data in the blockchain, it can also ensure the security of the data, which is conducive to users to better protect their business when using the blockchain.
- one or more embodiments of this specification also provide a blockchain data processing system.
- the blockchain data processing system 300 includes a first blockchain 310, a data processing node 320, and a third Two blockchain 330; Among them:
- the first blockchain 310 is used to record multiple hash data corresponding to multiple business data
- the data processing node 320 is used to obtain multiple hash data of block records in the first blockchain 310;
- the data processing node 320 is further configured to perform obfuscation encryption processing on multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation; perform fragmentation processing on at least one target hash data; Store the target hash data after fragmentation into the second blockchain 330 respectively;
- the second blockchain 330 is used to store the fragmented target hash data.
- the data processing node 320 is also used to:
- each fragment corresponding to the fragmentation process contains no more than a predetermined number of target hash data.
- the data processing node 320 is also used to:
- the data processing node 320 is also used to:
- the data viewing authority of the first blockchain is only visible to the first designated user group; and, the data viewing authority of the second blockchain is determined to be visible to all users.
- system 300 further includes:
- the third blockchain is used to store obfuscation and encryption processing methods
- the data processing node 320 is also used to determine that the third blockchain data viewing authority is only visible to the second designated user group.
- multiple hash data corresponding to multiple business data recorded in the block in the first blockchain is acquired, and multiple hash data are processed according to the preset obfuscation encryption processing method. It is hoped that the data is obfuscated and encrypted to obtain at least one target hash data after obfuscation, and the at least one target hash data is fragmented, and then the fragmented target hash data is separately stored in the second blockchain in.
- the technical solution obfuscates multiple hash data corresponding to multiple business data, so that the final stored target hash data can be accessed by external users, but it is difficult for external users to analyze it to know the transaction size and transaction volume Level and other information. Therefore, while ensuring the transparency of the data in the blockchain, it can also ensure the security of the data, which is conducive to users to better protect their business when using the blockchain.
- Blockchain data processing equipment may have relatively large differences due to different configurations or performances, and may include one or more processors 401 and memory 402, and one or more storage applications or data may be stored in the memory 402.
- the memory 402 may be short-term storage or persistent storage.
- the application program stored in the memory 402 may include one or more modules (not shown), and each module may include a series of computer-executable instructions in the blockchain data processing device.
- the processor 401 may be configured to communicate with the memory 402 and execute a series of computer-executable instructions in the memory 402 on the blockchain data processing device.
- the blockchain data processing device may also include one or more power supplies 403, one or more wired or wireless network interfaces 404, one or more input/output interfaces 405, and one or more keyboards 406.
- the blockchain data processing device includes a memory and one or more programs, where one or more programs are stored in the memory, and one or more programs may include one or more modules, And each module may include a series of computer-executable instructions to the blockchain data processing device, and is configured to be executed by one or more processors.
- the one or more programs include the following computer-executable instructions:
- the processor may also:
- the target hash data contained in each fragment corresponding to the fragment processing is not more than a predetermined number.
- the processor may also:
- the target hash data contained in each of the fragments is stored in the second block chain as a business record.
- the processor may also:
- the processor may also:
- One or more embodiments of this specification also propose a computer-readable storage medium that stores one or more programs, the one or more programs include instructions, and the instructions include multiple application programs When an electronic device of the
- a sharding module configured to perform sharding processing on the at least one target hash data
- the system, device, module or unit explained in the above embodiments may be specifically implemented by a computer chip or entity, or implemented by a product having a certain function.
- a typical implementation device is a computer.
- the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
- one or more embodiments of this specification may be provided as a method, system, or computer program product. Therefore, one or more embodiments of this specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware. Moreover, one or more embodiments of this specification may employ computer programs implemented on one or more computer usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer usable program code The form of the product.
- computer usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- These computer program instructions can be provided to the processor of a general-purpose computer, special-purpose computer, embedded processing machine, or other programmable data processing device to produce a machine that enables the generation of instructions executed by the processor of the computer or other programmable data processing device
- These computer program instructions may also be stored in a computer readable memory that can guide a computer or other programmable data processing device to work in a specific manner, so that the instructions stored in the computer readable memory produce an article of manufacture including an instruction device, the instructions
- the device implements the functions specified in one block or multiple blocks of the flowchart one flow or multiple flows and/or block diagrams.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device, so that a series of operating steps are performed on the computer or other programmable device to produce computer-implemented processing, which is executed on the computer or other programmable device
- the instructions provide steps for implementing the functions specified in one block or multiple blocks of the flowchart one flow or multiple flows and/or block diagrams.
- the computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
- processors CPUs
- input/output interfaces network interfaces
- memory volatile and non-volatile memory
- the memory may include non-permanent memory, random access memory (RAM) and/or non-volatile memory in a computer-readable medium, such as read only memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
- RAM random access memory
- ROM read only memory
- flash RAM flash memory
- Computer readable media including permanent and non-permanent, removable and non-removable media, can store information by any method or technology.
- the information may be computer readable instructions, data structures, modules of programs, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices.
- computer-readable media does not include temporary computer-readable media (transitory media), such as modulated data signals and carrier waves.
- program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
- the present application may also be practiced in distributed computing environments in which remote processing devices connected through a communication network perform tasks.
- program modules may be located in local and remote computer storage media including storage devices.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Data Mining & Analysis (AREA)
- Finance (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A blockchain data processing method, device and system, which are used to achieve the purpose of ensuring data security while using the blockchain technology. Said method comprises: acquiring a plurality of pieces of hash data corresponding to a plurality of pieces of service data recorded by blocks in a first blockchain (S102); performing, in a preset obfuscation and encryption processing manner, obfuscation and encryption processing on the plurality of pieces of hash data, so as to obtain at least one piece of obfuscated target hash data (S104); fragmenting said at least one piece of target hash data (S106); and storing the fragmented target hash data in a second blockchain, respectively (S108).
Description
本说明书涉及数据处理技术领域,尤其涉及一种区块链数据处理方法、装置及系统。This specification relates to the field of data processing technology, and in particular, to a blockchain data processing method, device, and system.
采用区块链存储的数据具备真实透明、不可删除的特性,即使对明文进行加密、或使用哈希上链的方式,公众仍然可以通过解析区块链来获得区块链上的真实数据,如通过哈希的量级推测出区块链的真实调用量级,从而获得真实数据。可见,现有的区块链存储数据的方式对用户而言安全性不高,尤其是在利用区块链存储交易数据的场景中,交易数据的透明化会给用户带来一定程度的风险。The data stored on the blockchain has the characteristics of true transparency and irremovability. Even if the plaintext is encrypted or hashed, the public can still parse the blockchain to obtain the real data on the blockchain, such as The actual calling level of the blockchain can be inferred from the magnitude of the hash to obtain real data. It can be seen that the existing way of storing data on the blockchain is not very safe for users, especially in the scenario where the blockchain is used to store transaction data, the transparency of transaction data will bring a certain degree of risk to users.
发明内容Summary of the invention
本说明书一个或多个实施例的目的是提供一种区块链数据处理方法、装置及系统,用以实现在使用区块链技术的同时确保数据的安全性的目的。The purpose of one or more embodiments of this specification is to provide a blockchain data processing method, device, and system to achieve the purpose of ensuring data security while using blockchain technology.
为解决上述技术问题,本说明书一个或多个实施例是这样实现的:To solve the above technical problems, one or more embodiments of this specification are implemented as follows:
一方面,本说明书一个或多个实施例提供一种区块链数据处理方法,包括:On the one hand, one or more embodiments of this specification provide a blockchain data processing method, including:
获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据;Obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain;
按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;Performing obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;
对所述至少一个目标哈希数据进行分片处理;Slicing the at least one target hash data;
将分片后的目标哈希数据分别存储至第二区块链中。Store the target hash data after fragmentation into the second blockchain.
在一个实施例中,所述按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据,包括:In one embodiment, the performing obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation includes:
分别对各所述哈希数据进行至少一次的哈希计算,得到所述至少一个目标哈希数据。Perform hash calculation on each of the hash data at least once to obtain the at least one target hash data.
在一个实施例中,所述分片处理对应的每个分片中所包含的目标哈希数据不多于 预定个数。In one embodiment, the target hash data contained in each segment corresponding to the segmentation process is not more than a predetermined number.
在一个实施例中,所述将分片后的目标哈希数据分别存储至第二区块链中,包括:In one embodiment, the storing of the hashed target hash data into the second blockchain includes:
将各所述分片中所包含的目标哈希数据分别作为一条业务记录存储到所述第二区块链中。Storing the target hash data contained in each of the shards as a business record in the second blockchain.
在一个实施例中,在获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据之前,还包括:In one embodiment, before acquiring multiple pieces of hash data corresponding to multiple pieces of business data recorded in the block in the first blockchain, the method further includes:
确定所述第一区块链的数据查看权限为仅对第一指定用户组可见;及,确定所述第二区块链的数据查看权限为对所有用户可见。It is determined that the data viewing authority of the first blockchain is only visible to the first designated user group; and, the data viewing authority of the second blockchain is determined to be visible to all users.
在一个实施例中,所述方法还包括:In one embodiment, the method further includes:
将所述混淆加密处理方式存储至第三区块链中;及,确定所述第三区块链的数据查看权限为仅对第二指定用户组可见。Storing the obfuscated encryption processing method in the third blockchain; and, determining that the data viewing authority of the third blockchain is only visible to the second designated user group.
另一方面,本说明书一个或多个实施例提供一种区块链数据处理装置,包括:On the other hand, one or more embodiments of this specification provide a blockchain data processing device, including:
获取模块,用于获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据;An obtaining module, configured to obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain;
混淆模块,用于按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;An obfuscation module, configured to perform obfuscation and encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;
分片模块,用于对所述至少一个目标哈希数据进行分片处理;A sharding module, configured to perform sharding processing on the at least one target hash data;
第一存储模块,用于将分片后的目标哈希数据分别存储至第二区块链中。The first storage module is used to store the fragmented target hash data into the second blockchain respectively.
再一方面,本说明书一个或多个实施例提供一种区块链数据处理系统,包括第一区块链、数据处理节点及第二区块链;其中:In still another aspect, one or more embodiments of this specification provide a blockchain data processing system, including a first blockchain, a data processing node, and a second blockchain; wherein:
所述第一区块链,用于记录多个业务数据所对应的多个哈希数据;The first blockchain is used to record multiple hash data corresponding to multiple business data;
所述数据处理节点,用于获取所述第一区块链中区块记录的所述多个哈希数据;The data processing node is used to obtain the multiple hash data of the block records in the first block chain;
所述数据处理节点,还用于按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;对所述至少一个目标哈希数据进行分片处理;将分片后的目标哈希数据分别存储至所述第二区块链中;The data processing node is further configured to perform obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation; and to the at least one target hash data Perform sharding; store the target hash data after sharding into the second blockchain;
所述第二区块链,用于存储所述分片后的目标哈希数据。The second blockchain is used to store the hashed target hash data.
再一方面,本说明书一个或多个实施例提供一种区块链数据处理设备,包括:In yet another aspect, one or more embodiments of this specification provide a blockchain data processing device, including:
处理器;以及Processor; and
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:A memory arranged to store computer-executable instructions, which when executed, causes the processor to:
获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据;Obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain;
按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;Performing obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;
对所述至少一个目标哈希数据进行分片处理;Slicing the at least one target hash data;
将分片后的目标哈希数据分别存储至第二区块链中。Store the target hash data after fragmentation into the second blockchain.
再一方面,本申请实施例提供一种存储介质,用于存储计算机可执行指令,所述可执行指令在被执行时实现以下流程:In still another aspect, an embodiment of the present application provides a storage medium for storing computer-executable instructions, which when executed are implemented as follows:
获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据;Obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain;
按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;Performing obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;
对所述至少一个目标哈希数据进行分片处理;Slicing the at least one target hash data;
将分片后的目标哈希数据分别存储至第二区块链中。Store the target hash data after fragmentation into the second blockchain.
采用本说明书一个或多个实施例的技术方案,通过获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据,并按照预设的混淆加密处理方式对多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据,以及对该至少一个目标哈希数据进行分片处理,进而将分片后的目标哈希数据分别存储至第二区块链中。可见,该技术方案通过混淆多个业务数据所对应的多个哈希数据,使得最终存储的目标哈希数据能被外部用户访问,但外部用户很难对其进行分析以获知交易规模、交易量级等信息。因此在保障区块链中数据真实透明的同时,还能够保障数据的安全性,从而有利于用户在使用区块链时能够更好地保护自身业务。Using the technical solution of one or more embodiments of this specification, multiple hash data corresponding to multiple business data recorded in the block in the first blockchain is obtained, and multiple hash data are processed according to the preset obfuscation encryption processing method. The hash data is obfuscated and encrypted to obtain at least one target hash data after obfuscation, and the at least one target hash data is fragmented, and then the fragmented target hash data is separately stored in the second block In the chain. It can be seen that the technical solution obfuscates multiple hash data corresponding to multiple business data, so that the final stored target hash data can be accessed by external users, but it is difficult for external users to analyze it to know the transaction size and transaction volume Level and other information. Therefore, while ensuring the true and transparent data in the blockchain, it can also ensure the security of the data, which is conducive to users to better protect their business when using the blockchain.
为了更清楚地说明本说明书一个或多个实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书一个或多个实施例中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造 性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly explain the technical solutions in one or more embodiments of this specification, the following will briefly introduce the drawings required in the description of the embodiments. Obviously, the drawings in the following description are only one of the description For some of the embodiments described in the multiple embodiments, for those of ordinary skill in the art, without paying any creative labor, other drawings can also be obtained based on these drawings.
图1是根据本说明书一实施例的一种区块链数据处理方法的示意性流程图;FIG. 1 is a schematic flowchart of a blockchain data processing method according to an embodiment of the present specification;
图2是根据本说明书一实施例的一种区块链数据处理装置的示意性框图;2 is a schematic block diagram of a blockchain data processing device according to an embodiment of the present specification;
图3是根据本说明书一实施例的一种区块链数据处理系统的示意性框图;3 is a schematic block diagram of a blockchain data processing system according to an embodiment of this specification;
图4是根据本说明书一实施例的一种区块链数据处理设备的示意性框图。4 is a schematic block diagram of a blockchain data processing device according to an embodiment of the present specification.
本说明书一个或多个实施例提供一种区块链数据处理方法、装置及系统,用以实现在使用区块链技术的同时确保数据的安全性的目的。One or more embodiments of this specification provide a blockchain data processing method, device, and system to achieve the purpose of ensuring data security while using blockchain technology.
为了使本技术领域的人员更好地理解本说明书一个或多个实施例中的技术方案,下面将结合本说明书一个或多个实施例中的附图,对本说明书一个或多个实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本说明书一部分实施例,而不是全部的实施例。基于本说明书一个或多个实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本说明书一个或多个实施例保护的范围。In order to enable those skilled in the art to better understand the technical solutions in one or more embodiments of this specification, the following will be combined with the drawings in one or more embodiments of this specification. The technical solution is described clearly and completely. Obviously, the described embodiments are only a part of the embodiments of this specification, but not all the embodiments. Based on one or more embodiments of this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of one or more embodiments of this specification.
图1是根据本说明书一实施例的一种区块链数据处理方法的示意性流程图,如图1所示,该方法包括:FIG. 1 is a schematic flowchart of a blockchain data processing method according to an embodiment of the present specification. As shown in FIG. 1, the method includes:
S102,获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据。S102: Acquire multiple pieces of hash data corresponding to multiple pieces of business data recorded in the block in the first blockchain.
S104,按照预设的混淆加密处理方式对多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据。S104: Perform obfuscation encryption processing on multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation.
S106,对至少一个目标哈希数据进行分片处理。S106: Perform fragmentation processing on at least one target hash data.
S108,将分片后的目标哈希数据分别存储至第二区块链中。S108: Store the target hash data after fragmentation in the second blockchain.
在一个实施例中,第一区块链中区块记录的多个业务数据所对应的多个哈希数据为该第一区块链中记录的交易的账本,该账本可以是仅对第一区块链中的节点可访问。该账本经过混淆加密处理后存储至第二区块链,第二区块链中存储的混淆加密后的账本可以是对外部用户可访问。由此,一方面使得外部用户如公众可访问到该账本,以保障数据真实透明,另一方面,由于外部用户获取的是混淆加密处理后的账本,其难以对混淆加密后的账本进行解析以获得真实交易量的相关信息,也保障了交易信息的安全。In one embodiment, the multiple hash data corresponding to the multiple business data recorded in the block in the first blockchain is the ledger of the transaction recorded in the first blockchain. The ledger may be The nodes in the blockchain are accessible. The ledger is stored in the second blockchain after obfuscation and encryption processing, and the obfuscated and encrypted ledger stored in the second blockchain may be accessible to external users. Therefore, on the one hand, external users such as the public can access the ledger to ensure the authenticity and transparency of the data. On the other hand, since the external user obtains the obfuscated encrypted ledger, it is difficult to parse the obfuscated encrypted ledger. Obtaining relevant information about real transaction volume also guarantees the security of transaction information.
由此,上述技术方案通过混淆多个业务数据所对应的多个哈希数据,使得最终存储的目标哈希数据能被外部用户访问,但外部用户很难对其进行分析以获知交易规模、交易量级等信息。因此在保障区块链中数据真实透明的同时,还能够保障数据的安全性,从而有利于用户在使用区块链时能够更好地保护自身业务。Therefore, the above technical solution obfuscates multiple hash data corresponding to multiple business data, so that the final stored target hash data can be accessed by external users, but it is difficult for external users to analyze it to know the transaction size and transaction Information such as magnitude. Therefore, while ensuring the true and transparent data in the blockchain, it can also ensure the security of the data, which is conducive to users to better protect their business when using the blockchain.
应理解,在本申请实施例中,对哈希数据的混淆加密处理可包括多种方式。It should be understood that, in the embodiments of the present application, the obfuscation and encryption processing of hash data may include multiple manners.
可选地,在一种实现方式中,可将多个哈希数据组成的内容进行哈希计算得到一个哈希数据。Optionally, in an implementation manner, content composed of multiple hash data may be hashed to obtain one hash data.
例如,假设区块链的某个区块中的4个存储记录对应的哈希数据分别为HashA、HashB、HashC和HashD,则混淆加密处理后的哈希数据HashABCD=Hash(HashA+HashB+HashC+HashD),其中,函数Hash()表示哈希计算函数,例如MD5、SHA-1、SHA-256、SHA-384及SHA-512,等等。在比特币系统中,采用的哈希算法为SHA-256。For example, if the hash data corresponding to the 4 storage records in a block of the blockchain are HashA, HashB, HashC, and HashD, then the hash data after the encryption process is obfuscated HashABCD=Hash(HashA+HashB+HashC +HashD), where the function Hash() represents a hash calculation function, such as MD5, SHA-1, SHA-256, SHA-384, SHA-512, and so on. In the Bitcoin system, the hash algorithm used is SHA-256.
可选地,在另一种实现方式中,可将任一个哈希数据分成多个部分的内容再分别进行哈希计算,得到所述多个部分的内容对应的多个哈希数据。Optionally, in another implementation manner, the content of any one of the hash data may be divided into multiple parts and hash calculations may be separately performed to obtain multiple pieces of hash data corresponding to the content of the multiple parts.
例如,假设区块链的某个区块中的一个存储记录对应的哈希数据为HashA,可将HashA拆分成HashA1和HashA2,然后分别进行哈希处理,即得到HashA1’=Hash(HashA1),HashA2’=Hash(HashA2),此时的HashA1’和HashA2’即对HashA进行混淆加密处理后得到的哈希数据。当然,还可将HashA拆分成3个部分、4个部分乃至更多部分,具体拆分成多少个部分,怎么拆分,是可配置的。For example, assuming that the hash data corresponding to a storage record in a block of the blockchain is HashA, HashA can be split into HashA1 and HashA2, and then hashed separately, that is, HashA1'=Hash(HashA1) , HashA2'=Hash(HashA2), HashA1' and HashA2' at this time are hash data obtained by obfuscating and encrypting HashA. Of course, you can also split HashA into 3 parts, 4 parts, or even more parts. How many parts you want to split and how to split them is configurable.
可选地,在另一种实现方式中,可将多个哈希数据组成的内容再分成多个部分的内容,并对每个部分的内容分别进行哈希计算,得到所述多个部分的内容对应的多个哈希数据。Optionally, in another implementation manner, the content composed of multiple hash data may be further divided into multiple parts of content, and the content of each part is separately hashed to obtain the multiple parts of Multiple hash data corresponding to the content.
例如,假设区块链的某个区块中的4个存储记录对应的哈希数据分别为HashA、HashB、HashC和HashD,其组成的内容HashABCD=(HashA+HashB+HashC+HashD);可将HashABCD分成HashABCD1和HashABCD2,再对HashABCD1和HashABCD2分别进行哈希计算得到Hash(HashABCD1)和Hash(HashABCD2),Hash(HashABCD1)和Hash(HashABCD2)即为该多个部分的内容对应的多个哈希数据。For example, suppose that the hash data corresponding to the 4 storage records in a block of the blockchain are HashA, HashB, HashC, and HashD. The content of its composition is HashABCD=(HashA+HashB+HashC+HashD); HashABCD is divided into HashABCD1 and HashABCD2, and then hash calculation of HashABCD1 and HashABCD2 respectively to obtain Hash(HashABCD1) and Hash(HashABCD2), Hash(HashABCD1) and Hash(HashABCD2) are multiple hash corresponding to the content of the multiple parts data.
此外,应理解,本申请实施例的混淆方案,还可进行多层混淆加密处理,即将一层混淆加密处理之后的哈希数据,再进行一层或多层的混淆加密处理。不同层混淆加密 处理的算法,可以相同,也可以不同。In addition, it should be understood that the obfuscation scheme of the embodiment of the present application may also perform multi-layer obfuscation encryption processing, that is, hash data after one layer of obfuscation encryption processing, and then one or more layers of obfuscation encryption processing. The algorithms for obfuscation and encryption in different layers can be the same or different.
例如,假设区块链的某个区块中的4个存储记录对应的哈希数据分别为HashA、HashB、HashC和HashD,则第一层混淆加密处理后的哈希信息HashABCD=Hash(HashA+HashB+HashC+HashD);第二层混淆加密处理后的哈希数据为Hash(HashABCD1)和Hash(HashABCD2),其中HashABCD=HashABCD1+HashABCD2。For example, assuming that the hash data corresponding to the 4 storage records in a block of the blockchain are HashA, HashB, HashC, and HashD, the hash information after the first layer of obfuscation encryption processing is HashABCD=Hash(HashA+ HashB+HashC+HashD); the hash data after the second layer of obfuscation encryption processing is Hash(HashABCD1) and Hash(HashABCD2), where HashABCD=HashABCD1+HashABCD2.
可选的,在另一种实现方式中,可对哈希数据进行一次或多次的分片处理和/或哈希计算。具体的,可仅对哈希数据进行分片处理以得到目标哈希数据,也可将分片处理和哈希计算的方式结合起来对哈希数据进行混淆加密以得到目标哈希数据。Optionally, in another implementation manner, the hash data may be fragmented and/or hashed one or more times. Specifically, the hash data may only be fragmented to obtain the target hash data, or the fragmentation processing and hash calculation may be combined to obfuscate and encrypt the hash data to obtain the target hash data.
以下列举一种详细的混淆加密处理方式。The following lists a detailed obfuscation encryption processing method.
首先,按照指定分片规则对哈希数据进行分片处理,得到多个第一数据片段。First, perform fragmentation processing on the hash data according to the specified fragmentation rule to obtain multiple first data fragments.
其中,指定分片规则包括:按照指定数据长度进行分片的规则;例如,指定数据长度为64KB,则按照每个数据片段大小为64KB的规则对哈希数据进行分片;或者,按照指定时长进行分片的规则;例如,指定时长为1秒,则按照每秒内存储的哈希数据进行分片,如当前1秒内存储的哈希数据为一个数据片段,下1秒内存储的哈希数据则为下一个数据片段。Among them, the specified sharding rules include: the rules for sharding according to the specified data length; for example, if the specified data length is 64KB, then the hash data is divided according to the rule that each data fragment size is 64KB; or, according to the specified duration The rules for sharding; for example, if the specified duration is 1 second, then the sharding is performed according to the hash data stored in each second. For example, the hash data stored in the current 1 second is a piece of data, and the hash stored in the next 1 second Hope data is the next piece of data.
其次,分别对各第一数据片段进行哈希计算,得到多个第二数据片段。Secondly, hash calculation is performed on each first data segment to obtain multiple second data segments.
最后,根据多个第二数据片段确定混淆加密后的目标哈希数据。具体的,可直接确定第二数据片段为目标哈希数据,还可再次对第二数据片段进行一次或多次的分片处理和/或哈希计算,最终得到目标哈希数据。Finally, the obfuscated encrypted target hash data is determined according to multiple second data fragments. Specifically, the second data segment may be directly determined as the target hash data, and the second data segment may be fragmented and/or hashed one or more times again to finally obtain the target hash data.
本实施例中,列举了首先对哈希数据进行分片处理、然后对分片后得到的数据片段进行哈希计算的混淆加密处理方式。显然,由于混淆加密处理方式的多样性,经过混淆加密处理后的目标哈希数据很难被外部用户获知,因此可确保目标哈希数据的安全性。In this embodiment, a confusion encryption processing method in which hash data is first fragmented and then hashed is calculated on the data fragments obtained after fragmentation. Obviously, due to the variety of obfuscation and encryption processing methods, the target hash data after the obfuscation and encryption processing is difficult to be known by external users, so the security of the target hash data can be ensured.
当然,除上述列举的混淆加密处理方式之外,还可采用其他多种混淆加密处理方式对哈希数据进行混淆加密处理,包括多次分片处理和多次哈希计算相结合的方式,且多次分片处理和多次哈希计算的顺序不受限定。分片处理和/或哈希计算的次数越多,即混淆加密处理方式越复杂,得到的目标哈希数据的安全性也就越高。Of course, in addition to the above-mentioned methods of obfuscation encryption, a variety of other methods of obfuscation encryption can also be used to perform obfuscation encryption on hash data, including a combination of multiple fragmentation processing and multiple hash calculations, and The order of multiple fragmentation processing and multiple hash calculations is not limited. The more fragmentation processing and/or hash calculations, that is, the more complicated the obfuscation encryption processing method, the higher the security of the target hash data.
在一个实施例中,在获取第一区块链中记录的业务数据所对应的哈希数据之前,可先确定第一区块链的数据查看权限为仅对第一指定用户组可见,如仅对第一区块链中 的各节点可见;及,确定第二区块链的数据查看权限为对所有用户可见,如外部用户如公众均可访问该数据。In one embodiment, before obtaining the hash data corresponding to the business data recorded in the first blockchain, it may be determined that the data viewing authority of the first blockchain is only visible to the first designated user group, such as only Visible to all nodes in the first blockchain; and, determine the data viewing authority of the second blockchain to be visible to all users, such as external users such as the public can access the data.
其中,第一指定用户组可以是一个用户或多个用户。Wherein, the first designated user group may be one user or multiple users.
本实施例中,由于第一区块链仅对第一指定用户组可见,其他外部用户不可见,因此第一区块链中区块存储的多个业务数据所对应的多个哈希数据很难被外部用户获知,从而确保多个业务数据所对应的多个哈希数据的安全性;此外,由于第二区块链对所有用户可见,即所有用户都能够获知第二区块链中存储的混淆加密后的目标哈希数据,因此保障了区块链中数据的透明真实性,且即使外部用户获知了第二区块链中存储的混淆加密后的目标哈希数据,由于不知道目标哈希数据对应的混淆加密处理方式,因此也无法获知业务数据的真实数据,从而确保业务数据的安全性,有利于用户在使用区块链时能够更好地保护自身业务。In this embodiment, since the first blockchain is only visible to the first designated user group and not visible to other external users, the multiple hash data corresponding to the multiple business data stored in the block in the first blockchain is very large It is difficult for external users to know, so as to ensure the security of multiple hash data corresponding to multiple business data; in addition, because the second blockchain is visible to all users, that is, all users can learn about the storage in the second blockchain Obfuscated encrypted target hash data, thus ensuring the transparency and authenticity of the data in the blockchain, and even if external users learn the obfuscated encrypted target hash data stored in the second blockchain, because the target is not known The hash data corresponds to the obfuscated encryption processing method, so it is impossible to obtain the real data of the business data, thereby ensuring the security of the business data, which is beneficial for users to better protect their business when using the blockchain.
在一个实施例中,将混淆加密后的至少一个目标哈希数据存储至第二区块链中时,可先对混淆加密后的至少一个目标哈希数据进行分片处理,进而将分片后的目标哈希数据分别存储至第二区块链中。In one embodiment, when the obfuscated and encrypted at least one target hash data is stored in the second blockchain, the obfuscated and encrypted at least one target hash data may be first fragmented, and then fragmented The target hash data is stored in the second blockchain.
本实施例中,分片处理对应的每个分片中所包含的目标哈希数据不多于预定个数,其中,预定个数个目标哈希数据的总长度应不大于第二区块链中区块记录数据的最大长度。因此,在对混淆加密后的至少一个目标哈希数据进行分片处理时,可按照每个分片中包含固定数量个目标哈希数据的方式进行分片,其中,固定数量应不大于预定个数。In this embodiment, the target hash data contained in each shard corresponding to the sharding process is not more than a predetermined number, where the total length of the predetermined number of target hash data should not be greater than the second blockchain The maximum length of data recorded in the middle block. Therefore, when performing fragmentation processing on at least one target hash data after obfuscation and encryption, fragmentation can be performed in such a manner that each fragment contains a fixed number of target hash data, where the fixed number should not be greater than a predetermined number number.
本实施例中,对混淆加密后的至少一个目标哈希数据进行分片处理后,得到多个分片。因此,将分片后的目标哈希数据分别存储至第二区块链中时,可将各分片中所包含的目标哈希数据分别作为一条业务记录存储到第二区块链中。In this embodiment, after fragmentation processing is performed on at least one target hash data after obfuscation and encryption, multiple fragments are obtained. Therefore, when the target hash data after fragmentation is stored in the second blockchain, the target hash data contained in each fragment can be stored in the second blockchain as a business record.
在一个实施例中,可将混淆加密处理方式存储至第三区块链中,并确定第三区块链的数据查看权限为仅对第二指定用户组可见。In one embodiment, the obfuscated encryption processing method may be stored in the third blockchain, and the data viewing authority of the third blockchain may be determined to be visible only to the second designated user group.
其中,第二指定用户组可以是一个用户或多个用户。第二指定用户组可与第一指定用户组(即针对第一区块链可见的用户组)相同或不同。第二指定用户组可以是与第一区块链/第二区块链中所存储的数据相关的工作人员,如区块链的维护人员,该(些)用户可对第一区块链/第二区块链中所存储的哈希数据进行管理,如存储、更新等操作;或者,该(些)用户还可对第三区块链中存储的混淆加密处理方式进行管理,如存储、修改等操作。The second designated user group may be one user or multiple users. The second designated user group may be the same as or different from the first designated user group (ie, the user group visible to the first blockchain). The second designated user group may be workers related to the data stored in the first blockchain/second blockchain, such as the maintenance personnel of the blockchain, the user(s) may The hash data stored in the second blockchain is managed, such as storage, update, etc.; or, the user(s) can also manage the obfuscated encryption processing methods stored in the third blockchain, such as storage, Modify and other operations.
本实施例中,通过将混淆加密处理方式单独存储至第三区块链中,使得第二指定用户组方便获知混淆加密处理方式,从而通过获取混淆加密处理方式来获取业务数据的真实数据。并且,由于第三区块链仅对第二指定用户组可见,其他外部用户不可见,因此外部用户很难获知第三区块链中存储的混淆加密处理方式,从而很难获知业务数据的真实数据,确保了业务数据的安全性。In this embodiment, the obfuscated encryption processing method is separately stored in the third blockchain, so that the second designated user group can easily learn the obfuscated encryption processing method, so as to obtain the real data of the business data by acquiring the obfuscated encryption processing method. Moreover, since the third blockchain is only visible to the second designated user group and not visible to other external users, it is difficult for external users to know the obfuscated encryption processing method stored in the third blockchain, so it is difficult to know the trueness of business data Data ensures the security of business data.
在一个实施例中,也可将混淆加密处理方式存储至第一区块链中,由于第一区块链仅对第一指定用户组可见,其他外部用户不可见,因此第一区块链中存储的混淆加密处理方式很难被外部用户获知,从而使外部用户很难获知业务数据的真实数据,确保了业务数据的安全性。In one embodiment, the obfuscated encryption processing method can also be stored in the first blockchain. Since the first blockchain is only visible to the first designated user group and other external users are not visible, the first blockchain The stored obfuscated encryption processing method is difficult to be known by external users, so that it is difficult for external users to know the real data of the business data, ensuring the security of the business data.
本实施例中,将混淆加密处理方式与业务数据对应的哈希数据一起存储在第一区域链中,不仅能确保业务数据的安全性,还能节省混淆加密处理方式对区块链的占用。In this embodiment, storing the obfuscation encryption processing method together with the hash data corresponding to the business data in the first area chain can not only ensure the security of the business data, but also save the occupation of the blockchain by the obfuscation encryption processing method.
综上,已经对本主题的特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作可以按照不同的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序,以实现期望的结果。在某些实施方式中,多任务处理和并行处理可以是有利的。In summary, specific embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve the desired results. Additionally, the processes depicted in the drawings do not necessarily require the particular order shown, or sequential order, to achieve the desired results. In certain embodiments, multitasking and parallel processing may be advantageous.
以上为本说明书一个或多个实施例提供的区块链数据处理方法,基于同样的思路,本说明书一个或多个实施例还提供一种区块链数据处理装置。The above is the blockchain data processing method provided by one or more embodiments of this specification. Based on the same idea, one or more embodiments of this specification also provide a blockchain data processing device.
图2是根据本说明书一实施例的一种区块链数据处理装置的示意性框图,如图2所示,区块链数据处理装置200包括:FIG. 2 is a schematic block diagram of a blockchain data processing device according to an embodiment of the present specification. As shown in FIG. 2, the blockchain data processing device 200 includes:
获取模块210,用于获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据;The obtaining module 210 is used to obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain;
混淆模块220,用于按照预设的混淆加密处理方式对多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;The obfuscation module 220 is configured to perform obfuscation encryption processing on multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;
分片模块230,用于对所述至少一个目标哈希数据进行分片处理;A sharding module 230, configured to perform sharding processing on the at least one target hash data;
第一存储模块240,用于将分片后的目标哈希数据分别存储至第二区块链中。The first storage module 240 is used to store the fragmented target hash data in the second blockchain, respectively.
在一个实施例中,混淆模块220包括:In one embodiment, the obfuscation module 220 includes:
计算单元,用于分别对各哈希数据进行至少一次的哈希计算,得到至少一个目标哈希数据。The calculation unit is configured to perform hash calculation on each hash data at least once to obtain at least one target hash data.
在一个实施例中,分片处理对应的每个分片中所包含的目标哈希数据不多于预定个数。In one embodiment, each fragment corresponding to the fragmentation process contains no more than a predetermined number of target hash data.
在一个实施例中,第一存储模块240包括:In one embodiment, the first storage module 240 includes:
存储单元,用于将各分片中所包含的目标哈希数据分别作为一条业务记录存储到第二区块链中。The storage unit is used to store the target hash data contained in each shard as a business record in the second blockchain.
在一个实施例中,装置200还包括:In one embodiment, the apparatus 200 further includes:
第一确定模块,用于在获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据之前,确定第一区块链的数据查看权限为仅对第一指定用户组可见;及,确定第二区块链的数据查看权限为对所有用户可见。The first determining module is used to determine the data viewing authority of the first blockchain to only the first designated user before acquiring the multiple hash data corresponding to the multiple business data recorded in the block in the first blockchain The group is visible; and, the data viewing authority of the second blockchain is determined to be visible to all users.
在一个实施例中,装置200还包括:In one embodiment, the apparatus 200 further includes:
存储及确定模块,用于将混淆加密处理方式存储至第三区块链中;及,确定第三区块链的数据查看权限为仅对第二指定用户组可见。A storage and determination module for storing the obfuscated encryption processing method in the third blockchain; and, determining that the data viewing authority of the third blockchain is only visible to the second designated user group.
采用本说明书一个或多个实施例的装置,通过获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据,并按照预设的混淆加密处理方式对多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据,以及对该至少一个目标哈希数据进行分片处理,进而将分片后的目标哈希数据分别存储至第二区块链中。可见,该技术方案通过混淆多个业务数据所对应的多个哈希数据,使得最终存储的目标哈希数据能被外部用户访问,但外部用户很难对其进行分析以获知交易规模、交易量级等信息。因此在保障区块链中数据真实透明的同时,还能够保障数据的安全性,从而有利于用户在使用区块链时能够更好地保护自身业务。Using the device of one or more embodiments of this specification, by acquiring multiple hash data corresponding to multiple business data recorded in a block in the first blockchain, and processing multiple hash data according to a preset obfuscation encryption processing method It is hoped that the data is obfuscated and encrypted to obtain at least one target hash data after obfuscation, and the at least one target hash data is fragmented, and then the fragmented target hash data is separately stored in the second blockchain in. It can be seen that this technical solution obfuscates multiple hash data corresponding to multiple business data, so that the final stored target hash data can be accessed by external users, but it is difficult for external users to analyze it to know the transaction size and transaction volume Level and other information. Therefore, while ensuring the transparency of the data in the blockchain, it can also ensure the security of the data, which is conducive to users to better protect their business when using the blockchain.
本领域的技术人员应可理解,上述区块链数据处理装置能够用来实现前文所述的区块链数据处理方法,其中的细节描述应与前文方法部分描述类似,为避免繁琐,此处不另赘述。Those skilled in the art should understand that the above-mentioned blockchain data processing device can be used to implement the aforementioned blockchain data processing method, and the detailed description thereof should be similar to the aforementioned method part description. Elaborate.
基于同样的思路,本说明书一个或多个实施例还提供一种区块链数据处理系统。Based on the same idea, one or more embodiments of this specification also provide a blockchain data processing system.
图3是根据本说明书一实施例的一种区块链数据处理系统的示意性框图,如图3所示,区块链数据处理系统300包括第一区块链310、数据处理节点320及第二区块链330;其中:3 is a schematic block diagram of a blockchain data processing system according to an embodiment of the present specification. As shown in FIG. 3, the blockchain data processing system 300 includes a first blockchain 310, a data processing node 320, and a third Two blockchain 330; Among them:
第一区块链310,用于记录多个业务数据所对应的多个哈希数据;The first blockchain 310 is used to record multiple hash data corresponding to multiple business data;
数据处理节点320,用于获取第一区块链310中区块记录的多个哈希数据;The data processing node 320 is used to obtain multiple hash data of block records in the first blockchain 310;
数据处理节点320,还用于按照预设的混淆加密处理方式对多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;对至少一个目标哈希数据进行分片处理;将分片后的目标哈希数据分别存储至第二区块链330中;The data processing node 320 is further configured to perform obfuscation encryption processing on multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation; perform fragmentation processing on at least one target hash data; Store the target hash data after fragmentation into the second blockchain 330 respectively;
第二区块链330,用于存储分片后的目标哈希数据。The second blockchain 330 is used to store the fragmented target hash data.
在一个实施例中,数据处理节点320还用于:In one embodiment, the data processing node 320 is also used to:
分别对各哈希数据进行至少一次的哈希计算,得到至少一个目标哈希数据。Perform hash calculation on each hash data at least once to obtain at least one target hash data.
在一个实施例中,分片处理对应的每个分片中所包含的目标哈希数据不多于预定个数。In one embodiment, each fragment corresponding to the fragmentation process contains no more than a predetermined number of target hash data.
在一个实施例中,数据处理节点320还用于:In one embodiment, the data processing node 320 is also used to:
将各所述分片中所包含的目标哈希数据分别作为一条业务记录存储到所述第二区块链中。Storing the target hash data contained in each of the shards as a business record in the second blockchain.
在一个实施例中,数据处理节点320还用于:In one embodiment, the data processing node 320 is also used to:
确定第一区块链的数据查看权限为仅对第一指定用户组可见;及,确定第二区块链的数据查看权限为对所有用户可见。It is determined that the data viewing authority of the first blockchain is only visible to the first designated user group; and, the data viewing authority of the second blockchain is determined to be visible to all users.
在一个实施例中,系统300还包括:In one embodiment, the system 300 further includes:
第三区块链,用于存储混淆加密处理方式;The third blockchain is used to store obfuscation and encryption processing methods;
相应的,数据处理节点320,还用于确定第三区块链数据查看权限为仅对第二指定用户组可见。Correspondingly, the data processing node 320 is also used to determine that the third blockchain data viewing authority is only visible to the second designated user group.
采用本说明书一个或多个实施例的系统,通过获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据,并按照预设的混淆加密处理方式对多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据,以及对该至少一个目标哈希数据进行分片处理,进而将分片后的目标哈希数据分别存储至第二区块链中。可见,该技术方案通过混淆多个业务数据所对应的多个哈希数据,使得最终存储的目标哈希数据能被外部用户访问,但外部用户很难对其进行分析以获知交易规模、交易量级等信息。因此在保障区块链中数据真实透明的同时,还能够保障数据的安全性,从而有利于用户在使用区块链时能够更好地保护自身业务。Using the system of one or more embodiments of this specification, multiple hash data corresponding to multiple business data recorded in the block in the first blockchain is acquired, and multiple hash data are processed according to the preset obfuscation encryption processing method. It is hoped that the data is obfuscated and encrypted to obtain at least one target hash data after obfuscation, and the at least one target hash data is fragmented, and then the fragmented target hash data is separately stored in the second blockchain in. It can be seen that the technical solution obfuscates multiple hash data corresponding to multiple business data, so that the final stored target hash data can be accessed by external users, but it is difficult for external users to analyze it to know the transaction size and transaction volume Level and other information. Therefore, while ensuring the transparency of the data in the blockchain, it can also ensure the security of the data, which is conducive to users to better protect their business when using the blockchain.
本领域的技术人员应可理解,上述区块链数据处理系统能够用来实现前文所述的区块链数据处理方法,其中的细节描述应与前文方法部分描述类似,为避免繁琐,此处不另赘述。Those skilled in the art should understand that the above-mentioned blockchain data processing system can be used to implement the aforementioned blockchain data processing method, and the detailed description thereof should be similar to the aforementioned method part description. Elaborate.
基于同样的思路,本说明书一个或多个实施例还提供一种区块链数据处理设备,如图4所示。区块链数据处理设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器401和存储器402,存储器402中可以存储有一个或一个以上存储应用程序或数据。其中,存储器402可以是短暂存储或持久存储。存储在存储器402的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括对区块链数据处理设备中的一系列计算机可执行指令。更进一步地,处理器401可以设置为与存储器402通信,在区块链数据处理设备上执行存储器402中的一系列计算机可执行指令。区块链数据处理设备还可以包括一个或一个以上电源403,一个或一个以上有线或无线网络接口404,一个或一个以上输入输出接口405,一个或一个以上键盘406。Based on the same idea, one or more embodiments of this specification also provide a blockchain data processing device, as shown in FIG. 4. Blockchain data processing equipment may have relatively large differences due to different configurations or performances, and may include one or more processors 401 and memory 402, and one or more storage applications or data may be stored in the memory 402. Among them, the memory 402 may be short-term storage or persistent storage. The application program stored in the memory 402 may include one or more modules (not shown), and each module may include a series of computer-executable instructions in the blockchain data processing device. Furthermore, the processor 401 may be configured to communicate with the memory 402 and execute a series of computer-executable instructions in the memory 402 on the blockchain data processing device. The blockchain data processing device may also include one or more power supplies 403, one or more wired or wireless network interfaces 404, one or more input/output interfaces 405, and one or more keyboards 406.
具体在本实施例中,区块链数据处理设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对区块链数据处理设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:Specifically in this embodiment, the blockchain data processing device includes a memory and one or more programs, where one or more programs are stored in the memory, and one or more programs may include one or more modules, And each module may include a series of computer-executable instructions to the blockchain data processing device, and is configured to be executed by one or more processors. The one or more programs include the following computer-executable instructions:
获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据;Obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain;
按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;Performing obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;
对所述至少一个目标哈希数据进行分片处理;Slicing the at least one target hash data;
将所述分片后的目标哈希数据分别存储至第二区块链中。Store the target hash data after fragmentation into the second blockchain respectively.
可选地,计算机可执行指令在被执行时,还可以使所述处理器:Optionally, when the computer-executable instructions are executed, the processor may also:
分别对各所述哈希数据进行至少一次的哈希计算,得到所述至少一个目标哈希数据。Perform hash calculation on each of the hash data at least once to obtain the at least one target hash data.
可选地,所述分片处理对应的每个分片中所包含的目标哈希数据不多于预定个数。可选地,计算机可执行指令在被执行时,还可以使所述处理器:Optionally, the target hash data contained in each fragment corresponding to the fragment processing is not more than a predetermined number. Optionally, when the computer-executable instructions are executed, the processor may also:
将各所述分片中所包含的目标哈希数据分别作为一条业务记录存储到所述第二区 块链中。The target hash data contained in each of the fragments is stored in the second block chain as a business record.
可选地,计算机可执行指令在被执行时,还可以使所述处理器:Optionally, when the computer-executable instructions are executed, the processor may also:
在获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据之前,确定所述第一区块链的数据查看权限为仅对第一指定用户组可见;及,确定所述第二区块链的数据查看权限为对所有用户可见。Before acquiring multiple hash data corresponding to multiple business data recorded in the block in the first blockchain, determine that the data viewing authority of the first blockchain is only visible to the first designated user group; and, It is determined that the data viewing authority of the second blockchain is visible to all users.
可选地,计算机可执行指令在被执行时,还可以使所述处理器:Optionally, when the computer-executable instructions are executed, the processor may also:
将所述混淆加密处理方式存储至第三区块链中;及,确定所述第三区块链的数据查看权限为仅对第二指定用户组可见。Storing the obfuscated encryption processing method in the third blockchain; and, determining that the data viewing authority of the third blockchain is only visible to the second designated user group.
本说明书一个或多个实施例还提出了一种计算机可读存储介质,该计算机可读存储介质存储一个或多个程序,该一个或多个程序包括指令,该指令当被包括多个应用程序的电子设备执行时,能够使该电子设备执行上述区块链数据处理方法,并具体用于执行:One or more embodiments of this specification also propose a computer-readable storage medium that stores one or more programs, the one or more programs include instructions, and the instructions include multiple application programs When an electronic device of the
获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据;Obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain;
按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;Performing obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;
分片模块,用于对所述至少一个目标哈希数据进行分片处理;A sharding module, configured to perform sharding processing on the at least one target hash data;
将所述分片后的目标哈希数据分别存储至第二区块链中。Store the target hash data after fragmentation into the second blockchain respectively.
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The system, device, module or unit explained in the above embodiments may be specifically implemented by a computer chip or entity, or implemented by a product having a certain function. A typical implementation device is a computer. Specifically, the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书一个或多个实施例时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, when describing the above device, the functions are divided into various units and described separately. Of course, when implementing one or more embodiments of this specification, the functions of each unit may be implemented in the same or more software and/or hardware.
本领域内的技术人员应明白,本说明书一个或多个实施例可提供为方法、系统、或计算机程序产品。因此,本说明书一个或多个实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个实施例 可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that one or more embodiments of this specification may be provided as a method, system, or computer program product. Therefore, one or more embodiments of this specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware. Moreover, one or more embodiments of this specification may employ computer programs implemented on one or more computer usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer usable program code The form of the product.
本说明书一个或多个实施例是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。One or more embodiments of this specification are described with reference to flowcharts and/or block diagrams of methods, devices (systems), and computer program products according to embodiments of the present application. It should be understood that each flow and/or block in the flowchart and/or block diagram and a combination of the flow and/or block in the flowchart and/or block diagram may be implemented by computer program instructions. These computer program instructions can be provided to the processor of a general-purpose computer, special-purpose computer, embedded processing machine, or other programmable data processing device to produce a machine that enables the generation of instructions executed by the processor of the computer or other programmable data processing device A device for realizing the functions specified in one block or multiple blocks of one flow or multiple flows of a flowchart and/or one block or multiple blocks of a block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer readable memory that can guide a computer or other programmable data processing device to work in a specific manner, so that the instructions stored in the computer readable memory produce an article of manufacture including an instruction device, the instructions The device implements the functions specified in one block or multiple blocks of the flowchart one flow or multiple flows and/or block diagrams.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device, so that a series of operating steps are performed on the computer or other programmable device to produce computer-implemented processing, which is executed on the computer or other programmable device The instructions provide steps for implementing the functions specified in one block or multiple blocks of the flowchart one flow or multiple flows and/or block diagrams.
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, the computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。The memory may include non-permanent memory, random access memory (RAM) and/or non-volatile memory in a computer-readable medium, such as read only memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于 存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer readable media, including permanent and non-permanent, removable and non-removable media, can store information by any method or technology. The information may be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. As defined in this article, computer-readable media does not include temporary computer-readable media (transitory media), such as modulated data signals and carrier waves.
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It should also be noted that the terms "include", "include" or any other variant thereof are intended to cover non-exclusive inclusion, so that a process, method, commodity or device that includes a series of elements not only includes those elements, but also includes Other elements not explicitly listed, or include elements inherent to such processes, methods, goods, or equipment. Without more restrictions, the element defined by the sentence "include one..." does not exclude that there are other identical elements in the process, method, commodity or equipment that includes the element.
本说明书一个或多个实施例可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。One or more embodiments of this specification may be described in the general context of computer-executable instructions executed by a computer, such as program modules. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types. The present application may also be practiced in distributed computing environments in which remote processing devices connected through a communication network perform tasks. In a distributed computing environment, program modules may be located in local and remote computer storage media including storage devices.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。The embodiments in this specification are described in a progressive manner. The same or similar parts between the embodiments can be referred to each other. Each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant part can be referred to the description of the method embodiment.
以上所述仅为本说明书一个或多个实施例而已,并不用于限制本说明书。对于本领域技术人员来说,本说明书一个或多个实施例可以有各种更改和变化。凡在本说明书一个或多个实施例的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本说明书一个或多个实施例的权利要求范围之内。The above is only one or more embodiments of this specification and is not intended to limit this specification. For those skilled in the art, various modifications and changes can be made to one or more embodiments of this specification. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of one or more embodiments of this specification should be included in the scope of claims of one or more embodiments of this specification.
Claims (10)
- 一种区块链数据处理方法,包括:A blockchain data processing method, including:获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据;Obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain;按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;Performing obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;对所述至少一个目标哈希数据进行分片处理;Slicing the at least one target hash data;将分片后的目标哈希数据分别存储至第二区块链中。Store the target hash data after fragmentation into the second blockchain.
- 根据权利要求1所述的方法,按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据,包括:According to the method of claim 1, performing obfuscation encryption processing on the plurality of hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation includes:分别对各所述哈希数据进行至少一次的哈希计算,得到所述至少一个目标哈希数据。Perform hash calculation on each of the hash data at least once to obtain the at least one target hash data.
- 根据权利要求2所述的方法,所述分片处理对应的每个分片中所包含的目标哈希数据不多于预定个数。According to the method of claim 2, the target hash data contained in each fragment corresponding to the fragmentation processing is not more than a predetermined number.
- 根据权利要求3所述的方法,将分片后的目标哈希数据分别存储至第二区块链中,包括:According to the method of claim 3, storing the target hash data after fragmentation into the second blockchain includes:将各所述分片中所包含的目标哈希数据分别作为一条业务记录存储到所述第二区块链中。Storing the target hash data contained in each of the shards as a business record in the second blockchain.
- 根据权利要求1所述的方法,在获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据之前,还包括:The method according to claim 1, before acquiring multiple pieces of hash data corresponding to multiple pieces of business data recorded in the block in the first blockchain, further comprising:确定所述第一区块链的数据查看权限为仅对第一指定用户组可见;及,确定所述第二区块链的数据查看权限为对所有用户可见。It is determined that the data viewing authority of the first blockchain is only visible to the first designated user group; and, the data viewing authority of the second blockchain is determined to be visible to all users.
- 根据权利要求1所述的方法,还包括:The method of claim 1, further comprising:将所述混淆加密处理方式存储至第三区块链中;及,确定所述第三区块链的数据查看权限为仅对第二指定用户组可见。Storing the obfuscated encryption processing method in the third blockchain; and, determining that the data viewing authority of the third blockchain is only visible to the second designated user group.
- 一种区块链数据处理装置,包括:A blockchain data processing device, including:获取模块,用于获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据;An obtaining module, configured to obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain;混淆模块,用于按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;An obfuscation module, configured to perform obfuscation and encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;分片模块,用于对所述至少一个目标哈希数据进行分片处理;A sharding module, configured to perform sharding processing on the at least one target hash data;第一存储模块,用于将分片后的目标哈希数据分别存储至第二区块链中。The first storage module is used to store the fragmented target hash data into the second blockchain respectively.
- 一种区块链数据处理系统,包括第一区块链、数据处理节点及第二区块链;其中:A blockchain data processing system includes a first blockchain, a data processing node, and a second blockchain; where:所述第一区块链,用于记录多个业务数据所对应的多个哈希数据;The first blockchain is used to record multiple hash data corresponding to multiple business data;所述数据处理节点,用于获取所述第一区块链中区块记录的所述多个哈希数据;The data processing node is used to obtain the multiple hash data of the block records in the first block chain;所述数据处理节点,还用于按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;对所述至少一个目标哈希数据进行分片处理;将分片后的目标哈希数据分别存储至所述第二区块链中;The data processing node is further configured to perform obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation; and to the at least one target hash data Perform sharding; store the target hash data after sharding into the second blockchain;所述第二区块链,用于存储所述分片后的目标哈希数据。The second blockchain is used to store the hashed target hash data.
- 一种区块链数据处理设备,包括:A blockchain data processing device, including:处理器;以及Processor; and被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:A memory arranged to store computer-executable instructions, which when executed, causes the processor to:获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据;Obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain;按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;Performing obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;对所述至少一个目标哈希数据进行分片处理;Slicing the at least one target hash data;将分片后的目标哈希数据分别存储至第二区块链中。Store the target hash data after fragmentation into the second blockchain.
- 一种存储介质,用于存储计算机可执行指令,所述可执行指令在被执行时实现以下流程:A storage medium is used to store computer-executable instructions, and the executable instructions, when executed, implement the following process:获取第一区块链中区块记录的多个业务数据所对应的多个哈希数据;Obtain multiple hash data corresponding to multiple business data recorded in the block in the first blockchain;按照预设的混淆加密处理方式对所述多个哈希数据进行混淆加密处理,得到混淆后的至少一个目标哈希数据;Performing obfuscation encryption processing on the multiple hash data according to a preset obfuscation encryption processing method to obtain at least one target hash data after obfuscation;对所述至少一个目标哈希数据进行分片处理;Slicing the at least one target hash data;将分片后的目标哈希数据分别存储至第二区块链中。Store the target hash data after fragmentation into the second blockchain.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811605307.9 | 2018-12-26 | ||
CN201811605307.9A CN110033261B (en) | 2018-12-26 | 2018-12-26 | Block chain data processing method, device and system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020134712A1 true WO2020134712A1 (en) | 2020-07-02 |
Family
ID=67235444
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/119312 WO2020134712A1 (en) | 2018-12-26 | 2019-11-19 | Blockchain data processing method, device and system |
Country Status (3)
Country | Link |
---|---|
CN (2) | CN110033261B (en) |
TW (1) | TWI724579B (en) |
WO (1) | WO2020134712A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111815461A (en) * | 2020-07-03 | 2020-10-23 | 中保科联技术有限责任公司 | Claims settlement method, device, system, equipment and storage medium based on block chain |
CN112685775A (en) * | 2020-12-29 | 2021-04-20 | 北京八分量信息科技有限公司 | Method and device for monitoring data leakage prevention in block chain system and related products |
CN112685767A (en) * | 2020-12-25 | 2021-04-20 | 联想(北京)有限公司 | Data processing method and system based on block chain |
CN113570144A (en) * | 2021-07-30 | 2021-10-29 | 华北电力科学研究院有限责任公司 | Power utilization information processing method and device |
CN116933331A (en) * | 2023-07-28 | 2023-10-24 | 三峡高科信息技术有限责任公司 | Multithreaded file hash method based on wasm and web worker |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110033261B (en) * | 2018-12-26 | 2021-07-13 | 创新先进技术有限公司 | Block chain data processing method, device and system |
CN111064579A (en) * | 2019-12-11 | 2020-04-24 | 北京金汤科技有限公司 | Block chain-based secure multi-party computing method, system and storage medium |
CN112468577B (en) * | 2020-11-25 | 2021-11-02 | 上海欧冶金融信息服务股份有限公司 | Data controllable sharing method and system based on data mapping relation |
CN114153836A (en) * | 2021-07-15 | 2022-03-08 | 北京天德科技有限公司 | Encryption fragment reorganization data storage method and system based on block chain |
CN117216158A (en) * | 2023-08-22 | 2023-12-12 | 天云融创数据科技(北京)有限公司 | Data management method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180101701A1 (en) * | 2016-10-07 | 2018-04-12 | Acronis International Gmbh | System and method for file authenticity certification using blockchain network |
CN108664223A (en) * | 2018-05-18 | 2018-10-16 | 百度在线网络技术(北京)有限公司 | A kind of distributed storage method, device, computer equipment and storage medium |
CN108737068A (en) * | 2018-04-13 | 2018-11-02 | 中国地质大学(武汉) | A kind of password moneytary operations method for secret protection and system based on block chain |
CN109034800A (en) * | 2018-07-31 | 2018-12-18 | 杭州复杂美科技有限公司 | A kind of privacy method of commerce, system and equipment |
CN110033261A (en) * | 2018-12-26 | 2019-07-19 | 阿里巴巴集团控股有限公司 | Block chain data processing method, apparatus and system |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8014975B2 (en) * | 2007-09-28 | 2011-09-06 | Hitachi Global Storage Technologies, Netherlands B.V. | FTIR and EDX spectrum library of contaminants found on a HDD and their potential sources |
TW201317823A (en) * | 2011-10-31 | 2013-05-01 | Chunghwa Telecom Co Ltd | Cloud secured storage system |
US9483655B2 (en) * | 2013-03-12 | 2016-11-01 | Commvault Systems, Inc. | File backup with selective encryption |
US20160342989A1 (en) * | 2015-05-21 | 2016-11-24 | Mastercard International Incorporated | Method and system for processing blockchain-based transactions on existing payment networks |
CN106548091A (en) * | 2016-10-14 | 2017-03-29 | 北京爱接力科技发展有限公司 | A kind of data deposit card, the method and device of checking |
CN106991334B (en) * | 2016-11-24 | 2021-03-02 | 创新先进技术有限公司 | Data access method, system and device |
DE102016224533A1 (en) * | 2016-12-08 | 2018-06-14 | Bundesdruckerei Gmbh | Bidirectionally linked blockchain structure |
CN106941487B (en) * | 2017-02-24 | 2021-01-05 | 创新先进技术有限公司 | Data sending method and device |
CN107332657A (en) * | 2017-07-21 | 2017-11-07 | 广州智慧城市发展研究院 | A kind of encryption method and system based on block chain digital signature |
CN108648084B (en) * | 2018-05-18 | 2022-01-04 | 百度在线网络技术(北京)有限公司 | Data processing method, device and equipment of block chain network and storage medium |
CN108681943B (en) * | 2018-05-18 | 2022-07-12 | 百度在线网络技术(北京)有限公司 | Data processing method, device and equipment of block chain network and storage medium |
CN108768663B (en) * | 2018-05-31 | 2020-05-01 | 中国地质大学(武汉) | Block chain access control method and processing system thereof |
CN109063169A (en) * | 2018-08-17 | 2018-12-21 | 福建省农村信用社联合社 | A kind of customer data management system based on block chain |
-
2018
- 2018-12-26 CN CN201811605307.9A patent/CN110033261B/en active Active
- 2018-12-26 CN CN202110949513.7A patent/CN113689213B/en active Active
-
2019
- 2019-10-16 TW TW108137259A patent/TWI724579B/en active
- 2019-11-19 WO PCT/CN2019/119312 patent/WO2020134712A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180101701A1 (en) * | 2016-10-07 | 2018-04-12 | Acronis International Gmbh | System and method for file authenticity certification using blockchain network |
CN108737068A (en) * | 2018-04-13 | 2018-11-02 | 中国地质大学(武汉) | A kind of password moneytary operations method for secret protection and system based on block chain |
CN108664223A (en) * | 2018-05-18 | 2018-10-16 | 百度在线网络技术(北京)有限公司 | A kind of distributed storage method, device, computer equipment and storage medium |
CN109034800A (en) * | 2018-07-31 | 2018-12-18 | 杭州复杂美科技有限公司 | A kind of privacy method of commerce, system and equipment |
CN110033261A (en) * | 2018-12-26 | 2019-07-19 | 阿里巴巴集团控股有限公司 | Block chain data processing method, apparatus and system |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111815461A (en) * | 2020-07-03 | 2020-10-23 | 中保科联技术有限责任公司 | Claims settlement method, device, system, equipment and storage medium based on block chain |
CN112685767A (en) * | 2020-12-25 | 2021-04-20 | 联想(北京)有限公司 | Data processing method and system based on block chain |
CN112685767B (en) * | 2020-12-25 | 2024-03-26 | 联想(北京)有限公司 | Data processing method and system based on block chain |
CN112685775A (en) * | 2020-12-29 | 2021-04-20 | 北京八分量信息科技有限公司 | Method and device for monitoring data leakage prevention in block chain system and related products |
CN113570144A (en) * | 2021-07-30 | 2021-10-29 | 华北电力科学研究院有限责任公司 | Power utilization information processing method and device |
CN113570144B (en) * | 2021-07-30 | 2024-01-23 | 华北电力科学研究院有限责任公司 | Power consumption information processing method and device |
CN116933331A (en) * | 2023-07-28 | 2023-10-24 | 三峡高科信息技术有限责任公司 | Multithreaded file hash method based on wasm and web worker |
CN116933331B (en) * | 2023-07-28 | 2024-02-06 | 三峡高科信息技术有限责任公司 | Multithreaded file hash method based on wasm and web worker |
Also Published As
Publication number | Publication date |
---|---|
CN113689213A (en) | 2021-11-23 |
TWI724579B (en) | 2021-04-11 |
CN110033261B (en) | 2021-07-13 |
TW202025032A (en) | 2020-07-01 |
CN113689213B (en) | 2024-07-26 |
CN110033261A (en) | 2019-07-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020134712A1 (en) | Blockchain data processing method, device and system | |
US11295381B2 (en) | Data auditing method and device | |
US10841082B2 (en) | System and method for blockchain smart contract data privacy | |
CN109831298B (en) | Method for safely updating key in block chain, node and storage medium | |
EP3561674B1 (en) | Method and apparatus for verifying block data in a blockchain | |
Sun et al. | Data security and privacy in cloud computing | |
US9501661B2 (en) | Systems and methods for implementing an encrypted search index | |
CN108628611B (en) | Data calling method and data calling device | |
CN106991334A (en) | A kind of method, system and device of data access | |
WO2020134898A1 (en) | Hash information processing method and system for storage records in block of blockchain | |
WO2019095854A1 (en) | Traceable multi-party data processing method, apparatus and device | |
CN110334153B (en) | Authorization method, system, device and equipment in block chain type account book | |
CN110474775B (en) | User creating method, device and equipment in block chain type account book | |
CN113886418B (en) | Data processing method, device, electronic equipment and machine-readable storage medium | |
CN106230776A (en) | The safety protecting method of cloud computing data and device | |
CN108574567A (en) | Private file protection and cryptographic-key management system and method, the information processing terminal | |
CN112073444A (en) | Data set processing method and device and server | |
CN114491637A (en) | Data query method and device, computer equipment and storage medium | |
CN112202555B (en) | Information processing method, device and equipment for generating random number based on information attribute | |
US20190081950A1 (en) | Preventing statistical inference attacks on data that is shared among multiple stakeholders with disjoint access privileges | |
CN108920971A (en) | The method of data encryption, the method for verification, the device of encryption and verification device | |
CN116132079B (en) | Data processing method and device | |
CN112084536B (en) | Key storage method and device based on blockchain | |
CN114995949A (en) | Container mirror image construction method and device | |
US11165760B2 (en) | Increasing security of objects in cloud environments by using a two-part encryption scheme |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19902731 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19902731 Country of ref document: EP Kind code of ref document: A1 |