WO2021174758A1 - 协议数据共享的方法、装置、设备及存储介质 - Google Patents
协议数据共享的方法、装置、设备及存储介质 Download PDFInfo
- Publication number
- WO2021174758A1 WO2021174758A1 PCT/CN2020/105755 CN2020105755W WO2021174758A1 WO 2021174758 A1 WO2021174758 A1 WO 2021174758A1 CN 2020105755 W CN2020105755 W CN 2020105755W WO 2021174758 A1 WO2021174758 A1 WO 2021174758A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- protocol data
- data
- information
- protocol
- encrypted information
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- This application belongs to the field of blockchain technology, and specifically relates to a method, device, equipment, and storage medium for protocol data sharing.
- the existing protocol data sharing methods when the amount of protocol data that needs to be shared is large, the data that needs to be shared is usually aggregated first, and transmitted within a fixed time or time period.
- the timeliness of the existing protocol data sharing method is relatively low.
- the existing protocol data sharing method when the existing protocol data sharing method is implemented, it is necessary to connect each terminal that performs the protocol data sharing one-to-one. The data interaction between the terminals connected in this way is very complicated, so the connection is formed in this way. The maintenance cost of the protocol data sharing system is relatively high.
- the existing protocol data sharing method when each terminal performs protocol data sharing, since each terminal may view the protocol data, the existing protocol data sharing method is not highly secure and the protocol data is easily leaked.
- the present application provides a method, device, device, and storage medium for protocol data sharing, with the purpose of solving the problems of low timeliness, complex interaction, and poor security of protocol data sharing in existing protocol data sharing methods.
- an embodiment of the present application provides a method for protocol data sharing, which adopts the following technical solutions:
- the encryption identification obtain the encryption key of the protocol data, use the encryption key to encrypt the protocol data, and obtain the encrypted information
- Receive the query request of the query terminal obtain the decryption key according to the query request, use the decryption key to decrypt the encrypted information, obtain the protocol data, and transmit the protocol data to the query terminal.
- an embodiment of the present application also provides a protocol data sharing device, which adopts the following technical solutions:
- a device for protocol data sharing including:
- the receiving module is used to receive the protocol data uploaded by the information upload terminal, and generate an encrypted identifier according to the protocol data;
- the encryption module is used to obtain the encryption key of the protocol data according to the encryption identification, and use the encryption key to encrypt the protocol data to obtain the encrypted information;
- the storage module is used to determine the branch chain corresponding to the encrypted information according to the enterprise data encryption identifier, and store the encrypted information in the branch chain, where the branch chain is an independent storage space in the distributed ledger;
- the decryption module is used to receive the query request of the query terminal, obtain the decryption key according to the query request, decrypt the encrypted information with the decryption key, obtain the protocol data, and transmit the protocol data to the query terminal.
- the embodiments of the present application also provide a computer device, which adopts the following technical solutions:
- a computer device includes a memory and a processor.
- Computer readable instructions are stored in the memory.
- the processor executes the computer readable instructions, the following protocol data sharing method is realized:
- the encryption identification obtain the encryption key of the protocol data, use the encryption key to encrypt the protocol data, and obtain the encrypted information
- Receive the query request of the query terminal obtain the decryption key according to the query request, use the decryption key to decrypt the encrypted information, obtain the protocol data, and transmit the protocol data to the query terminal.
- the embodiments of the present application also provide a computer-readable storage medium, which adopts the following technical solutions:
- a computer-readable storage medium in which computer-readable instructions are stored on the computer-readable storage medium, and when the computer-readable instructions are executed by a processor, the following protocol data sharing method is realized:
- the encryption identification obtain the encryption key of the protocol data, use the encryption key to encrypt the protocol data, and obtain the encrypted information
- Receive the query request of the query terminal obtain the decryption key according to the query request, use the decryption key to decrypt the encrypted information, obtain the protocol data, and transmit the protocol data to the query terminal.
- the method for sharing protocol data receives protocol data uploaded by an information uploading terminal, and generates an encrypted identifier according to the protocol data; obtains according to the encrypted identifier
- the encryption key of the protocol data is used to encrypt the protocol data to obtain the encrypted information
- the branch chain corresponding to the encrypted information is determined according to the encryption identifier, and the encrypted information is stored in the branch chain, where the branch chain is a distributed ledger In an independent storage space; receive the query request from the query terminal, obtain the decryption key according to the query request, use the decryption key to decrypt the encrypted information, obtain the protocol data, and transmit the protocol data to the query terminal.
- This application uses the encryption key to encrypt the protocol data to generate encrypted information, and stores the encrypted information on the designated sub-chain in the distributed ledger according to the encryption identifier, so as to realize the sharing of protocol data and improve the timeliness of protocol data sharing. It also makes the structure of the protocol data sharing system simpler and more convenient to maintain. At the same time, the encrypted information is stored on the designated sub-chain in the distributed ledger, which is beneficial when the encrypted information on a certain sub-chain is updated, without other Synchronous updates are performed, thus effectively saving system storage space.
- Figure 1 is an exemplary system architecture diagram to which the present application can be applied;
- Figure 2 shows a flowchart of an embodiment of a method for protocol data sharing according to the present application
- FIG. 3 shows a flowchart of a specific implementation of step S201 in FIG. 2;
- FIG. 4 shows a flowchart of a specific implementation manner of step S202 in FIG. 2;
- FIG. 5 shows a flowchart of a specific implementation of step S203 in FIG. 2;
- FIG. 6 shows a specific implementation flow chart of whitelist setting in the method of the embodiment of the present application.
- FIG. 7 is a specific implementation flow chart of using the public key of the distributed ledger to encrypt the encryption key in the method of the embodiment of the present application;
- FIG. 8 shows a flowchart of a specific implementation manner of step S204 in FIG. 2;
- FIG. 9 is a schematic structural diagram of an embodiment of a device for sharing protocol data according to the present application.
- Fig. 10 is a schematic structural diagram of an embodiment of a computer device according to the present application.
- the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105.
- the network 104 is used to provide a medium for communication links between the terminal devices 101, 102, 103 and the server 105.
- the network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, and so on.
- the user can use the terminal devices 101, 102, and 103 to interact with the server 105 through the network 104 to receive or send messages and so on.
- Various communication client applications such as web browser applications, shopping applications, search applications, instant messaging tools, email clients, and social platform software, can be installed on the terminal devices 101, 102, and 103.
- the terminal devices 101, 102, and 103 may be various electronic devices with display screens and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, dynamic Video experts compress standard audio layer 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image experts compress standard audio layer 4) players, laptop portable computers and desktop computers, etc.
- MP3 players Moving Picture Experts Group Audio Layer III, dynamic Video experts compress standard audio layer 3
- MP4 Moving Picture Experts Group Audio Layer IV, dynamic image experts compress standard audio layer 4
- laptop portable computers and desktop computers etc.
- the server 105 may be a server that provides various services, for example, a background server that provides support for pages displayed on the terminal devices 101, 102, and 103.
- the method for sharing protocol data provided by the embodiments of the present application is generally executed by a server/terminal device. Accordingly, a device for sharing protocol data is generally set in the server/terminal device.
- terminal devices, networks, and servers in FIG. 1 are merely illustrative. There can be any number of terminal devices, networks, and servers according to implementation needs.
- FIG. 2 shows a flowchart of an embodiment of a method for protocol data sharing according to the present application.
- the method for sharing protocol data includes the following steps:
- S201 Receive protocol data uploaded by the information upload terminal, and generate an encrypted identifier according to the protocol data;
- the protocol data can be different organizations and institutions that need to maintain intercommunication and share data information.
- a type of agreement data such as business transaction information between two companies having a cooperative relationship, the need to maintain exchange and sharing of information between two companies having a cooperative relationship, So that the two parties can carry out cooperative business.
- the server receives the protocol data uploaded by the information upload terminal.
- the server receives the protocol data uploaded by the information upload terminal.
- the electronic device (such as the server/terminal device shown in FIG. 1) on which the protocol data sharing method runs can receive the protocol data uploaded by the information upload terminal through a wired connection or a wireless connection.
- the above-mentioned wireless connection methods can include, but are not limited to, 3G/4G connection, WiFi connection, Bluetooth connection, WiMAX connection, Zigbee connection, UWB (ultra wideband) connection, and other wireless connection methods currently known or developed in the future .
- S202 Obtain an encryption key of the protocol data according to the encryption identifier, and use the encryption key to encrypt the protocol data to obtain encrypted information;
- encryption refers to concealing the plaintext information, making it unreadable when it lacks special information.
- common asymmetric encryption algorithms can be used to encrypt the plaintext information, and the asymmetric encryption algorithm refers to its encryption.
- Asymmetric encryption will generate an encryption key and a decryption key.
- the encryption key and decryption key are a pair of secret keys.
- the encryption key is due to the encryption of plaintext information and the decryption key. It is used to decrypt the plaintext information encrypted by the encryption key to realize the encryption and decryption process of the plaintext information.
- the server obtains the encryption key of the protocol data corresponding to the encrypted identifier according to the encryption identifier obtained in S201, and encrypts the protocol data according to the encryption key to obtain encrypted information.
- S203 Determine the branch chain corresponding to the encrypted information according to the enterprise data encryption identifier, and store the encrypted information in the branch chain, where the branch chain is an independent storage space in the distributed ledger;
- distributed ledger is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm, etc. It is a kind of chained data that combines data blocks in sequence in a chronological order. Structure, and a distributed ledger that cannot be tampered with or forged that is guaranteed by cryptography.
- the branch chain is a storage space in the distributed ledger that is independent of the main chain.
- the data stored in each branch chain is independent of each other and does not interfere with each other.
- the data of nodes stored in the same branch chain is synchronized when data is updated.
- the data stored on the nodes in different branches will not be updated synchronously when the data is updated.
- the distributed ledger has 1 main chain and 3 branch chains (Channel main chain, Channel1 branch, Channel2 branch, Channel3 branch) and four encrypted messages (respectively Org1, Org2, Org3, and Org4), where the information Org1 is stored in the main chain, the information Org4 is stored in three sub-chains, the information Org2 is stored in the Channel2 sub-chain and the Channel3 sub-chain, and the information Org3 is only stored in the Channel2 sub-chain.
- the information Org1 is stored in the main chain
- the information Org4 is stored in three sub-chains
- the information Org2 is stored in the Channel2 sub-chain and the Channel3 sub-chain
- the information Org3 is only stored in the Channel2 sub-chain.
- the encrypted information is stored in the chain. On each node in the.
- S204 Receive a query request from the query terminal, obtain a decryption key according to the query request, decrypt the encrypted information using the decryption key, obtain protocol data, and transmit the protocol data to the query terminal.
- the server receives the query request from the query terminal, and obtains the decryption key according to the query request, and uses the decryption key to decrypt the encrypted information. If the decryption is successful, the decrypted information will be decrypted.
- the protocol data is transmitted to the query terminal for the queryer to view. If the decryption key cannot decrypt the encrypted information, the decryption fails, and the result of the query failure is output to the query terminal, prompting the queryer that the query failed.
- the electronic device (such as the server/terminal device shown in FIG. 1) on which the protocol data sharing method runs can receive the query request of the query terminal through a wired connection or a wireless connection.
- the above-mentioned wireless connection methods can include, but are not limited to, 3G/4G connection, WiFi connection, Bluetooth connection, WiMAX connection, Zigbee connection, UWB (ultra wideband) connection, and other wireless connection methods currently known or developed in the future .
- the encryption key of the protocol data is obtained, and the protocol data is encrypted according to the encryption key to obtain Encrypted information; determine the branch chain corresponding to the encrypted information according to the enterprise data encryption identifier, and store the encrypted information in the branch chain, where the branch chain is an independent storage space in the distributed ledger; receive the query request from the query terminal, and according to the query Request to obtain the decryption key, use the decryption key to decrypt the encrypted information, obtain the protocol data, and transmit the protocol data to the query terminal.
- This application uses the encryption key to encrypt the protocol data to generate encrypted information, and stores the encrypted information on the designated sub-chain in the distributed ledger according to the encryption identifier, so as to realize the sharing of protocol data and improve the timeliness of protocol data sharing. It also makes the structure of the protocol data sharing system simpler and more convenient to maintain.
- the encrypted information is stored on the designated sub-chain in the distributed ledger, which is beneficial when the encrypted information on a certain sub-chain is updated, without other Synchronous updates are performed, thus effectively saving system storage space, and encrypting the protocol data before storing it in the distributed ledger. Only after decryption is it allowed to query the protocol data, which improves the security of protocol data sharing.
- Step S201 receiving protocol data uploaded by the information upload terminal and generating an encrypted identifier according to the protocol data specifically includes:
- each piece of protocol data contains multiple field information, which records different information content, and different field information corresponds to different encryption identifiers.
- the protocol data is parsed, and the field information in the protocol data is extracted.
- the agreement data includes enterprise data and agreement object data.
- the enterprise data includes information such as the name of the insurance company and organization code;
- the agreement object data includes the basic information and document information of the agreement object;
- the basic information of the agreement object includes the name and credentials of the agreement object Number, education, marital status, hobbies and other information;
- the document information includes agreement number, category, name, amount, time limit, cost and other information.
- S302 Detect the content of all field information, classify all field information, and obtain enterprise data and protocol object data;
- the server detects all the field information extracted in S301, and detects the content of all the field information.
- the field information in the above protocol data is detected, and the following results are obtained:
- Agreement object data field information "Certificate Number (ID): 4400002000001010000", “Name: Zhang San”, “Number: 200000000”...
- S303 Generate an encryption identifier according to the enterprise data and the protocol object data, where the encryption identifier includes the enterprise data encryption identifier and the protocol object data encryption identifier.
- Each enterprise data and each protocol object data corresponds to an encryption identifier, where the encryption identifier includes the enterprise data encryption identifier and the protocol object data encryption identifier ,
- the enterprise data encryption identifier is generated by enterprise data
- the protocol object data encryption identifier is generated by protocol object data.
- the protocol data is parsed to obtain the field information in the protocol data; the content of all field information is detected, all field information is classified, and the enterprise data and the protocol object data are obtained; the encryption is generated based on the enterprise data and the protocol object data Identification, where the encryption identification includes an enterprise data encryption identification and a protocol object data encryption identification.
- FIG. 4 shows a flowchart of a specific implementation of step S202 in FIG. Encryption
- the encrypted information obtained specifically includes:
- the enterprise data encryption key of the protocol data is obtained according to the enterprise data encryption identification. It should be noted that each enterprise data encryption identifier corresponds to an encryption key.
- S402 Acquire a protocol object data encryption key of the protocol data according to the protocol object data encryption identifier.
- the protocol object data encryption key of the protocol data is obtained according to the protocol object data encryption identifier. It should be noted that each protocol object data encryption identifier corresponds to an encryption key.
- S403 Encrypt the protocol data using the enterprise data encryption key and the protocol object data encryption key to obtain encrypted information, where the enterprise data encryption key is used to encrypt enterprise data, and the protocol object data encryption key is used to encrypt the protocol Object data.
- the enterprise data encryption key is used to encrypt the enterprise data field information in the protocol data
- the protocol object data encryption key is used to encrypt the protocol object data field information in the protocol data. After all the field information is encrypted, the obtained Encrypt information.
- the enterprise data encryption key of the protocol data is obtained according to the enterprise data encryption identifier; the protocol object data encryption key of the protocol data is obtained according to the protocol object data encryption identifier; the enterprise data encryption key and the protocol object data are respectively used
- the encryption key encrypts the protocol data to obtain encrypted information.
- the enterprise data encryption key is used to encrypt the enterprise data
- the protocol object data encryption key is used to encrypt the protocol object data.
- the enterprise data field information in the protocol data is encrypted by the enterprise data encryption key
- the protocol object data field information in the protocol data is encrypted by the protocol object data encryption key, so that each field information in the protocol data can be separated. Encryption improves the security of protocol data sharing.
- FIG. 5 shows a flowchart of a specific implementation of step S203 in FIG.
- the chain specifically includes:
- S501 Determine the distributed ledger branch chain corresponding to the encrypted information according to the enterprise data encryption identifier
- the system allocates a corresponding distributed ledger sub-chain in advance.
- the protocol data generated by each enterprise is stored in the designated distributed ledger sub-chain.
- the protocol data generated by the enterprise is specific Which branch chain is stored in the distributed ledger can be determined by the enterprise data encryption identification.
- the distributed ledger branch corresponding to the encrypted information is determined according to the enterprise data encryption identifier.
- S502 Store the encrypted information in the nodes of the distributed ledger branch chain through the peer-to-peer network;
- the peer-to-peer network namely P2P (Peer to Peer) refers to a peer-to-peer computer network. It is a distributed application architecture that distributes tasks and workloads between peers. It is a peer-to-peer computing model formed at the application layer. A kind of networking or network form, its characteristics include decentralization, scalability and high cost performance.
- the encrypted information is stored in the distributed ledger chain through a P2P peer-to-peer network, and the nodes of the distributed ledger chain receive the encrypted information and save the encrypted information in its own memory.
- nodes of the distributed ledger branch store the encrypted information in their own memory, they also need to wait for a consensus with other nodes of the branch. Only when the consensus is completed can the sharing of encrypted information on the distributed ledger be truly realized. Among them, consensus is the process of establishing trust and obtaining rights and interests between different nodes.
- the nodes in the distributed ledger branch chain will form all the encrypted information stored in their own memory to form an encrypted information set.
- the distributed ledger may also be a blockchain.
- a branch of the blockchain node will combine all the encrypted information stored in the memory to form encrypted information Collect and calculate the hash value of the encrypted information set, and form a block through the hash value and the encrypted information set.
- the block includes the following information: the hash value of the current block, the hash value of the previous block, the time stamp when a consensus is reached, description information, and a collection of encryption information.
- each node of the blockchain branch obtains the hash value corresponding to the encrypted information set in the block, and sets the hash value with the stored encrypted information
- each blockchain branch node sends its own encrypted information collection to other nodes in the blockchain branch chain for comparison.
- the blockchain branch chain When all nodes reach a consensus on the encrypted information set within the preset time, it means that the consensus is passed, and the encrypted information set passed by the consensus is obtained.
- S505 Use the nodes of the distributed ledger branch to verify the encrypted information set, and when the verification passes, store the encrypted information set in the distributed ledger branch.
- the node of the distributed ledger branch is used to verify the encrypted information set, and when the verification is passed, the encrypted information set is stored in the distributed ledger branch, If the verification fails, the verification failure message is output.
- the distributed ledger branch chain corresponding to the encrypted information is determined according to the enterprise data encryption identification; the encrypted information is diffused to the nodes of the distributed ledger branch chain through the peer-to-peer network; the nodes of the distributed ledger branch chain are used for encryption Consensus information; when the nodes of the distributed ledger chain pass the consensus on the encrypted information within the preset time, the encrypted information set is obtained; the nodes of the distributed ledger chain are used to verify the encrypted information set. When the verification passes, the encrypted information set will be verified.
- the encrypted information collection is stored in the distributed ledger branch chain.
- step S204 the query request from the query terminal is received, and the decryption secret is obtained according to the query request.
- Key using the decryption key to decrypt the encrypted information to obtain the protocol data, and before transmitting the protocol data to the query terminal, it also includes:
- S601 Obtain a whitelist of encrypted information, where a query terminal used for querying protocol data is recorded on the whitelist;
- organizations and institutions in the protocol data sharing system can preset query terminals that can query encrypted information, and count all query terminals that can query encrypted information to form a whitelist of encrypted information.
- a white list of encrypted information is obtained, where a query terminal for querying protocol data is recorded on the white list.
- S602 Obtain queryable field information of the query terminal according to a preset query terminal permission table
- the query terminal authority table is used to standardize the queryable field information of each query terminal, and the query terminal authority table can be preset in the query terminal by an organization or institution in the protocol data sharing system.
- the query terminal authority table may be as shown in the following table:
- Table 1 A specific query terminal permission table
- the query terminal A only has the authority to query the information in the "enterprise name” field
- the query terminal B only has the authority to query the "name” and "ID number” of the protocol object
- the query terminal C only has the query Protocol data "number” field information authority, so each query terminal can only query the corresponding protocol data within its own authority range, and does not have the authority to query other protocol data outside the range of its own authority.
- the server obtains the queryable field information of each query terminal according to a preset query terminal permission table.
- S603 Obtain a decryption key corresponding to the queryable field information according to the queryable field information of the query terminal.
- the decryption key corresponding to the queryable field information is obtained.
- each field information corresponds to a decryption key
- the decryption key corresponding to a field information and the encryption key used for the field information belong to a key pair
- the decryption key corresponding to the field information can only decrypt the The encryption key used for field information cannot decrypt the encryption keys used for other field information.
- S604 Allocate the decryption key corresponding to the queryable field information to the corresponding query terminal.
- the server obtains the corresponding decryption key from the distributed ledger according to the queryable field information, and assigns the decryption key to the corresponding query terminal according to the queryable field information authority.
- the query terminal that can query the protocol data is recorded on the white list; according to the preset query terminal authority table, the query field information of the query terminal is obtained; according to the query terminal of the query terminal Field information, the decryption key corresponding to the queryable field information is obtained; the decryption key corresponding to the queryable field information is assigned to the corresponding query terminal.
- each field information in the protocol data is assigned to different query terminals. Different query terminals can only query the field information within the scope of their own query authority, and realize the information on each field in the protocol data. Separate decryption and separate query of, further improve the security of protocol data sharing.
- the protocol data sharing method further includes:
- S701 Obtain the public key of the distributed ledger, and use the public key of the distributed ledger to encrypt the encryption key;
- the public key of the distributed ledger is obtained, and the public key of the distributed ledger is used to encrypt the enterprise data encryption key and the protocol object data encryption key used to encrypt the protocol data.
- S702 Associate the public key, encryption key, and encrypted information of the distributed ledger to generate associated information
- the public key of the distributed ledger, the enterprise data encryption key, the protocol object data encryption key, and the encryption information are associated to generate associated information, and the associated information is stored in the distributed ledger according to the enterprise data encryption key.
- the sub-chain In the sub-chain.
- S703 Generate a query interface according to the associated information, where the query interface is used to query protocol data.
- the interface refers to the application programming interface, which is some pre-defined functions.
- the purpose is to provide applications and developers with the ability to access a set of routines based on certain software or hardware without having to access the source code, or understand it as internal work The details of the mechanism.
- the query interface of the server is generated according to the associated information, where the query interface is used to query protocol data, and the associated encrypted information can be directly queried by calling the query interface.
- the public key of the distributed ledger is obtained, and the public key of the distributed ledger is used to encrypt the encryption key; the public key, encryption key, and encrypted information of the distributed ledger are associated to generate associated information; The associated information generates a query interface, where the query interface is used to query protocol data.
- Step S204 receives the query request from the query terminal, obtains the decryption key according to the query request, and uses the decryption key pair
- the encrypted information is decrypted to obtain the protocol data, and the protocol data is transmitted to the query terminal specifically including:
- a query request from the query terminal is received through the query interface of the server.
- the query request is used to query protocol data.
- the query request carries at least the private key of the distributed ledger and the target company data identifier, and the target company data identifier
- the identification information used to query the storage location of encrypted information in the distributed ledger, and the target enterprise data identification is input by the user on the query terminal.
- S802 Determine the location of the encrypted information in the distributed ledger according to the target enterprise data identification
- the server determines the specific location where the encrypted information to be queried is stored in the branch chain of the distributed ledger according to the target enterprise data identification;
- S803 Use the private key of the distributed ledger to decrypt the public key of the distributed ledger to obtain a decryption key
- the branch chain of the distributed ledger After determining the specific location where the encrypted information to be queried is stored in the branch chain of the distributed ledger, extract the encrypted information in the branch chain of the distributed ledger, and use the private key of the distributed ledger to compare the distributed ledger
- the public key is decrypted, and the decryption key is obtained.
- S804 Use the decryption key to decrypt the encrypted information to obtain protocol data, and transmit the protocol data to the query terminal.
- the decryption key is used to decrypt the encrypted information extracted from the branch chain of the distributed ledger to obtain the protocol data, and transmit the protocol data to the query terminal.
- the query request of the query terminal is received through the query interface, where the query request carries at least the private key of the distributed ledger and the target company data identification, and the query request is used to query the protocol data; the encryption is determined according to the target company data identification The location of the information in the distributed ledger; use the private key of the distributed ledger to decrypt the public key of the distributed ledger to obtain the decryption key; use the decryption key to decrypt the encrypted information to obtain the protocol data, and transmit the protocol data to the query terminal . It is more convenient to directly query the protocol data by setting the query interface.
- the aforementioned storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disc, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM), etc.
- Figure 9 is a schematic structural diagram of an embodiment of a device for sharing protocol data according to this application.
- this application provides an implementation of a device for sharing protocol data.
- the device embodiment corresponds to the method embodiment shown in FIG. 2, and the device can be specifically applied to various electronic devices.
- the device for sharing protocol data in this embodiment includes:
- the receiving module 901 is configured to receive the protocol data uploaded by the information upload terminal, and generate an encrypted identifier according to the protocol data;
- the encryption module 902 is configured to obtain an encryption key of the protocol data according to the encryption identifier, and use the encryption key to encrypt the protocol data to obtain encrypted information;
- the storage module 903 is configured to determine the branch chain corresponding to the encrypted information according to the enterprise data encryption identifier, and store the encrypted information in the branch chain, where the branch chain is an independent storage space in the distributed ledger;
- the decryption module 904 is configured to receive a query request from the query terminal, obtain a decryption key according to the query request, decrypt the encrypted information using the decryption key, obtain protocol data, and transmit the protocol data to the query terminal.
- the receiving module 901 specifically includes:
- the parsing unit is used to parse the protocol data and obtain field information in the protocol data;
- the classification unit is used to detect the content of all field information, classify all field information, and obtain enterprise data and protocol object data;
- the encryption identification generating unit is used to generate an encryption identification based on the enterprise data and the protocol object data, where the encryption identification includes the enterprise data encryption identification and the protocol object data encryption identification.
- the encryption module 902 specifically includes:
- the enterprise data encryption key obtaining unit is used to obtain the enterprise data encryption key of the protocol data according to the enterprise data encryption identification;
- the protocol object data encryption key obtaining unit is used to obtain the protocol object data encryption key of the protocol data according to the protocol object data encryption identifier;
- the encryption unit is used to encrypt the protocol data using the enterprise data encryption key and the protocol object data encryption key to obtain encrypted information.
- the enterprise data encryption key is used to encrypt the enterprise data
- the protocol object data encryption key is used For encrypting protocol object data.
- the storage module 903 specifically includes:
- the chain branch determining unit is used to determine the distributed ledger branch chain corresponding to the encrypted information according to the enterprise data encryption identifier
- the diffusion unit is used to store encrypted information in the nodes of the distributed ledger branch chain through the peer-to-peer network;
- the consensus unit is used to reach a consensus on encrypted information through the nodes of the distributed ledger chain;
- the encrypted information collection generating unit is used to obtain the encrypted information collection when the nodes of the distributed ledger branch chain agree on the encrypted information within the preset time;
- the verification unit is used to verify the encrypted information collection using the nodes of the distributed ledger branch chain, and when the verification is passed, the encrypted information collection is stored in the distributed ledger branch chain.
- protocol data sharing device further includes:
- the whitelist obtaining module is used to obtain a whitelist of encrypted information, where a query terminal used for querying protocol data is recorded on the whitelist;
- the queryable field information obtaining module is used to obtain the queryable field information of the query terminal according to the preset query terminal authority table;
- the decryption key obtaining module is used to obtain the decryption key corresponding to the queryable field information according to the queryable field information of the query terminal;
- the distribution module is used to distribute the decryption key corresponding to the queryable field information to the corresponding query terminal.
- protocol data sharing device further includes:
- the public key acquisition module is used to acquire the public key of the distributed ledger, and use the public key of the distributed ledger to encrypt the encryption key;
- the association module is used to associate the public key, encryption key and encrypted information of the distributed ledger to generate associated information
- the query interface generation module is used to generate a query interface according to the associated information, where the query interface is used to query protocol data.
- decryption module 904 specifically includes:
- the query request receiving unit is configured to receive the query request of the query terminal through the query interface, where the query request carries at least the private key of the distributed ledger and the target enterprise data identifier, and the target enterprise data identifier is used to query encrypted information in the distributed ledger.
- the location query unit is used to determine the location of the encrypted information in the distributed ledger based on the target enterprise data identification
- the first decryption unit is configured to use the private key of the distributed ledger to decrypt the public key of the distributed ledger to obtain the decryption key;
- the second decryption unit is used to decrypt the encrypted information using the decryption key to obtain protocol data, and transmit the protocol data to the query terminal.
- the present application discloses a method, device, equipment and storage medium for sharing protocol data.
- the device includes: a receiving module 901 for receiving protocol data uploaded by an information uploading terminal, and generating an encrypted identifier according to the protocol data; an encryption module 902, used to obtain the encryption key of the protocol data according to the encryption identification, and use the encryption key to encrypt the protocol data to obtain the encrypted information; the storage module 903 is used to determine the branch chain corresponding to the encrypted information according to the enterprise data encryption identification, and The encrypted information is stored in the branch chain, where the branch chain is an independent storage space in the distributed ledger; the decryption module 904 is used to receive the query request from the query terminal, obtain the decryption key according to the query request, and use the decryption key pair The encrypted information is decrypted to obtain the protocol data, and the protocol data is transmitted to the query terminal.
- This application uses the encryption key to encrypt the protocol data to generate encrypted information, and stores the encrypted information on the designated sub-chain in the distributed ledger according to the encryption identifier, so as to realize the sharing of protocol data and improve the timeliness of protocol data sharing. It also makes the structure of the protocol data sharing system simpler and more convenient to maintain.
- the encrypted information is stored on the designated sub-chain in the distributed ledger, which is beneficial when the encrypted information on a certain sub-chain is updated, without other Synchronous updates are performed, thus effectively saving system storage space, and encrypting the protocol data before storing it in the distributed ledger. Only after decryption is it allowed to query the protocol data, which improves the security of protocol data sharing.
- FIG. 10 is a block diagram of the basic structure of the computer device in this embodiment.
- the computer device 6 includes a memory 61, a processor 62, and a network interface 63 that communicate with each other through a system bus. It should be pointed out that the figure only shows the computer device 6 with components 61-63, but it should be understood that it is not required to implement all of the illustrated components, and more or fewer components may be implemented instead. Among them, those skilled in the art can understand that the computer device here is a device that can automatically perform numerical calculation and/or information processing in accordance with pre-set or stored instructions.
- Its hardware includes, but is not limited to, a microprocessor, a dedicated Integrated Circuit (Application Specific Integrated Circuit, ASIC), Programmable Gate Array (Field-Programmable Gate Array, FPGA), Digital Processor (Digital Signal Processor, DSP), embedded equipment, etc.
- ASIC Application Specific Integrated Circuit
- ASIC Application Specific Integrated Circuit
- FPGA Field-Programmable Gate Array
- DSP Digital Processor
- the computer device may be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud server.
- the computer device can interact with the user through a keyboard, a mouse, a remote control, a touch panel, or a voice control device.
- the memory 61 includes at least one type of readable storage medium, the readable storage medium includes flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory, etc.), random access memory (RAM), static memory Random access memory (SRAM), read only memory (ROM), electrically erasable programmable read only memory (EEPROM), programmable read only memory (PROM), magnetic memory, magnetic disk, optical disk, etc.
- the memory 61 may be an internal storage unit of the computer device 6, such as a hard disk or a memory of the computer device 6.
- the memory 61 may also be an external storage device of the computer device 6, such as a plug-in hard disk equipped on the computer device 6, a smart media card (SMC), a secure digital (Secure Digital, SD) card, Flash Card, etc.
- the memory 61 may also include both the internal storage unit of the computer device 6 and its external storage device.
- the memory 61 is generally used to store an operating system and various application software installed in the computer device 6, such as program code of a protocol data sharing method.
- the memory 61 can also be used to temporarily store various types of data that have been output or will be output.
- the processor 62 may be a central processing unit (CPU), a controller, a microcontroller, a microprocessor, or other data processing chips.
- the processor 62 is generally used to control the overall operation of the computer device 6.
- the processor 62 is configured to run the program code stored in the memory 61 or process data, for example, run the program code of the protocol data sharing method.
- the network interface 63 may include a wireless network interface or a wired network interface, and the network interface 63 is generally used to establish a communication connection between the computer device 6 and other electronic devices.
- the computer-readable storage medium may be non-volatile or volatile, and the computer-readable storage medium stores
- the program of the protocol data sharing method can be executed by at least one processor, so that the at least one processor executes the steps of the protocol data sharing method described above.
- the technical solution of this application essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, The optical disc) includes several instructions to make a terminal device (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of the present application.
- a terminal device which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
本申请公开了一种协议数据共享的方法、装置、设备及存储介质,属于区块链技术领域中的跨链协议技术,所述方法:接收由信息上传终端上传的协议数据,并根据协议数据生成加密标识;根据加密标识,获取协议数据的加密秘钥,使用加密秘钥对协议数据进行加密,得到加密信息;根据企业数据加密标识确定加密信息对应的分链,并将加密信息存储至分链中,其中,分链为分布式账本中一个独立的存储空间;接收查询终端的查询请求,根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,得到协议数据,并将协议数据传输至查询终端。本申请可以实现协议数据的共享,同时提高了协议数据共享的时效性和安全性。
Description
本申请要求于2020年3月6日提交中国专利局、申请号为202010155300.2,发明名称为“协议数据共享的方法、装置、设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请属于区块链技术领域,具体涉及一种协议数据共享的方法、装置、设备及存储介质。
在现有的协议数据共享方式中,当需要共享协议数据的数量较大时,通常是先将需要共享的数据进行集中汇总,并在固定的时间或时间段内进行传输,在协议数据共享共享过程中,发明人意识到现有的协议数据共享方式的时效性较低。而且现有的协议数据共享方式在实施时,需要将在进行协议数据共享的各个终端间进行一一对接起来,通过这种方式连接的终端之间数据交互非常复杂,因此通过这种方式连接形成的协议数据共享系统维护成本较高。此外,在现有的协议数据共享方式中,各个终端间进行协议数据共享时,由于各个终端均有可能查看协议数据,所以现有的协议数据共享方式安全性不高,协议数据容易被泄露。
发明内容
本申请提供一种协议数据共享的方法、装置、设备及存储介质,目的在于解决现有协议数据共享方式中协议数据共享时效性较低、交互复杂以及安全性差的问题。
为了解决上述技术问题,本申请实施例提供一种协议数据共享的方法,采用了如下所述的技术方案:
接收由信息上传终端上传的协议数据,并根据协议数据生成加密标识;
根据加密标识,获取协议数据的加密秘钥,使用加密秘钥对协议数据进行加密,得到加密信息;
根据加密标识确定加密信息对应的分链,并将加密信息存储至分链中,其中,分链为分布式账本中一个独立的存储空间;
接收查询终端的查询请求,根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,得到协议数据,并将协议数据传输至查询终端。
为了解决上述技术问题,本申请实施例还提供一种协议数据共享的装置,采用了如下所述的技术方案:
一种协议数据共享的装置,包括:
接收模块,用于接收由信息上传终端上传的协议数据,并根据协议数据生成加密标识;
加密模块,用于根据加密标识,获取协议数据的加密秘钥,使用加密秘钥对协议数据进行加密,得到加密信息;
存储模块,用于根据企业数据加密标识确定加密信息对应的分链,并将加密信息存储至分链中,其中,分链为分布式账本中一个独立的存储空间;
解密模块,用于接收查询终端的查询请求,根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,得到协议数据,并将协议数据传输至查询终端。
为了解决上述技术问题,本申请实施例还提供一种计算机设备,采用了如下的技术方案:
一种计算机设备,包括存储器和处理器,存储器中存储有计算机可读指令,处理器执行计算机可读指令时实现如下协议数据共享的方法:
接收由信息上传终端上传的协议数据,并根据协议数据生成加密标识;
根据加密标识,获取协议数据的加密秘钥,使用加密秘钥对协议数据进行加密,得到加密信息;
根据加密标识确定加密信息对应的分链,并将加密信息存储至分链中,其中,分链为分布式账本中一个独立的存储空间;
接收查询终端的查询请求,根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,得到协议数据,并将协议数据传输至查询终端。
为了解决上述技术问题,本申请实施例还提供一种计算机可读存储介质,采用了如下的技术方案:
一种计算机可读存储介质,其中,计算机可读存储介质上存储有计算机可读指令,计算机可读指令被处理器执行时实现如下协议数据共享的方法:
接收由信息上传终端上传的协议数据,并根据协议数据生成加密标识;
根据加密标识,获取协议数据的加密秘钥,使用加密秘钥对协议数据进行加密,得到加密信息;
根据加密标识确定加密信息对应的分链,并将加密信息存储至分链中,其中,分链为分布式账本中一个独立的存储空间;
接收查询终端的查询请求,根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,得到协议数据,并将协议数据传输至查询终端。
与现有技术相比,本申请实施例主要有以下有益效果:
本申请公开了一种协议数据共享的方法、装置、设备及存储介质,所述协议数据共享的方法通过接收由信息上传终端上传的协议数据,并根据协议数据生成加密标识;根据加密标识,获取协议数据的加密秘钥,使用加密秘钥对协议数据进行加密,得到加密信息;根据加密标识确定加密信息对应的分链,并将加密信息存储至分链中,其中,分链为分布式账本中一个独立的存储空间;接收查询终端的查询请求,根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,得到协议数据,并将协议数据传输至查询终端。本申请利用加密秘钥对协议数据加密后生成加密信息,根据加密标识将加密信息存储至分布式账本中的指定的分链上,以实现协议数据的共享,提高了协议数据共享的时效性,也使得协议数据共享系统的结构更加简单,维护起来更方便,同时加密信息存储至分布式账本中的指定的分链上有利于在某一分链上的加密信息发生更新时,并不需要其他进行同步更新,因此有效节省了系统存储空间。
为了更清楚地说明本申请中的方案,下面将对本申请实施例描述中所需要使用的附图作一个简单介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请可以应用于其中的示例性系统架构图;
图2示出了根据本申请的协议数据共享的方法的一个实施例的流程图;
图3示出了图2中步骤S201的一种具体实施方式的流程图;
图4示出了图2中步骤S202的一种具体实施方式的流程图;
图5示出了图2中步骤S203的一种具体实施方式的流程图;
图6示出了本申请实施例的方法中进行设置白名单的具体实现流程图;
图7本申请实施例的方法中采用分布式账本的公钥对加密秘钥进行加密的具体实现流程图;
图8示出了图2中步骤S204的一种具体实施方式的流程图;
图9是根据本申请的协议数据共享的装置的一个实施例的结构示意图;
图10是根据本申请的计算机设备的一个实施例的结构示意图。
除非另有定义,本文所使用的所有的技术和科学术语与属于本申请的技术领域的技术人员通常理解的含义相同;本文中在申请的说明书中所使用的术语只是为了描述具体的实施例的目的,不是旨在于限制本申请;本申请的说明书和权利要求书及上述附图说明中的术语“包括”和“具有”以及它们的任何变形,意图在于覆盖不排他的包含。本申请的说明书和权利要求书或上述附图中的术语“第一”、“第二”等是用于区别不同对象,而不是用于描述特定顺序。
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。
为了使本技术领域的人员更好地理解本申请方案,下面将结合附图,对本申请实施例中的技术方案进行清楚、完整地描述。
如图1所示,系统架构100可以包括终端设备101、102、103,网络104和服务器105。网络104用以在终端设备101、102、103和服务器105之间提供通信链路的介质。网络104可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。
用户可以使用终端设备101、102、103通过网络104与服务器105交互,以接收或发送消息等。终端设备101、102、103上可以安装有各种通讯客户端应用,例如网页浏览器应用、购物类应用、搜索类应用、即时通信工具、邮箱客户端、社交平台软件等。
终端设备101、102、103可以是具有显示屏并且支持网页浏览的各种电子设备,包括但不限于智能手机、平板电脑、电子书阅读器、MP3播放器(Moving Picture Experts Group Audio Layer III,动态影像专家压缩标准音频层面3)、MP4(Moving Picture Experts Group Audio Layer IV,动态影像专家压缩标准音频层面4)播放器、膝上型便携计算机和台式计算机等等。
服务器105可以是提供各种服务的服务器,例如对终端设备101、102、103上显示的页面提供支持的后台服务器。
需要说明的是,本申请实施例所提供的一种协议数据共享的方法一般由服务器/终端设备执行,相应地,一种协议数据共享的装置一般设置于服务器/终端设备中。
应该理解,图1中的终端设备、网络和服务器的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端设备、网络和服务器。
继续参考图2,图2示出了根据本申请的协议数据共享的方法的一个实施例的流程图。所述的协议数据共享的方法,包括以下步骤:
S201,接收由信息上传终端上传的协议数据,并根据协议数据生成加密标识;
其中,协议数据可以是不同的组织、机构之间需要保持互通和共享数据信息。在本申请一种具体的实施例中,一种的协议数据如具有合作关系的两个企业之间的业务往来信息,在具有合作关系的两个企业之间的需要保持往来信息互通和共享,以便双方开展合作业务。
具体的,服务器接收由信息上传终端上传的协议数据。其中,如上述具有合作关系的 两个企业之间的业务往来信息的共享,可以由其中一方在完成业务后,将形成的协议数据通过上传终端将进行上传。
在本实施例中,种协议数据共享的方法运行于其上的电子设备(例如图1所示的服务器/终端设备)可以通过有线连接方式或者无线连接方式接收由信息上传终端上传的协议数据。需要指出的是,上述无线连接方式可以包括但不限于3G/4G连接、WiFi连接、蓝牙连接、WiMAX连接、Zigbee连接、UWB(ultra wideband)连接、以及其他现在已知或将来开发的无线连接方式。
S202,根据加密标识,获取协议数据的加密秘钥,采用加密秘钥对协议数据进行加密,得到加密信息;
其中,加密指是将明文信息隐匿起来,使之在缺少特殊信息时不可读,在加密处理过程中,可以使用常见的非对称加密算法对明文信息进行加密,非对称加密算法即是指其加密和解密时所使用的密钥不相同的算法,非对称加密会产生加密秘钥和解密秘钥,加密秘钥和解密秘钥是一对秘钥对加密秘钥由于加密明文信息,解密秘钥用于解密被加密秘钥加密过的明文信息,实现明文信息的加密和解密过程。
具体的,服务器根据S201中获取到的加密标识,获取与加密标识对应的协议数据的加密秘钥,根据加密秘钥对协议数据进行加密,得到加密信息。
S203,根据企业数据加密标识确定加密信息对应的分链,并将加密信息存储至分链中,其中,分链为分布式账本中一个独立的存储空间;
其中,分布式账本是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式,是一种按照时间顺序将数据区块以顺序相连的方式组合成的一种链式数据结构,并以密码学方式保证的不可篡改和不可伪造的分布式账本。分链为分布式账本中一个独立于主链之外的存储空间,在各个分链中存储的数据相互独立、互不干扰,存储在同一分链中的节点的数据在发生数据更新时是同步进行更新的,而存储在不同分链中的节点上的数据在发生数据更新时是不会同步进行更新。
在本申请一种具体的实施例中,分布式账本存在1个主链和3支分链(分别Channel主链、Channel1分链、Channel2分链、Channel3分链)和四个加密信息(分别为Org1、Org2、Org3和Org4),其中信息Org1存储在主链上,信息Org4分别存储于三个分链中,信息Org2存储于Channel2分链和Channel3分链,信息Org3仅存储于Channel2分链。在上述实例中,当信息Org1发生更新时,存储在主链及各个分链上的加密信息需要同时更新;当信息Org4发生更新时,存储在各个分链上的加密信息需要同时更新,但主链上的储存的加密信息不受影响;当信息Org2发生更新时,存储在Channel2分链和Channel3分链上的加密信息需要同时更新,但主链和Channel1分链上的储存的加密信息不受影响;当信息Org3发生更新时,存储在Channel2分链上的加密信息需要同时更新,但主链、Channel1分链和Channel3分链上的储存的加密信息不受影响。通过将加密信息存储至分布式账本的分链,不仅有效节省了分布式账本存储空间,也减小系统的运算量。
具体的,在得到加密信息之后,根据加密标识确定该加密信息应对应存储在分布式账本的哪个具体的分链上,在确定了加密信息存储的分链后,再将加密信息存储至分链中的各个节点上。
S204,接收查询终端的查询请求,根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,得到协议数据,并将协议数据传输至查询终端。
具体的,当出现查询协议数据的需求时,通过服务器接收查询终端的查询请求,并根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,如果解密成功,则将解密后得到的协议数据传输至查询终端供查询者查看。如果解密密钥无法对加密信息进行解密,则解密失败,向查询终端输出查询失败的结果,提示查询者查询失败。
在本实施例中,种协议数据共享的方法运行于其上的电子设备(例如图1所示的服务器/终端设备)可以通过有线连接方式或者无线连接方式接收查询终端的查询请求。需要指 出的是,上述无线连接方式可以包括但不限于3G/4G连接、WiFi连接、蓝牙连接、WiMAX连接、Zigbee连接、UWB(ultra wideband)连接、以及其他现在已知或将来开发的无线连接方式。
上述协议数据共享的方法中,通过接收由信息上传终端上传的协议数据,并根据协议数据生成加密标识;根据加密标识,获取协议数据的加密秘钥,根据加密秘钥对协议数据进行加密,得到加密信息;根据企业数据加密标识确定加密信息对应的分链,并将加密信息存储至分链中,其中,分链为分布式账本中一个独立的存储空间;接收查询终端的查询请求,根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,得到协议数据,并将协议数据传输至查询终端。本申请利用加密秘钥对协议数据加密后生成加密信息,根据加密标识将加密信息存储至分布式账本中的指定的分链上,以实现协议数据的共享,提高了协议数据共享的时效性,也使得协议数据共享系统的结构更加简单,维护起来更方便,同时加密信息存储至分布式账本中的指定的分链上有利于在某一分链上的加密信息发生更新时,并不需要其他进行同步更新,因此有效节省了系统存储空间,并且在协议数据存储到分布式账本前进行加密操作,在解密成功后才允许查询协议数据,提高了协议数据共享的安全性。
进一步地,请参考图3,图3是图2中步骤S201的一种具体实施方式的流程图,步骤S201接收由信息上传终端上传的协议数据,并根据协议数据生成加密标识具体包括:
S301,对协议数据进行解析,获取协议数据中的字段信息;
其中,每一份协议数据中都包含多个字段信息,这些字段信息记录着不同的信息内容,不同的字段信息对应着不同的加密标识。
具体的,对协议数据进行解析,提取协议数据中的字段信息。其中协议数据包括企业数据和协议对象数据,其中企业数据包括保险公司名称、组织机构代码等信息;协议对象数据包括协议对象的基本信息和单据信息;协议对象的基本信息包括协议对象的姓名、证件号、学历、婚姻状况和兴趣爱好等信息;单据信息包括协议编号、类别、名称、金额、期限、费用等信息。
在本申请一种具体的实施例中,一份协议数据上记录有如下内容:
企业名称:XX公司
企业组织机构代码:00000000-0
……
证件号(身份证):4400002000001010000
姓名:张三
编号:20000000
……
S302,检测所有字段信息的内容,对所有字段信息进行分类,得到企业数据和协议对象数据;
具体的,服务器对S301提取到的所有字段信息进行检测,检测所有字段信息的内容。对上述协议数据中的字段信息进行检测,得到以下结果:
企业数据字段信息:“企业名称:XX公司”、“企业组织机构代码:00000000-0”、……
协议对象数据字段信息:“证件号(身份证):4400002000001010000”、“姓名:张三”、“编号:200000000”……
S303,根据企业数据和协议对象数据生成加密标识,其中,加密标识包括企业数据加密标识和协议对象数据加密标识。
具体的,根据具体的企业数据和协议对象数据分别生成不同的加密标识,每一个企业数据以及每一个协议对象数据都对应一个加密标识,其中,加密标识包括企业数据加密标识和协议对象数据加密标识,企业数据加密标识由企业数据生成,协议对象数据加密标识 由协议对象数据生成。
上述实施例中,对协议数据进行解析,获取协议数据中的字段信息;检测所有字段信息的内容,对所有字段信息进行分类,得到企业数据和协议对象数据;根据企业数据和协议对象数据生成加密标识,其中,加密标识包括企业数据加密标识和协议对象数据加密标识。通过对获取协议数据中的字段信息,并对字段信息进行检测和分类,可以得到不同的数据信息,生成不同的加密标识。
进一步地,请参考图4,图4示出了图2中步骤S202的一种具体实施方式的流程图,步骤S202根据加密标识,获取协议数据的加密秘钥,使用加密秘钥对协议数据进行加密,得到加密信息具体包括:
S401,根据企业数据加密标识,获取协议数据的企业数据加密秘钥;
具体的,根据企业数据生成企业数据加密标识后,根据企业数据加密标识,获取协议数据的企业数据加密秘钥。需要说明的是,每一个企业数据加密标识都对应一个加密秘钥。
S402,根据协议对象数据加密标识,获取协议数据的协议对象数据加密秘钥。
具体的,根据协议对象数据生成协议对象数据加密标识后,根据协议对象数据加密标识,获取协议数据的协议对象数据加密秘钥。需要说明的是,每一个协议对象数据加密标识都对应一个加密秘钥。
S403,分别使用企业数据加密秘钥和协议对象数据加密秘钥对协议数据进行加密,得到加密信息,其中,企业数据加密秘钥用于加密企业数据,述协议对象数据加密秘钥用于加密协议对象数据。
具体的,利用企业数据加密秘钥对协议数据中的企业数据字段信息进行加密,利用协议对象数据加密秘钥对协议数据中的协议对象数据字段信息进行加密,完成所有字段信息的加密后,得到加密信息。
上述实施例中,根据企业数据加密标识,获取协议数据的企业数据加密秘钥;根据协议对象数据加密标识,获取协议数据的协议对象数据加密秘钥;分别使用企业数据加密秘钥和协议对象数据加密秘钥对协议数据进行加密,得到加密信息,其中,企业数据加密秘钥用于加密企业数据,述协议对象数据加密秘钥用于加密协议对象数据。通过企业数据加密秘钥对协议数据中的企业数据字段信息进行加密,通过协议对象数据加密秘钥对协议数据中的协议对象数据字段信息进行加密,实现了对协议数据中每个字段信息进行单独进行加密,提高了协议数据共享的安全性。
进一步地,请参考图5,图5示出了图2中步骤S203的一种具体实施方式的流程图,步骤S203根据企业数据加密标识确定加密信息对应的分链,并将加密信息存储至分链中具体包括:
S501,根据企业数据加密标识确定加密信息对应的分布式账本分链;
其中,对于协议数据共享系统中的企业,系统都预先分配一支对应的分布式账本分链,每一个企业产生的协议数据都存储在指定的分布式账本分链中,企业产生的协议数据具体存储在分布式账本哪一支分链上可以通过企业数据加密标识来确定。
具体的,根据企业数据加密标识确定加密信息对应的分布式账本分链。
S502,通过对等网络将加密信息存储到分布式账本分链的节点中;
其中,对等网络,即P2P(Peer to Peer),是指对等计算机网络,是一种在对等者之间分配任务和工作负载的分布式应用架构,是对等计算模型在应用层形成的一种组网或网络形式,其特点包括非中心化、可扩展性和高性价比等。
具体的,加密信息通过P2P对等网络的方式存储到分布式账本分链当中,由分布式账本分链的节点接收加密信息,并将加密信息保存到自身的内存中。
S503,通过分布式账本分链的节点对加密信息进行共识;
具体的,分布式账本分链的节点将加密信息保存到自身的内存后,还需要等待与该分链的其他节点共识,只有完成共识才真正实现了加密信息在分布式账本上的共享。其中,共识是实现不同节点之间建立信任、获取权益的过程。
S504,当分布式账本分链的节点在预设时间内对加密信息共识通过时,得到加密信息集合;
具体地,当达到共识时间时,分布式账本分链中的节点将保存在自身内存中的所有加密信息组成加密信息集合。
在本申请一种具体的实施例中,分布式账本也可以是一区块链,当共识时间到时,区块链中一支分链的节点将保存在内存中的所有加密信息组成加密信息集合,并计算该加密信息集合的哈希值,并通过该哈希值和加密信息集合组成区块。区块中包括以下信息:当前区块的哈希值、前一区块的哈希值、达成共识时的时间戳、描述信息和加密信息集合。将该区块扩散到区块链分链的各个节点中,区块链分链的各个节点获取到区块中加密信息集合对应的哈希值,并将该哈希值与保存的加密信息集合的哈希值进行比较,同时每个区块链分链的节点都将自己保存的加密信息集合发送到区块链分链的其他节点中进行比较,最后,当该区块链分链上的所有节点都在预设时间内对加密信息集合达成一致时,表示该共识通过,则得到了共识通过的加密信息集合。
S505,使用分布式账本分链的节点对加密信息集合进行验证,当验证通过时,将加密信息集合存储至分布式账本分链中。
具体的,当分布式账本接收到上述共识通过的加密信息集合,使用分布式账本分链的节点对加密信息集合进行验证,当验证通过时,将加密信息集合存储至分布式账本分链中,若验证不通过,则输出验证失败信息。
上述实施例中,通过根据企业数据加密标识确定加密信息对应的分布式账本分链;通过对等网络将加密信息扩散到分布式账本分链的节点中;通过分布式账本分链的节点对加密信息进行共识;当分布式账本分链的节点在预设时间内对加密信息共识通过时,得到加密信息集合;使用分布式账本分链的节点对加密信息集合进行验证,当验证通过时,将加密信息集合存储至分布式账本分链中。通过将加密信息存储至分布式账本分链中,实现了加密信息的共享,保证了加密信息的不可篡改,也保证了协议数据不被篡改,提高了协议数据共享的安全性。
进一步地,请参考图6,图6示出了本申请实施例的方法中进行设置白名单的具体实现流程图,在步骤S204之前,即在接收查询终端的查询请求,根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,得到协议数据,并将协议数据传输至查询终端之前,还包括:
S601,获取加密信息的白名单,其中,白名单上记录有用于查询协议数据的查询终端;
其中,处于协议数据共享系统中的组织、机构可以预先设定可以查询加密信息的查询终端,并将所有可以查询加密信息的查询终端进行统计,形成加密信息的白名单。
具体的,获取加密信息的白名单,其中,白名单上记录有用于查询协议数据的查询终端。
S602,根据预先设置的查询终端权限表,获取查询终端的可查询字段信息;
其中,查询终端权限表用于规范各个查询终端的可查询字段信息,查询终端权限表可以由处于协议数据共享系统中的组织、机构预先设定在查询终端内。
在本申请的一种具体实施例中,查询终端权限表可以如下表所示:
表1 一种具体的查询终端权限表
查询终端 | 字段权限 |
A | 企业名称 |
B | 姓名、身份证号 |
C | 编号 |
... | ... |
在上述具体的实施例中,查询终端A只拥有查询“企业名称”字段信息的权限,查询终端B只拥有查询协议对象的“姓名”和“身份证号”的权限,查询终端C只拥有查询协议数据“编号”字段信息的权限,因此每一个查询终端都只能在自身权限范围内查询对应的协议数据,而不具备自身权限范围外的其他协议数据的查询权限。
具体的,由服务器根据预先设置的查询终端权限表,获取各个查询终端的可查询字段信息。
S603,根据查询终端的可查询字段信息,获取可查询字段信息对应的解密密钥;
具体的,根据查询终端的可查询字段信息,获取可查询字段信息对应的解密密钥。其中,每一个字段信息都对应着一个解密密钥,一个字段信息对应的解密密钥与该字段信息使用的加密秘钥属于一个密钥对,并且该字段信息对应的解密密钥只能解密该字段信息使用的加密秘钥,无法解密其他字段信息使用的加密秘钥。
S604,将可查询字段信息对应的解密密钥分配给对应的查询终端。
具体的,服务器根据可查询字段信息从分布式账本中获取对应的解密密钥,并将解密密钥按照可查询字段信息权限分配给对应的查询终端。
上述实施例中,通过获取加密信息的白名单,白名单上记录有可查询协议数据的查询终端;根据预先设置的查询终端权限表,获取查询终端的可查询字段信息;根据查询终端的可查询字段信息,获取可查询字段信息对应的解密密钥;将可查询字段信息对应的解密密钥分配给对应的查询终端。根据可查询权限将协议数据中的各个字段信息对应分配给不同的查询终端,不同的查询终端只能对应查询在在自身可查询权限范围内的字段信息,实现了对协议数据中的各个字段信息的单独解密和单独查询,进一步提高了协议数据共享的安全性。
进一步地,请参考图7,图7本申请实施例的方法中采用分布式账本的公钥对加密秘钥进行加密的具体实现流程图,该协议数据共享的方法还包括:
S701,获取分布式账本的公钥,使用分布式账本的公钥对加密秘钥进行加密;
具体的,获取分布式账本的公钥,使用分布式账本的公钥对用于加密协议数据的企业数据加密秘钥、协议对象数据加密秘钥进行加密。
S702,将分布式账本的公钥、加密秘钥和加密信息进行关联,生成关联信息;
具体的,将分布式账本的公钥、企业数据加密秘钥、协议对象数据加密秘钥和加密信息进行关联,生成关联信息,根据企业数据加密秘钥,将该关联信息存储至分布式账本对应的分链中。
S703,根据关联信息生成查询接口,其中,查询接口用于查询协议数据。
其中,接口是指应用程序编程接口,是一些预先定义的函数,目的是提供应用程序与开发人员基于某软件或硬件得以访问一组例程的能力,而又无需访问源码,或理解为内部工作机制的细节。
具体的,根据关联信息生成服务器的查询接口,其中,查询接口用于查询协议数据,调用该查询接口可以直接查询到关联的加密信息。
上述实施例中,通过获取分布式账本的公钥,使用分布式账本的公钥对加密秘钥进行 加密;将分布式账本的公钥、加密秘钥和加密信息进行关联,生成关联信息;根据关联信息生成查询接口,其中,查询接口用于查询协议数据。通过使用分布式账本的公钥对加密秘钥进一步进行加密,实现了分层加密,保证了协议数据的安全和不可篡改,提高了协议数据共享的安全性。
进一步地,请参考图8,图8示出了图2中步骤S204的一种具体实施方式的流程图,步骤S204接收查询终端的查询请求,根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,得到协议数据,并将协议数据传输至查询终端具体包括:
S801,通过查询接口接收查询终端的查询请求,其中,查询请求至少携带有分布式账本的私钥和目标企业数据标识,目标企业数据标识用于查询加密信息在分布式账本中的存储位置的标识信息;
具体的,当存在查询需求时,通过服务器的查询接口接收查询终端的查询请求,查询请求用于查询协议数据,查询请求至少携带有分布式账本的私钥和目标企业数据标识,目标企业数据标识用于查询加密信息在分布式账本中的存储位置的标识信息,目标企业数据标识由用户在查询终端上进行输入。
S802,根据目标企业数据标识,确定加密信息在分布式账本中的位置;
具体的,当存在查询需求时,服务器根据目标企业数据标识,确定所需查询的加密信息存储在分布式账本的分链中的具体位置;
S803,使用分布式账本的私钥对分布式账本的公钥进行解密,得到解密秘钥;
具体的,在确定所需查询的加密信息存储在分布式账本的分链中的具体位置后,提取该分布式账本的分链中的加密信息,并使用分布式账本的私钥对分布式账本的公钥进行解密,得到解密秘钥。
S804,使用解密秘钥解密加密信息,得到协议数据,将协议数据传输至查询终端。
具体的,在得到加密秘钥后,使用解密秘钥对从分布式账本的分链中提取到的加密信息进行解密,得到协议数据,将协议数据传输至查询终端。
上述实施例中,通过查询接口接收查询终端的查询请求,其中,查询请求至少携带有分布式账本的私钥和目标企业数据标识,查询请求用于查询协议数据;根据目标企业数据标识,确定加密信息在分布式账本中的位置;使用分布式账本的私钥对分布式账本的公钥进行解密,得到解密秘钥;使用解密秘钥解密加密信息,得到协议数据,将协议数据传输至查询终端。通过设置查询接口直接查询协议数据,比较方便,通过分布式账本的私钥对分布式账本的公钥进行解密以及使用加密秘钥解密加密信息完成分层解密,保证了协议数据的安全和不可篡改,提高了协议数据共享的安全性。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,该计算机可读指令可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,前述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等非易失性存储介质,或随机存储记忆体(Random Access Memory,RAM)等。
应该理解的是,虽然附图的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,其可以以其他的顺序执行。而且,附图的流程图中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,其执行顺序也不必然是依次进行,而是可以与其他步骤或者其他步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。
进一步参考图9,图9为根据本申请的协议数据共享的装置的一个实施例的结构示意图,作为对上述图2所示方法的实现,本申请提供了一种协议数据共享的装置的一个实施例,该装置实施例与图2所示的方法实施例相对应,该装置具体可以应用于各种电子设备 中。
如图9所示,本实施例所述的一种协议数据共享的装置,包括:
接收模块901,用于接收由信息上传终端上传的协议数据,并根据协议数据生成加密标识;
加密模块902,用于根据加密标识,获取协议数据的加密秘钥,使用加密秘钥对协议数据进行加密,得到加密信息;
存储模块903,用于根据企业数据加密标识确定加密信息对应的分链,并将加密信息存储至分链中,其中,分链为分布式账本中一个独立的存储空间;
解密模块904,用于接收查询终端的查询请求,根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,得到协议数据,并将协议数据传输至查询终端。
进一步地,接收模块901具体包括:
解析单元,用于对协议数据进行解析,获取协议数据中的字段信息;
分类单元,用于检测所有字段信息的内容,对所有字段信息进行分类,得到企业数据和协议对象数据;
加密标识生成单元,用于根据企业数据和协议对象数据生成加密标识,其中,加密标识包括企业数据加密标识和协议对象数据加密标识。
进一步地,加密模块902具体包括:
企业数据加密秘钥获取单元,用于根据企业数据加密标识,获取协议数据的企业数据加密秘钥;
协议对象数据加密秘钥获取单元,用于根据协议对象数据加密标识,获取协议数据的协议对象数据加密秘钥;
加密单元,用于分别使用企业数据加密秘钥和协议对象数据加密秘钥对协议数据进行加密,得到加密信息,其中,企业数据加密秘钥用于加密企业数据,述协议对象数据加密秘钥用于加密协议对象数据。
进一步地,存储模块903具体包括:
分链确定单元,用于根据企业数据加密标识确定加密信息对应的分布式账本分链;
扩散单元,用于通过对等网络将加密信息存储到分布式账本分链的节点中;
共识单元,用于通过分布式账本分链的节点对加密信息进行共识;
加密信息集合生成单元,用于当分布式账本分链的节点在预设时间内对加密信息共识通过时,得到加密信息集合;
验证单元,用于使用分布式账本分链的节点对加密信息集合进行验证,当验证通过时,将加密信息集合存储至分布式账本分链中。
进一步地,该协议数据共享的装置还包括:
白名单获取模块,用于获取加密信息的白名单,其中,白名单上记录有用于查询协议数据的查询终端;
可查询字段信息获取模块,用于根据预先设置的查询终端权限表,获取查询终端的可查询字段信息;
解密密钥获取模块,用于根据查询终端的可查询字段信息,获取可查询字段信息对应的解密密钥;
分配模块,用于将可查询字段信息对应的解密密钥分配给对应的查询终端。
进一步地,该协议数据共享的装置还包括:
公钥获取模块,用于获取分布式账本的公钥,使用分布式账本的公钥对加密秘钥进行加密;
关联模块,用于将分布式账本的公钥、加密秘钥和加密信息进行关联,生成关联信息;
查询接口生成模块,用于根据关联信息生成查询接口,其中,查询接口用于查询协议数据。
进一步地,解密模块904具体包括:
查询请求接收单元,用于通过查询接口接收查询终端的查询请求,其中,查询请求至少携带有分布式账本的私钥和目标企业数据标识,目标企业数据标识为用于查询加密信息在分布式账本中的存储位置的标识信息;
位置查询单元,用于根据目标企业数据标识,确定加密信息在分布式账本中的位置;
第一解密单元,用于使用分布式账本的私钥对分布式账本的公钥进行解密,得到解密秘钥;
第二解密单元,用于使用解密秘钥解密加密信息,得到协议数据,将协议数据传输至查询终端。
本申请公开了一种协议数据共享的方法、装置、设备及存储介质,所述装置包括:接收模块901,用于接收由信息上传终端上传的协议数据,并根据协议数据生成加密标识;加密模块902,用于根据加密标识,获取协议数据的加密秘钥,使用加密秘钥对协议数据进行加密,得到加密信息;存储模块903,用于根据企业数据加密标识确定加密信息对应的分链,并将加密信息存储至分链中,其中,分链为分布式账本中一个独立的存储空间;解密模块904,用于接收查询终端的查询请求,根据查询请求获取解密密钥,使用解密密钥对加密信息进行解密,得到协议数据,并将协议数据传输至查询终端。本申请利用加密秘钥对协议数据加密后生成加密信息,根据加密标识将加密信息存储至分布式账本中的指定的分链上,以实现协议数据的共享,提高了协议数据共享的时效性,也使得协议数据共享系统的结构更加简单,维护起来更方便,同时加密信息存储至分布式账本中的指定的分链上有利于在某一分链上的加密信息发生更新时,并不需要其他进行同步更新,因此有效节省了系统存储空间,并且在协议数据存储到分布式账本前进行加密操作,在解密成功后才允许查询协议数据,提高了协议数据共享的安全性。
为解决上述技术问题,本申请实施例还提供计算机设备。具体请参阅图10,图10为本实施例计算机设备基本结构框图。
所述计算机设备6包括通过系统总线相互通信连接存储器61、处理器62、网络接口63。需要指出的是,图中仅示出了具有组件61-63的计算机设备6,但是应理解的是,并不要求实施所有示出的组件,可以替代的实施更多或者更少的组件。其中,本技术领域技术人员可以理解,这里的计算机设备是一种能够按照事先设定或存储的指令,自动进行数值计算和/或信息处理的设备,其硬件包括但不限于微处理器、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程门阵列(Field-Programmable Gate Array,FPGA)、数字处理器(Digital Signal Processor,DSP)、嵌入式设备等。
所述计算机设备可以是桌上型计算机、笔记本、掌上电脑及云端服务器等计算设备。所述计算机设备可以与用户通过键盘、鼠标、遥控器、触摸板或声控设备等方式进行人机交互。
所述存储器61至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、硬盘、多媒体卡、卡型存储器(例如,SD或DX存储器等)、随机访问存储器(RAM)、静态随机访问存储器(SRAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、可编程只读存储器(PROM)、磁性存储器、磁盘、光盘等。在一些实施例中,所述存储器61可以是所述计算机设备6的内部存储单元,例如该计算机设备6的硬盘或内存。在另一些实施例中,所述存储器61也可以是所述计算机设备6的外部存储设备,例如该计算机设备6上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。当然,所述存储器61还可以既包括所述计算机设备6的内部存储单元也包括其外部存储设备。本实施例中,所述存储器61通常用于存储安装于所述计算机设备6的操作系统和各类应用软件,例如协议数据共享的方法的程序代码等。此外,所述存储器61还可以用于暂时地存储已经输出或者将要输出的各类数据。
所述处理器62在一些实施例中可以是中央处理器(Central Processing Unit,CPU)、控制器、微控制器、微处理器、或其他数据处理芯片。该处理器62通常用于控制所述计算机设备6的总体操作。本实施例中,所述处理器62用于运行所述存储器61中存储的程序代码或者处理数据,例如运行所述协议数据共享的方法的程序代码。
所述网络接口63可包括无线网络接口或有线网络接口,该网络接口63通常用于在所述计算机设备6与其他电子设备之间建立通信连接。
本申请还提供了另一种实施方式,即提供一种计算机可读存储介质,所述计算机可读存储介质可以是非易失性,也可以是易失性,所述计算机可读存储介质存储有协议数据共享的方法的程序,所述协议数据共享的方法的程序可被至少一个处理器执行,以使所述至少一个处理器执行如上述的协议数据共享的方法的步骤。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
显然,以上所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例,附图中给出了本申请的较佳实施例,但并不限制本申请的专利范围。本申请可以以许多不同的形式来实现,相反地,提供这些实施例的目的是使对本申请的公开内容的理解更加透彻全面。尽管参照前述实施例对本申请进行了详细的说明,对于本领域的技术人员来而言,其依然可以对前述各具体实施方式所记载的技术方案进行修改,或者对其中部分技术特征进行等效替换。凡是利用本申请说明书及附图内容所做的等效结构,直接或间接运用在其他相关的技术领域,均同理在本申请专利保护范围之内。
Claims (20)
- 一种协议数据共享的方法,包括:接收由信息上传终端上传的协议数据,并根据所述协议数据生成加密标识;根据所述加密标识,获取所述协议数据的加密秘钥,使用所述加密秘钥对所述协议数据进行加密,得到加密信息;根据所述加密标识确定所述加密信息对应的分链,并将所述加密信息存储至所述分链中,其中,所述分链为分布式账本中一个独立的存储空间;接收查询终端的查询请求,根据所述查询请求获取解密密钥,使用所述解密密钥对所述加密信息进行解密,得到所述协议数据,并将所述协议数据传输至所述查询终端。
- 如权利要求1所述的协议数据共享的方法,其中,在所述接收由信息上传终端上传的协议数据,并根据所述协议数据生成加密标识具体包括:对所述协议数据进行解析,获取所述协议数据中的字段信息;检测所有所述字段信息的内容,对所述所有所述字段信息进行分类,得到企业数据和协议对象数据;根据所述企业数据和所述协议对象数据生成加密标识,其中,所述加密标识包括企业数据加密标识和协议对象数据加密标识。
- 如权利要求2所述的协议数据共享的方法,其中,所述根据所述加密标识,获取所述协议数据的加密秘钥,使用所述加密秘钥对所述协议数据进行加密,得到加密信息具体包括:根据所述企业数据加密标识,获取所述协议数据的企业数据加密秘钥;根据所述协议对象数据加密标识,获取所述协议数据的协议对象数据加密秘钥;分别使用所述企业数据加密秘钥和所述协议对象数据加密秘钥对所述协议数据进行加密,得到加密信息,其中,所述企业数据加密秘钥用于加密所述企业数据,所述述协议对象数据加密秘钥用于加密所述协议对象数据。
- 如权利要求2所述的协议数据共享的方法,其中,所述根据所述企业数据加密标识确定所述加密信息对应的分链,并将所述加密信息存储至所述分链中具体包括:根据所述企业数据加密标识确定所述加密信息对应的所述分布式账本分链;通过对等网络将所述加密信息存储到所述分布式账本分链的节点中;通过所述分布式账本分链的节点对所述加密信息进行共识;当所述分布式账本分链的节点在预设时间内对所述加密信息共识通过时,得到加密信息集合;使用所述分布式账本分链的节点对所述加密信息集合进行验证,当验证通过时,将所述加密信息集合存储至所述分布式账本分链中。
- 如权利要求2所述的协议数据共享的方法,其中,在所述接收查询终端的查询请求,根据所述查询请求获取解密密钥,使用所述解密密钥对所述加密信息进行解密,得到协议数据,并将所述协议数据传输至所述查询终端之前,还包括:获取所述加密信息的白名单,其中,所述白名单上记录有用于查询所述协议数据的查询终端;根据预先设置的查询终端权限表,获取所述查询终端的可查询字段信息;根据所述查询终端的可查询字段信息,获取所述可查询字段信息对应的解密密钥;将所述可查询字段信息对应的解密密钥分配给对应的所述查询终端。
- 如权利要求1至5任意一项所述的协议数据共享的方法,其中,在所述根据所述加密标识,获取所述协议数据的加密秘钥,根据所述加密秘钥对所述协议数据进行加密,得到加密信息之后,所述方法还包括:获取所述分布式账本的公钥,使用所述分布式账本的公钥对所述加密秘钥进行加密;将所述分布式账本的公钥、所述加密秘钥和所述加密信息进行关联,生成关联信息;根据所述关联信息生成查询接口,其中,所述查询接口用于查询所述协议数据。
- 如权利要求6所述的协议数据共享的方法,其中,所述接收查询终端的查询请求,根据所述查询请求获取解密密钥,使用所述解密密钥对所述加密信息进行解密,得到所述协议数据,并将所述协议数据传输至所述查询终端具体包括:通过所述查询接口接收所述查询终端的查询请求,其中,所述查询请求至少携带有所述分布式账本的私钥和目标企业数据标识,所述目标企业数据标识用于查询所述加密信息在所述分布式账本中的存储位置的标识信息;根据所述目标企业数据标识,确定所述加密信息在所述分布式账本中的位置;使用所述分布式账本的私钥对所述分布式账本的公钥进行解密,得到解密秘钥;使用所述解密秘钥解密所述加密信息,所述得到协议数据,将所述协议数据传输至所述查询终端。
- 一种协议数据共享的装置,包括:接收模块,用于接收由信息上传终端上传的协议数据,并根据所述协议数据生成加密标识;加密模块,用于根据所述加密标识,获取所述协议数据的加密秘钥,使用所述加密秘钥对所述协议数据进行加密,得到加密信息;存储模块,用于根据所述企业数据加密标识确定所述加密信息对应的分链,并将所述加密信息存储至所述分链中,其中,所述分链为分布式账本中一个独立的存储空间;解密模块,用于接收查询终端的查询请求,根据所述查询请求获取解密密钥,使用所述解密密钥对所述加密信息进行解密,得到所述协议数据,并将所述协议数据传输至所述查询终端。
- 一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机可读指令,所述处理器执行所述计算机可读指令时实现如下协议数据共享的方法:接收由信息上传终端上传的协议数据,并根据所述协议数据生成加密标识;根据所述加密标识,获取所述协议数据的加密秘钥,使用所述加密秘钥对所述协议数据进行加密,得到加密信息;根据所述加密标识确定所述加密信息对应的分链,并将所述加密信息存储至所述分链中,其中,所述分链为分布式账本中一个独立的存储空间;接收查询终端的查询请求,根据所述查询请求获取解密密钥,使用所述解密密钥对所述加密信息进行解密,得到所述协议数据,并将所述协议数据传输至所述查询终端。
- 如权利要求9所述的计算机设备,其中,在所述接收由信息上传终端上传的协议数据,并根据所述协议数据生成加密标识具体包括:对所述协议数据进行解析,获取所述协议数据中的字段信息;检测所有所述字段信息的内容,对所述所有所述字段信息进行分类,得到企业数据和协议对象数据;根据所述企业数据和所述协议对象数据生成加密标识,其中,所述加密标识包括企业数据加密标识和协议对象数据加密标识。
- 如权利要求10所述的计算机设备,其中,所述根据所述加密标识,获取所述协议数据的加密秘钥,使用所述加密秘钥对所述协议数据进行加密,得到加密信息具体包括:根据所述企业数据加密标识,获取所述协议数据的企业数据加密秘钥;根据所述协议对象数据加密标识,获取所述协议数据的协议对象数据加密秘钥;分别使用所述企业数据加密秘钥和所述协议对象数据加密秘钥对所述协议数据进行加密,得到加密信息,其中,所述企业数据加密秘钥用于加密所述企业数据,所述述协议对象数据加密秘钥用于加密所述协议对象数据。
- 如权利要求10所述的计算机设备,其中,所述根据所述企业数据加密标识确定所述加密信息对应的分链,并将所述加密信息存储至所述分链中具体包括:根据所述企业数据加密标识确定所述加密信息对应的所述分布式账本分链;通过对等网络将所述加密信息存储到所述分布式账本分链的节点中;通过所述分布式账本分链的节点对所述加密信息进行共识;当所述分布式账本分链的节点在预设时间内对所述加密信息共识通过时,得到加密信息集合;使用所述分布式账本分链的节点对所述加密信息集合进行验证,当验证通过时,将所述加密信息集合存储至所述分布式账本分链中。
- 如权利要求10所述的计算机设备,其中,在所述接收查询终端的查询请求,根据所述查询请求获取解密密钥,使用所述解密密钥对所述加密信息进行解密,得到协议数据,并将所述协议数据传输至所述查询终端之前,还包括:获取所述加密信息的白名单,其中,所述白名单上记录有用于查询所述协议数据的查询终端;根据预先设置的查询终端权限表,获取所述查询终端的可查询字段信息;根据所述查询终端的可查询字段信息,获取所述可查询字段信息对应的解密密钥;将所述可查询字段信息对应的解密密钥分配给对应的所述查询终端。
- 如权利要求9至13任意一项所述的计算机设备,其中,在所述根据所述加密标识,获取所述协议数据的加密秘钥,根据所述加密秘钥对所述协议数据进行加密,得到加密信息之后,所述方法还包括:获取所述分布式账本的公钥,使用所述分布式账本的公钥对所述加密秘钥进行加密;将所述分布式账本的公钥、所述加密秘钥和所述加密信息进行关联,生成关联信息;根据所述关联信息生成查询接口,其中,所述查询接口用于查询所述协议数据。
- 一种计算机可读存储介质,其中,所述计算机可读存储介质上存储有计算机可读指令,所述计算机可读指令被处理器执行时实现如下协议数据共享的方法:接收由信息上传终端上传的协议数据,并根据所述协议数据生成加密标识;根据所述加密标识,获取所述协议数据的加密秘钥,使用所述加密秘钥对所述协议数据进行加密,得到加密信息;根据所述加密标识确定所述加密信息对应的分链,并将所述加密信息存储至所述分链中,其中,所述分链为分布式账本中一个独立的存储空间;接收查询终端的查询请求,根据所述查询请求获取解密密钥,使用所述解密密钥对所述加密信息进行解密,得到所述协议数据,并将所述协议数据传输至所述查询终端。
- 如权利要求15所述的计算机可读存储介质,其中,在所述接收由信息上传终端上传的协议数据,并根据所述协议数据生成加密标识具体包括:对所述协议数据进行解析,获取所述协议数据中的字段信息;检测所有所述字段信息的内容,对所述所有所述字段信息进行分类,得到企业数据和协议对象数据;根据所述企业数据和所述协议对象数据生成加密标识,其中,所述加密标识包括企业数据加密标识和协议对象数据加密标识。
- 如权利要求16所述的计算机可读存储介质,其中,所述根据所述加密标识,获取所述协议数据的加密秘钥,使用所述加密秘钥对所述协议数据进行加密,得到加密信息具体包括:根据所述企业数据加密标识,获取所述协议数据的企业数据加密秘钥;根据所述协议对象数据加密标识,获取所述协议数据的协议对象数据加密秘钥;分别使用所述企业数据加密秘钥和所述协议对象数据加密秘钥对所述协议数据进行加密,得到加密信息,其中,所述企业数据加密秘钥用于加密所述企业数据,所述述协议对象数据加密秘钥用于加密所述协议对象数据。
- 如权利要求16所述的计算机可读存储介质,其中,所述根据所述企业数据加密标识确定所述加密信息对应的分链,并将所述加密信息存储至所述分链中具体包括:根据所述企业数据加密标识确定所述加密信息对应的所述分布式账本分链;通过对等网络将所述加密信息存储到所述分布式账本分链的节点中;通过所述分布式账本分链的节点对所述加密信息进行共识;当所述分布式账本分链的节点在预设时间内对所述加密信息共识通过时,得到加密信息集合;使用所述分布式账本分链的节点对所述加密信息集合进行验证,当验证通过时,将所述加密信息集合存储至所述分布式账本分链中。
- 如权利要求16所述的计算机可读存储介质,其中,在所述接收查询终端的查询请求,根据所述查询请求获取解密密钥,使用所述解密密钥对所述加密信息进行解密,得到协议数据,并将所述协议数据传输至所述查询终端之前,还包括:获取所述加密信息的白名单,其中,所述白名单上记录有用于查询所述协议数据的查询终端;根据预先设置的查询终端权限表,获取所述查询终端的可查询字段信息;根据所述查询终端的可查询字段信息,获取所述可查询字段信息对应的解密密钥;将所述可查询字段信息对应的解密密钥分配给对应的所述查询终端。
- 如权利要求15至19所述的可读存储介质,其中,在所述根据所述加密标识,获取所述协议数据的加密秘钥,根据所述加密秘钥对所述协议数据进行加密,得到加密信息之后,所述方法还包括:获取所述分布式账本的公钥,使用所述分布式账本的公钥对所述加密秘钥进行加密;将所述分布式账本的公钥、所述加密秘钥和所述加密信息进行关联,生成关联信息;根据所述关联信息生成查询接口,其中,所述查询接口用于查询所述协议数据。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010155300.2A CN111464500B (zh) | 2020-03-06 | 2020-03-06 | 协议数据共享的方法、装置、设备及存储介质 |
CN202010155300.2 | 2020-03-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021174758A1 true WO2021174758A1 (zh) | 2021-09-10 |
Family
ID=71682697
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/105755 WO2021174758A1 (zh) | 2020-03-06 | 2020-07-30 | 协议数据共享的方法、装置、设备及存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111464500B (zh) |
WO (1) | WO2021174758A1 (zh) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114531230A (zh) * | 2021-12-31 | 2022-05-24 | 华能信息技术有限公司 | 基于工业互联网的数据防泄漏系统及方法 |
CN114638697A (zh) * | 2022-05-18 | 2022-06-17 | 浙江数秦科技有限公司 | 基于区块链的小额贷款管理系统 |
CN114978664A (zh) * | 2022-05-18 | 2022-08-30 | 中银金融科技有限公司 | 一种数据共享方法、装置及电子设备 |
CN116450593A (zh) * | 2023-06-16 | 2023-07-18 | 杭州知享信息科技有限公司 | 一种多部门协同办公数据共享方法、系统及存储介质 |
CN117195296A (zh) * | 2023-09-15 | 2023-12-08 | 山东硕为思大数据科技有限公司 | 一种基于互联网的企业数据信息化协同处理方法 |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111464500B (zh) * | 2020-03-06 | 2023-03-17 | 深圳壹账通智能科技有限公司 | 协议数据共享的方法、装置、设备及存储介质 |
CN111901355B (zh) * | 2020-08-04 | 2022-09-16 | 北京天融信网络安全技术有限公司 | 一种认证方法及装置 |
CN112070494A (zh) * | 2020-09-07 | 2020-12-11 | 支付宝实验室(新加坡)有限公司 | 服务响应方法和信息读取方法 |
CN112231404A (zh) * | 2020-10-15 | 2021-01-15 | 深圳壹账通智能科技有限公司 | 基于区块链的数据共享方法、计算机设备和存储介质 |
CN112261112B (zh) * | 2020-10-16 | 2023-04-18 | 华人运通(上海)云计算科技有限公司 | 一种信息共享方法、装置及系统、电子设备及存储介质 |
CN112910834B (zh) * | 2020-12-08 | 2022-11-18 | 北京众享比特科技有限公司 | 数据共享方法、装置、系统、设备及介质 |
CN115242549B (zh) * | 2022-09-21 | 2023-04-07 | 佛山市元亨利贞信息科技有限公司 | 基于开放协议的数据安全共享方法、装置、设备及介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018013898A1 (en) * | 2016-07-14 | 2018-01-18 | Diebold Nixdorf Incorporated | Using a distributed ledger for tracking debt data |
CN108900533A (zh) * | 2018-08-01 | 2018-11-27 | 南京荣链科技有限公司 | 一种共享数据隐私保护方法、系统、终端及介质 |
CN110061840A (zh) * | 2019-03-12 | 2019-07-26 | 平安科技(深圳)有限公司 | 数据加密方法、装置、计算机设备及存储介质 |
CN110378755A (zh) * | 2019-06-21 | 2019-10-25 | 深圳壹账通智能科技有限公司 | 电子发票生成方法、装置、计算机设备和存储介质 |
CN110391906A (zh) * | 2019-07-25 | 2019-10-29 | 深圳壹账通智能科技有限公司 | 基于区块链的数据处理方法、电子装置及可读存储介质 |
CN111464500A (zh) * | 2020-03-06 | 2020-07-28 | 深圳壹账通智能科技有限公司 | 协议数据共享的方法、装置、设备及存储介质 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106991334B (zh) * | 2016-11-24 | 2021-03-02 | 创新先进技术有限公司 | 一种数据存取的方法、系统及装置 |
CN113111388A (zh) * | 2017-03-31 | 2021-07-13 | 唐晓领 | 基于区块链的投融资多方共享交易元数据信息的方法、装置及系统 |
CN109462472A (zh) * | 2017-09-06 | 2019-03-12 | 阿里巴巴集团控股有限公司 | 数据加密和解密的方法、装置和系统 |
CN110163004B (zh) * | 2018-02-14 | 2023-02-03 | 华为技术有限公司 | 一种区块链生成的方法、相关设备及系统 |
US10834095B2 (en) * | 2018-05-17 | 2020-11-10 | International Business Machines Corporation | Post-commit validation in a distributed ledger |
CN110766548A (zh) * | 2018-07-25 | 2020-02-07 | 易见天树科技(北京)有限公司 | 基于区块链的信息处理方法、装置、存储介质及电子设备 |
CN109583215B (zh) * | 2018-09-28 | 2022-11-15 | 创新先进技术有限公司 | 一种处理征信数据的方法及装置、区块链数据共享系统 |
CN109472568A (zh) * | 2018-10-23 | 2019-03-15 | 顺丰科技有限公司 | 一种区块链交易方法、装置、管理系统、设备及存储介质 |
CN109388960A (zh) * | 2018-10-24 | 2019-02-26 | 全链通有限公司 | 基于区块链的信息共享及安全多方计算模型 |
CN111475829A (zh) * | 2019-11-08 | 2020-07-31 | 支付宝(杭州)信息技术有限公司 | 基于区块链账户的隐私数据查询方法及装置 |
-
2020
- 2020-03-06 CN CN202010155300.2A patent/CN111464500B/zh active Active
- 2020-07-30 WO PCT/CN2020/105755 patent/WO2021174758A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018013898A1 (en) * | 2016-07-14 | 2018-01-18 | Diebold Nixdorf Incorporated | Using a distributed ledger for tracking debt data |
CN108900533A (zh) * | 2018-08-01 | 2018-11-27 | 南京荣链科技有限公司 | 一种共享数据隐私保护方法、系统、终端及介质 |
CN110061840A (zh) * | 2019-03-12 | 2019-07-26 | 平安科技(深圳)有限公司 | 数据加密方法、装置、计算机设备及存储介质 |
CN110378755A (zh) * | 2019-06-21 | 2019-10-25 | 深圳壹账通智能科技有限公司 | 电子发票生成方法、装置、计算机设备和存储介质 |
CN110391906A (zh) * | 2019-07-25 | 2019-10-29 | 深圳壹账通智能科技有限公司 | 基于区块链的数据处理方法、电子装置及可读存储介质 |
CN111464500A (zh) * | 2020-03-06 | 2020-07-28 | 深圳壹账通智能科技有限公司 | 协议数据共享的方法、装置、设备及存储介质 |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114531230A (zh) * | 2021-12-31 | 2022-05-24 | 华能信息技术有限公司 | 基于工业互联网的数据防泄漏系统及方法 |
CN114531230B (zh) * | 2021-12-31 | 2024-01-23 | 华能信息技术有限公司 | 基于工业互联网的数据防泄漏系统及方法 |
CN114638697A (zh) * | 2022-05-18 | 2022-06-17 | 浙江数秦科技有限公司 | 基于区块链的小额贷款管理系统 |
CN114978664A (zh) * | 2022-05-18 | 2022-08-30 | 中银金融科技有限公司 | 一种数据共享方法、装置及电子设备 |
CN116450593A (zh) * | 2023-06-16 | 2023-07-18 | 杭州知享信息科技有限公司 | 一种多部门协同办公数据共享方法、系统及存储介质 |
CN116450593B (zh) * | 2023-06-16 | 2023-09-01 | 杭州知享信息科技有限公司 | 一种多部门协同办公数据共享方法、系统及存储介质 |
CN117195296A (zh) * | 2023-09-15 | 2023-12-08 | 山东硕为思大数据科技有限公司 | 一种基于互联网的企业数据信息化协同处理方法 |
Also Published As
Publication number | Publication date |
---|---|
CN111464500A (zh) | 2020-07-28 |
CN111464500B (zh) | 2023-03-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021174758A1 (zh) | 协议数据共享的方法、装置、设备及存储介质 | |
CA3027741C (en) | Blockchain systems and methods for user authentication | |
US10833870B2 (en) | Cryptographic operations in an isolated collection | |
JP2022169529A (ja) | エフェメラルコンテンツメッセージを処理するための方法およびシステム | |
CN112581126A (zh) | 基于区块链的平台数据管理方法、装置及存储介质 | |
US10084790B2 (en) | Peer to peer enterprise file sharing | |
US9088538B2 (en) | Secure network storage | |
CN112131316B (zh) | 应用于区块链系统的数据处理方法及装置 | |
CN111556120B (zh) | 基于区块链的数据处理方法、装置、存储介质及设备 | |
US9219714B2 (en) | ID-based encryption and signature method and terminal | |
CA2976676A1 (en) | Systems and methods for secure collaboration with precision access management | |
US10635828B2 (en) | Tokenized links with granular permissions | |
JP2023043870A (ja) | ユーザ・データ・プライバシを管理するための方法及びシステム | |
WO2020253380A1 (zh) | 数据加密方法、装置及终端设备 | |
CN111178819B (zh) | 一种电子公文处理方法、系统及装置 | |
US11093236B1 (en) | Systems and methods for delivering updates to client devices | |
US11438177B2 (en) | Secure distribution of cryptographic certificates | |
US11974169B2 (en) | Dynamic facilitation of communications services | |
US11848767B2 (en) | Privacy-preserving electronic publication and subscription systems | |
CN116264505A (zh) | 密钥管理系统和方法、电子设备和计算机可读存储介质 | |
KR101216990B1 (ko) | 암호키를 갱신하여 게재글의 프라이버시를 보호할 수 있는 소셜 네트워크 서비스 시스템 및 방법 | |
Qu | Security research of blockchain technology in electronic medical records | |
US10346366B1 (en) | Management of a data processing pipeline | |
CN107210992B (zh) | 在安全数据系统和外部数据系统之间上传和下载数据 | |
Sánchez‐Artigas et al. | StackSync: Attribute‐based data sharing in file synchronization services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20923125 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 11/01/2023) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20923125 Country of ref document: EP Kind code of ref document: A1 |