CN109754322A - A kind of data service system - Google Patents

A kind of data service system Download PDF

Info

Publication number
CN109754322A
CN109754322A CN201811613014.5A CN201811613014A CN109754322A CN 109754322 A CN109754322 A CN 109754322A CN 201811613014 A CN201811613014 A CN 201811613014A CN 109754322 A CN109754322 A CN 109754322A
Authority
CN
China
Prior art keywords
data
block chain
subelement
interface
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811613014.5A
Other languages
Chinese (zh)
Inventor
李佳
袁一
潘晓良
颜卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shigengjian Data Technology (shanghai) Co Ltd
Original Assignee
Shigengjian Data Technology (shanghai) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shigengjian Data Technology (shanghai) Co Ltd filed Critical Shigengjian Data Technology (shanghai) Co Ltd
Priority to CN201811613014.5A priority Critical patent/CN109754322A/en
Priority to US16/366,043 priority patent/US10459990B1/en
Priority to US16/409,822 priority patent/US11546348B2/en
Publication of CN109754322A publication Critical patent/CN109754322A/en
Priority to US16/726,777 priority patent/US10725744B2/en
Priority to US16/746,868 priority patent/US11509637B2/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention discloses a kind of data service system, the data service system includes: interface service unit, and the interface service unit includes the user's end interface for being configured as carrying out data interaction with user terminal;Circulate service unit, it is configured to supply stream compression service, including the block chain interface for being configured as carrying out data transmission with block chain, and circulation Row control subelement, the circulation Row control subelement is configured as triggering the intelligent contract for running on block chain by the block chain interface, stream compression process is controlled, the stream compression process by from the user terminal interface to data based on.Data service system in the embodiment of the present invention can provide support for diversified stream compression.

Description

A kind of data service system
Technical field
The present invention relates to data processing field more particularly to a kind of data service systems.
Background technique
With the development of block chain technology, more and more data can be circulated by block chain, be circulated The classification of data is various, and data content is very diversified.
How for diversified stream compression support is provided, becomes urgent problem to be solved.
Summary of the invention
The technical issues of embodiment of the present invention solves is to provide a kind of data service that enriched data can be supported to circulate System.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of data service system, comprising: interface service list Member, the interface service unit include the user's end interface for being configured as carrying out data interaction with user terminal;Circulate service unit, It is configured to supply stream compression service, including the block chain interface for being configured as carrying out data transmission with block chain, Yi Jiliu The program-controlled subunit of turn of tidal stream, the circulation Row control subelement, which is configured as triggering by the block chain interface, runs on area The intelligent contract of block chain, controls stream compression process, and the stream compression process is with from the user terminal interface Based on the data arrived.
Optionally, user's end interface is configured as receiving the business demand information for carrying out the stream compression, described Circulate service unit further include: intelligent bond service subelement is configured as passing through the use according to the business demand information Family end interface provides intelligent contract template, based on response message determination and the business demand obtained from user's end interface The intelligent contract that information matches.
Optionally, the business demand information includes the information of target block chain, and the block chain interface is configured as propping up The deployment intelligent contract is held to the target block chain.
Optionally, the circulation service unit further include: adapter, the adapter are configured as according to the block chain Requirement to data format and communication mode is carried out data transmission by the block chain interface and the block chain.
Optionally, the adapter is configured as converting the data received from the user terminal being to meet the block chain It is required that data format.
Optionally, the data service system further include: data service unit is configured to supply data processing service, Subelement is generated including transaction data, the transaction data generates subelement and is configured as being based on connecing by user's end interface The data received generate the transaction data for supporting data trade;The circulation service unit, is configured as to the transaction data Carry out the control of data trade process.
Optionally, user's end interface is configured as carrying out data interaction with data supplier and data requirements side, The data service unit further include: be configured as raw according to the data received from the user terminal as the data supplier At index data, it is provided as the search service subelement of the user terminal search of the data requirements side.
Optionally, the circulation Row control subelement, is configured as according to the user terminal as the data requirements side Confirmation to the search result that described search service subelement provides, runs on the block by block chain interface triggering The intelligent contract of chain.
Optionally, the data service unit further include: storage adapter is configured as true by user's end interface Data storage location during the fixed data trade.
Optionally, user's end interface is configured as carrying out data interaction with data supplier and data requirements side, The data service unit further include: data cochain subelement is configured as basis and passes through user's end interface from the number According to the data acquisition verify data that supplier provides, by the block chain interface by the verify data cochain, the verifying Data carry out the verifying of the transaction data for the data requirements side.
Optionally, the data service unit further includes service for checking credentials subelement, is configured as obtaining the transaction data Corresponding initial data verifies the initial data;The circulation service unit further include: subelement is called in verifying, It is configured as that the service for checking credentials subelement is called to verify the initial data, after being verified, triggers the transaction Data generate subelement and generate the transaction data.
Optionally, the transaction data generates subelement, is configured as carrying out the data received from the user terminal Encryption, generates the transaction data.
Optionally, user's end interface is configured as carrying out data interaction with data supplier and data requirements side, The transaction data generates subelement, is configured as the letter of the information of supplier and the data requirements side based on the data Breath, encrypts to from the data received as the data supplier.
Optionally, the data service system further include: data analysis service unit, the data analysis service unit packet Include: analysis demand information receiving subelement is configured as analyzing demand information from the user terminal interface, and the analysis needs Ask information instruction to the analysis demand of data;Computation subunit is configured as according to the analysis demand information to from the use The data that family end interface receives carry out analytical calculation and obtain analysis result;It analyzes result and returns to subelement, be configured as passing through User's end interface returns to the analysis result to respond the analysis demand information.
Optionally, from the user terminal interface to data be that the homomorphism encrypted in a manner of homomorphic cryptography adds Ciphertext data, the computation subunit are configured as carrying out analytical calculation to the homomorphic cryptography data.
Compared with prior art, the technical solution of the embodiment of the present invention has the advantages that
In the embodiment of the present invention, it is provided arranged to carry out the user of data interaction with user terminal by interface service unit End interface, and circulation service unit are provided arranged to the block chain interface carried out data transmission with block chain, pass through circulation The intelligent contract that the Row control subelement triggering that circulates in service unit runs on block chain controls the process of stream compression System, so as to provide data service for multifarious stream compression demand, enables each side of stream compression to pass through this hair Data service system in bright embodiment completes stream compression.
Further, the business demand information based on stream compression provides corresponding business demand by user's end interface The intelligent contract template of information, and the determining intelligent contract to match with the business demand information, can be according to business demand It determines intelligence contract template and intelligent contract, the intelligent contract generated can be made to correspond to different stream compression scenes, provided Diversified stream compression service.
Further, requirement of the adapter according to block chain to data format and communication mode passes through block chain interface and area Block chain carries out data transmission, and block chain interface and block chain can be made to carry out data transmission the data format of data fit block chain And the requirement of communication mode, user can be made without understanding the concrete mode carried out data transmission with different blocks chain, in turn User experience can be promoted.
Further, the data received from user terminal are converted to the data for meeting the block chain requirement by adapter Format, so as to so that the data fit block chain interacted with block chain data format requirement, without user understand Specific format, and then user experience can be promoted.
Further, by uploading verify data to block chain, can be uploaded to block chain for verifying number of deals According to verify data can not change, thus, after data trade, data requirements side can be according to the verify data pair on block chain The transaction data of acquisition is verified, and the authenticity of the data of acquisition can be verified.
Further, the corresponding initial data of transaction data is obtained by service for checking credentials subelement, subelement tune is called in verifying The initial data is verified with the service for checking credentials subelement, after being verified, triggering transaction data generates subelement Transaction data is generated, the validity of the transaction data of generation can be promoted, the successful probability of data trade can be promoted, can be subtracted The waste of few system resource.
Further, subelement is generated by transaction data and cryptographic calculation is carried out to the data obtained from data supplier, it is raw At encryption data, can to avoid when lacking decruption key data the safety of data trade is enhanced by improper acquisition.
Further, transaction data generates the subelement information of supplier and the data requirements side based on the data Information is encrypted to from the data received as the data supplier, and generation encryption data can be made to have specific aim, Transaction data corresponds only to the data supplier and data requirements side, can promote the safety of data trade.
Detailed description of the invention
Fig. 1 is a kind of structural schematic diagram of data service system in the embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of data transacting system in the embodiment of the present invention;
Fig. 3 be one in the embodiment of the present invention in re-encrypted private key verifying system structural schematic diagram;
Fig. 4 is a kind of structural schematic diagram of data analysis service unit in the embodiment of the present invention;
Fig. 5 is the partial structure diagram of another data service system in the embodiment of the present invention;
Fig. 6 is the partial structure diagram of another data service system in the embodiment of the present invention.
Specific embodiment
As stated in the background art, how for diversified data trade support is provided, it has also become one urgently to be resolved to ask Topic.
In embodiments of the present invention, it is provided arranged to carry out the use of data interaction with user terminal by interface service unit Family end interface, and circulation service unit are provided arranged to the block chain interface carried out data transmission with block chain, pass through stream The Row control subelement that turns to circulate in service unit via the triggering of block chain interface runs on the intelligent contract of block chain to data Circulation process controlled, so as to providing data service for multifarious stream compression demand, so that stream compression Each side can through the embodiment of the present invention in data service system complete stream compression.To make above-mentioned purpose of the invention, spy Beneficial effect of seeking peace can become apparent understandable, and specific embodiments of the present invention are described in detail with reference to the accompanying drawing.
With reference to the structural schematic diagram of data service system shown in FIG. 1, in embodiments of the present invention, data service system 10 May include:
Interface service unit 11, the interface service unit 11 may include being configured as carrying out data interaction with user terminal User's end interface 111;
Circulate service unit 13, is configured to supply stream compression service, may include being configured as carrying out with block chain The block chain interface 131 of data transmission, and circulation Row control subelement 132,132 quilt of circulation Row control subelement It is configured to trigger the intelligent contract for running on block chain by the block chain interface 131, stream compression process is controlled, The stream compression process is based on from the data that user's end interface 111 receives.
In specific implementation, the data that data service system 10 can will be received from interface service unit 11, Huo Zheji The data obtained after the data received are handled are touched by circulation Row control subelement 132 by block chain interface 131 It sends out intelligent contract and is uploaded to block chain.User can be inquired by block chain, alternatively, data service system 10 can also lead to It crosses interface service unit 11 and query service is provided.
In embodiments of the present invention, stream compression can be the stream compression under several scenes, for example, it may be data are handed over Easily, or it is also possible to other transmitting of data.Specifically, by taking car data as an example, can be automobile P2P (Peer-to-Peer, It is point-to-point) Car sharing, car insurance, maintenance, car networking consumption etc. during stream compression.
It will be appreciated by persons skilled in the art that the process of above-mentioned stream compression can if being related to the sharing of economic interests Using as data trade, or it is also possible to other stream compression processes for not being related to economic interests, " transaction " two word is not pair The limitation of protection scope, the scene only in the scope of the present invention are illustrated, data flow in all use embodiment of the present invention The technical solution for turning thought is within the scope of the invention, herein and with no restrictions.
Data service system in the embodiment of the present invention can dock different block chains, use each side of stream compression Family provides user's end interface, provides flexile selection, and user can select with business demand, in different application scenarios The each unit provided in the embodiment of the present invention is provided, individually or is used cooperatively, without docking different block chain point respectively Not carry out data circulation control, so as to promote the efficiency of stream compression and control, and then promote user experience.
Wherein, block chain is a kind of a kind of chain for being sequentially in time combined into data block in such a way that sequence is connected Formula data structure, and the distributed account book that can not be distorted He can not forge guaranteed in a manner of cryptography.Block chain may include Publicly-owned chain, privately owned chain or alliance's chain etc..
Publicly-owned chain is the chain of decentralization, and the data for being uploaded to publicly-owned chain can not distort;Privately owned chain is privately owned block chain, is Refer to that the block chain that write-in permission is organized in hand at one completely, all nodes participated in this block chain all can be controlled strictly System;Alliance's chain refer to have it is several tissue or the common participative management of mechanism block chain, it is each tissue or mechanism controls one or more A node, records transaction data jointly, and only these organisations and institutions the data in alliance's chain can be written and read and Send transaction.
Intelligent contract is the one section of code operated on block chain, the intelligent contract agreement of the logical definition of code it is interior Hold, the account of contract maintains the operating status of contract.In embodiments of the present invention, friendship of the intelligent contract to the data trade Easy process is controlled.
User terminal can be the equipment end that user is operated, for example, it may be handheld terminal, mobile unit, plate are set It is standby to wait terminal devices, either it is also possible to single personal computer, server or server cluster, user terminal is not to device type Limitation.
According to user's difference, in specific implementation, user terminal can be the user terminal of corresponding data supplier, be also possible to The user terminal of corresponding data party in request.The data that data interaction is carried out with user's end interface 111 may include multi-exchange data, For example, by taking car data as an example, it can be the data obtained in the intelligent vehicle-carried hardware, or the vehicle number acquired by sensor According to, or the third party's data obtained, it is without limitation.
Data service system 10 can support a variety of stream compression processes, and access corresponding a variety of stream compression scenes Service system.Continue by taking car data as an example, as previously mentioned, can be used for car insurance, maintenance, P2P Car sharing, The data services such as car networking consumption.
Citing is briefly described below, for example, receiving in the scene of P2P Car sharing from interface service unit 11 The data arrived, may include the identity information of both sides, and the key circulation information of Car sharing believes the selection of intelligent contract template Breath etc..By the Row control subelement 132 that circulates, the portion of intelligent contract can be carried out according to the selection to intelligent contract template Administration, triggering run on intelligent contract and progress data interaction in block chain etc., so as to realize the business in the scene Demand.More specifically implementation may refer to described hereinafter, then this is repeated no more.
Alternatively, the data received from interface service unit 11, may include new car in the scene of Second-hand Vehicle Transaction After factory data, new car use, data related with vehicle-state, mantenance data for generating in use etc. can also be with Including the relevant data of other transaction, and the selection information etc. to intelligent contract template.Similar to the scene of P2P Car sharing In, by the Row control subelement 132 that circulates, according to the selection to intelligent contract template, can carry out intelligent contract deployment, Triggering runs on intelligent contract and progress data interaction in block chain etc., so as to realize in Second-hand Vehicle Transaction scene Business demand.
In different application scenarios, it is collected that the data received from interface service unit 11 can be acquisition equipment Data, user identity data or be also possible to the data that user is selected or input, be also possible to various other numbers According to.The data type that data service system 10 can be received according to interface service unit 11, is handled data, Jin Erke To access the types of applications of corresponding several scenes, exploitation threshold is reduced.
Data trade is the important scenes in Various types of data circulation scene, in data trade scene, is usually had more to data More requirements, such as safety, the privacy of data of data etc..
In specific implementation, data service system 10 can also include data service unit 12, be configured to supply data Processing service may include that transaction data generates subelement 121, and the transaction data generates subelement 121 and is configured as being based on The transaction data for supporting data trade is generated by the data that user's end interface 111 receives.
Correspondingly, the circulation service unit 13, can be configured as and carry out data trade process to the transaction data Control.
Transaction data is generated by data service unit 12, to promote safety and the privacy during data trade It provides the foundation, therefore trades for Various types of data, including having the transaction of the data of privacy, can provide support.Below In conjunction with Fig. 1 and Fig. 2 being further detailed to above-mentioned data service system 10.
Data service system 10 can obtain data from user terminal 21 by user's end interface 111, and user terminal 21 can be As the user terminal 21 of data supplier, though it with a user terminal 21 is example in figure, but it is understood that, user terminal 21 Quantity can be it is multiple, wherein may include the user terminal 21 as data supplier, and the user as data requirements side End 21.
User terminal 21 as data supplier can be data supply method, apparatus, such as can be intelligent vehicle-carried hardware, Acquisition device or it is also possible to cloud third party.User terminal 21 as data requirements side can be with data requirements method, apparatus, example It can such as be intended to obtain manufacturer, insurance company, individual or the service provider of data;Block chain 22 can be ether mill (ETH), commercial Distributed Design block chain operating system (EOS) or other block chains 22 etc..
Data service system 10 passes through the data that user's end interface 111 is obtained from user terminal 21, can be from above-mentioned conduct What the user terminal 21 of data supplier obtained, which can be the data with unified format of intelligent vehicle-carried hardware acquisition, Perhaps the untreated data of the vehicle acquisition equipped with acquisition device or third party's data of cloud third party downloading, Such as by taking car data as an example, third party's data can be depot after treatment, be uploaded to the data in cloud.
The data that data supplier provides can be stored to local or upload to block chain 22 by data service system 10, When data requirements side needs to buy data, intelligent contract can be run by block chain 22 and carries out data trade.
Specifically, may include that transaction data generates subelement 121 in data service system 10, it is single that transaction data generates son Member 121 generates transaction data according to the data of acquisition, and circulation Row control subelement 132 can pass through the block chain interface 131 triggerings run on the intelligent contract of block chain 22, to control the transaction flow of data trade.Data requirements side and data supply Square data interaction can should be carried out based on data service system 10 by user terminal 21.
Using data service system described in above-described embodiment, transaction data generates subelement and passes through in data service unit The data that user terminal interface arrives generate transaction data, and circulation Row control subelement passes through block chain in the service unit that circulates The intelligent contract that interface triggering runs on block chain carries out data trade to transaction data, so as to be the diversified friendship of user Easy demand provides data service, meets the transactions demand of user.
With continued reference to Fig. 1 and Fig. 2, in specific implementation, user's end interface 111 can be configured as to be supplied with data Side and data requirements side carry out data interaction, and the data service unit 11 can also include: to be configured as basis from conduct The data that the user terminal 21 of the data supplier receives generate index data, are provided as the user terminal of the data requirements side The search service subelement 122 of 21 search.
As previously mentioned, can be multiplicity from the received data of data supplier by user's end interface 111, for example, can To be from intelligent vehicle-carried hardware, acquisition device or to be also possible to the data that cloud third party receives, specifically can be has The data of the unified format third number formulary that perhaps the untreated data of sensor acquisition or cloud third party download According to.According to the difference of the data received from data supplier, search service subelement 122 can be carried out the data received Different processing, is illustrated individually below.
In a kind of application scenarios, the data received from data supplier may include that original plaintext describes data, tests It demonstrate,proves data and passes through the encrypted encryption data of intelligent vehicle-carried hardware.
Wherein: original plaintext, which describes data, may include the associated description information of data, for example, may include that data generate Period, the region that data are formed, data the information such as generating device;Encryption data can be basis and be acquired by sensor To clear data encrypt;Verify data, can be the data for being verified to clear data, and verify data can Be it is irreversible, that is, different clear datas, corresponding different verify data, but according to verify data can not be restored Clear data.In this way, data requirements side can verify data, the safety of data trade is promoted, also, due to verifying Data it is irreversible, can protect data-privacy.
Original plaintext can be described the database that data are added to search engine by search service subelement 122, with original As index data, data requirements side can be scanned for description data by search engine in plain text.For example, when data are from intelligence Data obtained in the vehicle-mounted hardware of energy, original plaintext, which retouches data, to be generated after intelligent vehicle-carried hardware handles, can be direct Data are described using original plaintext to scan for.
Search service subelement 122 can also describe data to the original plaintext using data dictionary and translate, and obtain Data are described to plaintext, plaintext description data are added to the database of search engine, describe data in plain text as the index Data.
For example, the data that data supplier receives are the data of sensor acquisition, the data of upload can be " p_ Vehicle ": " Vehicle $ 4kPKdXjome ", search service subelement 122 can adopt sensor by using data dictionary The original plaintext that collection obtains describes data and carries out arrangement conversion, for example, by " p_vehicle ": " Vehicle $ 4kPKdXjome " Be converted to " vehicles identifications ": " Vehicle $ 4kPKdXjome ", to obtain corresponding to the plaintext that the original plaintext describes data Data are described.
It is translated by describing data to the original plaintext using data dictionary, is available for search engine The efficiency of data search can be improved to be conducive to the search of search engine in description data in plain text.Also, by data Translation conversion is carried out, obtains describing data in plain text, the probability that data are searched can be promoted, searching for search engine can be promoted Without hesitation can.
In specific implementation, the original plaintext that search service subelement 122 can be provided based on data supplier describes number It is extended according to data dimension, using the data after extending as index data.
For example, original plaintext describes in data, it may include specific vehicle identification number, obtained according to vehicle identification number The information such as vehicle model, the vehicle place of production, the vehicle age of the corresponding vehicle identification number are taken, and are associated with the information of acquisition to institute The plaintext for stating car data describes data, and the extension to the data dimension of car data may be implemented.
Data acquisition other data associated with the preset data dimension are described according to original plaintext, and are associated with In plain text in description data, to describe data in plain text as index, expand so as to the data dimension to plaintext description data Exhibition, search engine can carry out data search from more data dimensions, can promote the probability that data are searched.Also, Data search is carried out from more data dimensions, the accuracy of data search can also be promoted.
In another application scenarios, the data obtained from data supplier can be the vehicle number that sensor acquires According to specifically can be untreated clear data.User's end interface 111 is after data supplier acquisition data, transaction data Irreversible operation can be carried out to the data of acquisition by generating subelement 121, generate the verify data of corresponding clear data.It is described Irreversible operation can be Hash operation, for example, it may be SHA256 or SHA3.And it is obtained and is indexed according to clear data Data are scanned for for the data requirements side by the search service subelement 122 of the user terminal 21.
In specific implementation, data requirements side can service subelement 122 by described search and carry out data search, to look into Look for the data for meeting data demand.
Further, the circulation Row control subelement 132 can be configured as according to as the data requirements side User terminal 21 to described search service subelement 122 provide search result confirmation, pass through the block chain interface 131 touch Hair runs on the intelligent contract of block chain 22.
For example, it may be index data is searched by the search service subelement 122 of user terminal 21 by data requirements side Rope searches the data of corresponding search need, and confirms to search result, circulation Row control subelement 132 in response to Confirmation of the data requirements side to search result triggers the intelligent contract for running on block chain 22 by block chain interface 131.
In specific implementation, user's end interface 111 can be configured as the business for receiving and carrying out the stream compression Demand information, the circulation service unit 13 can also include: intelligent bond service subelement 133, can be configured as basis The business demand information provides intelligent contract template by user's end interface 111, is based on from user's end interface 111 The determining intelligent contract to match with the business demand information of the response message of acquisition.
Wherein, business demand information can be corresponding previously described car insurance, maintenance, P2P Car sharing, vehicle The specific demand informations such as networking consumption.In specific implementation, stream compression can be received by user's end interface 111 Business demand information, for example, motor vehicle insurance business, maintenance business etc..
Intelligent contract template can be preset template file, and the intelligence contract template can store in intelligent contract mould Plate library, intelligent bond service subelement 133 can be provided according to the business demand information is stored in the intelligent contract template The intelligent contract template in library.In specific implementation, intelligent contract template library can store multiple intelligent contract templates, can be Respectively at the different corresponding intelligent contract templates of business demand information, for example, may include the automobile corresponding to car insurance Insure intelligent contract template, or the corresponding maintenance intelligence contract template with maintenance.
Wherein, the response message can be the response message of corresponding different business demand, for example, it may be corresponding automobile The response message of insurance business demand, or the response message of corresponding car networking consumption service demand in specific implementation can To be determined according to concrete application scene.
In specific implementation, the intelligent contract template of the correspondence business demand information based on offer and from the use The intelligent contract of the corresponding business demand information can be generated in the response message that family end interface 111 obtains.For example, according to sound Information is answered, is modified to by the intelligent contract template of business demand acquisition of information, modified intelligent contract is then based on Template generation intelligence contract.
Business demand information based on stream compression provides the corresponding business demand information by user's end interface Intelligent contract template, and the determining intelligent contract to match with the business demand information can determine according to business demand Intelligent contract template and intelligent contract, can make the intelligent contract generated correspond to different circulation demands, to provide multiplicity The stream compression service of change.
Further, the business demand information may include the information of target block chain, 131 quilt of block chain interface It is configured to support the deployment intelligent contract to the target block chain.
In specific implementation, the intelligent contract of the corresponding business demand information can be generated according to business demand information, And the information based on the target block chain in the business demand information, the business is needed by the block chain interface 131 The intelligent contract for asking information to determine is deployed to the target block chain.
For example, the information of the target block chain is the information of ether mill (ETH), then pass through block chain interface 131 for institute It states the intelligent contract that business demand information determines and is deployed to the ETH, the information of the target block chain is that commercial distribution is set The information of block chain operating system (EOS) is counted, then is closed by the intelligence that block chain interface 131 determines the business demand information About it is deployed to the EOS.
In specific implementation, intelligent bond service subelement 133 can also call intelligence to close by block chain interface 131 About, the interaction of data is carried out by intelligent contract and block chain 22.According to the difference of business, the intelligent contract that specifically calls, friendship Mutual data content can be different.
It will be appreciated by persons skilled in the art that the above is only for example, not believing block chain 22, business demand The limitation of breath, intelligent contract, intelligent contract template etc..
In specific implementation, the circulation service unit 13 can also include: adapter 134, and the adapter 134 is matched It is set to the requirement according to the block chain 22 to data format and communication mode, passes through the block chain interface 131 and the area Block chain 22 carries out data transmission.
Wherein, the quantity of adapter 134 can be multiple, may include with the one-to-one adapter 134 of block chain 22, The adapter 134 can carry out data transmission with the block chain 22, for example, ETH adapter can carry out data biography with ETH Defeated, EOS adapter can carry out data transmission with EOS, can be according to difference corresponding to the adapter 134 of different blocks chain 22 The requirement of requirement and communication mode of the block chain 22 to data format, carries out data transmission.
In specific implementation, the transmission data carried out data transmission may include the deployment of intelligent contract data, with And one or more of the data of intelligent contract are called, it is without limitation.
Requirement of the adapter according to block chain to data format and communication mode is carried out by block chain interface and block chain Data transmission, can make block chain interface and block chain carry out data transmission data format and the communication party of data fit block chain The requirement of formula can make user without understanding the concrete mode carried out data transmission with different blocks chain, and then can be promoted User experience.
Further, the adapter 134 can be configured as the data that conversion is received from the user terminal 21 as symbol Close the data format of the block chain requirement.
In specific implementation, different block chain 22, required data format is different, can by the adapter 134 It is converted with the data format of the data received to user terminal 21, obtains the number of the data format corresponding to block chain 22 According to.For example, the data that user terminal 21 receives can be converted to the data of corresponding ETH by the adapter 134 of corresponding ETH The data of format.
The data received from user terminal are converted to the data format for meeting the block chain requirement by adapter, from And the data format requirement of data fit block chain interacted with block chain can be made, specific lattice are understood without user Formula, and then user experience can be promoted.
It continues to refer to figure 1, in specific implementation, the data service unit 12 can also include: storage adapter 123, It is configured as determining the data storage location during the stream compression by user's end interface 111, for example, data are handed over The data storage location in storage location or other stream compression scenes during easily.
In specific implementation, storage location may include centralization database, and data supply party database, and go to center The database etc. of change.Wherein, the database of centralization can be the database of data service system 10 of the present invention, data supplier Database can be the database etc. of intelligent vehicle-carried hardware, and the database of decentralization can be IPFS (Inter Planetary File System, interspace file system) etc..It should be noted that herein by way of example only, not to the limit of storage location System.
In specific implementation, the data storage location of storing data circulation process can be determined by storage adapter 123, It can be and storage location is determined according to the type of data, for example, large data is stored in data supply party database, small-sized data It is stored in the database etc. of the database either decentralization of centralization, alternatively, can also be according to the selection of data supplier It determines storage location, for example, data supplier selection is stored in the database of centralization, then can supply data to party database Data be transferred to the database purchase of centralization or frequency of stream compression, such as the transaction frequency of data trade etc. Relevant information determines storage location etc., different one illustrates herein.
Storage adapter determines the storage location of the data during stream compression by user's end interface, so that in data Data during circulation can store to different storage locations, can be data storage it is more reasonable, data can be optimized The mode of storage.
In specific implementation, user's end interface 111 can be configured as and data supplier and data requirements side Data interaction is carried out, the data service unit 12 can also include: data cochain subelement 124, be configured as basis and pass through The data acquisition verify data that user's end interface 111 is provided from the data supplier passes through the block chain interface 131 By the verify data cochain, the verify data carries out the verifying of the transaction data for the data requirements side.
As previously mentioned, the interaction data for carrying out data interaction with the data supplier and data requirements side may include Verify data, index data and encryption data can be carried out data transmission by block chain interface 131 with block chain 22.? In specific implementation, verifying that data cochain subelement 124 will be obtained by the block chain interface 131 from the data supplier Data are uploaded to block chain 22, for example, ETH or EOS can be uploaded to.Previously described industry is uploaded to specifically, can be The target block chain that business demand information etc. determines, it is without limitation.
By uploading the verify data to the block chain, can be uploaded to block chain for verifying number of deals According to verify data can not change, thus, after stream compression, such as after data trade, data requirements side can be according to area Verify data on block chain verifies the transaction data of acquisition, can verify the authenticity of the data of acquisition.
As previously mentioned, the data of data supplier can store to different storage locations.In specific implementation, data supply Should side can to storage location store data be increased or be deleted or modified operation, for example, it may be increase or modify or Delete all or part of data etc. in the data of storage location.
In the data trade based on block chain, since data trade needs to meet the relevant regulations of secret protection bill, Such as general data conservation regulation (General Data Protection Regulation, GDPR) of European Union etc..Data supply Square the data for transaction can should be increased or be changed or deleted, therefore, the data of transaction may be to supply by data Answer the data of Fang Zengjia or change or deletion.A specific embodiment of the invention also provides the technology suitable for above-mentioned scene Scheme illustrates further below.
In specific implementation, the corresponding initial data of transaction data can be obtained after obtaining data from storage location Afterwards, to being verified from whether initial data increases or be deleted or modified.To increase to data in data supplier Under the premise of adding or operation being deleted or modified, whether the operation is carried out to it and has been verified, the safety of transaction has been promoted, is protecting Hinder data supplier under the premise of the rights of data, ensures the equity of data providing.
In specific implementation, the data service unit 12 can also include: service for checking credentials subelement 125, be configured as The corresponding initial data of the transaction data is obtained, the initial data is verified, the circulation service unit 13 may be used also To include: that subelement 135 is called in verifying, it is configured as that the service for checking credentials subelement 125 is called to carry out the initial data Verifying after being verified, triggers the transaction data generation subelement 121 and generates the transaction data.
In specific implementation, origin authentication data can be received from data supplier, origin authentication data can be data Supplier carries out what Hash operation obtained to the data of storage location to be deposited, specific hash algorithm can refer to it is described previously, This will not be repeated here.
Service for checking credentials subelement 123 can obtain initial data from storage location in data trade, to the original got Beginning data carry out Hash operation, relatively the front and back cryptographic Hash that Hash operation generates twice, determine the acquisition from storage location with this Initial data authenticity.
If the cryptographic Hash that comparison result determines that Hash operation obtains twice is consistent, from the initial data of storage location acquisition It for unmodified or not deleted data, is then verified, however, it is determined that the cryptographic Hash that Hash operation obtains twice is inconsistent, then from depositing The initial data of storage position acquisition is the data after increasing or modify or deleting, then verifies and do not pass through.
The corresponding initial data of transaction data is obtained by service for checking credentials subelement, verifying is called tests described in subelement calling Card service subelement verifies the initial data, and after being verified, triggering transaction data is generated described in subelement generation Transaction data can promote the validity of the transaction data of generation, can promote the successful probability of data trade, it is possible to reduce be The waste for resource of uniting.
In specific implementation, initial data can be data packet, and service for checking credentials subelement 123 can be obtained from data supplier Take the origin authentication data of data packet.It may include foregoing index data, verify data and encryption number in data packet According to.Data supplier, which increases the initial data or modifies or delete can be, carries out the partial data in data packet Increase or be deleted or modified, for example, encryption data can be deleted only, or only deletes index data, in other embodiments, It can be and delete entire data packet.
In specific implementation, it has been uploaded to block chain 22 for verifying the verify data of encryption data authenticity, be uploaded to The verify data of block chain 22 not can increase or delete or changes, and the verify data and storage location for being uploaded to block chain 22 store Data there are incidence relations.If the data that data supplier stores storage location increase or are deleted or modified, area The incidence relation for the data that verify data on block chain 22 is stored with storage location will change, and data service system 10 can be with By determining that incidence relation changes so that it is determined that the data of storage location are by increasing or deleting or changing operation, Jin Erke To terminate transaction.
In specific implementation, the transaction data generates subelement 121, can be configured as and connects to from the user terminal 21 The data received are encrypted, and transaction data is generated.
As previously mentioned, data supplier is different, the data obtained from the user terminal 21 of data supplier are different.Specific real Shi Zhong, transaction data generate subelement 121 and can encrypt to the data obtained from data supplier, for example, data are supplied The data that the user terminal 21 of side obtains are clear data, transaction data generate subelement 121 can to the clear data of acquisition into Row cryptographic calculation generates the encryption data of corresponding clear data.
In specific implementation, carrying out cryptographic calculation to the clear data of acquisition can be using asymmetric encryption to being stated clearly Literary data carry out cryptographic calculation.For example, algorithm involved in asymmetric encryption operation can be RSA Algorithm, Elgamal algorithm, Knapsack algorithm, Rabin algorithm, D-H algorithm, ECC (Error Correcting Code, elliptic curve encryption algorithm) etc., specifically The selection of Encryption Algorithm is herein with no restrictions.In other embodiments, it is also possible to other cipher modes.
Subelement is generated by transaction data, cryptographic calculation is carried out to the data obtained from data supplier, generate encryption number According to, can to avoid when lacking decruption key data the safety of data trade is enhanced by improper acquisition.
In specific implementation, transaction data generates subelement 121, can be to the encrypted encryption number of the clear data of acquisition According to re-encryption is carried out, corresponding transaction data is generated.Or the data that the user terminal 21 of data supplier obtains have been to carry out Encrypted encryption data, transaction data generates subelement 121 can the information of supplier and the number based on the data According to the information of party in request, re-encryption is carried out to the encryption data, to generate corresponding transaction data.
Wherein, the information of the data supplier and the information of the data requirements side can be corresponding data re-encryption Encryption key information, the re-encrypted private key can private key and data requirements side based on data supplier public key it is raw At.In specific implementation, it is respectively right to can use preset public private key pair generator generation for data supplier and data party in request The public private key pair answered.The public private key pair generator can be realized by software mode, or offline hardware keys are raw At tool.
In specific implementation, encryption data is to carry out encrypted data by the public key of data supplier, when data supply When establishing order, data requirements side can be sent by data service system 10 to data supplier for the data requirements side Ying Fangyu The public key of itself, data supplier can generate re-encrypted private key based on the private key of itself and the public key of the data requirements side.
In specific implementation, after generating the re-encrypted private key, the re-encrypted private key of generation can be verified, it can be with The re-encrypted private key is verified using various ways.In order to avoid verification process leads to Key Exposure, zero can be used Knowledge proof mode is verified.In other embodiments, when being verified to the re-encrypted private key, can also using pair The timestamp of the re-encrypted private key is verified, alternatively, can also be verified with the mode of digital signature.
One in the specific implementation, being verified by zero-knowledge proof mode to re-encrypted private key, specific verification mode with Under will be described in detail in conjunction with Fig. 3.
In specific implementation, the available data supplier of the acquisition module 311 of re-encrypted private key authentication unit 31 The public key of public private key pair generator 32, the public key of data requirements side's public private key pair generator 33 and the re-encrypted private key Fixed length random number.Wherein, the fixed length random number can be character string, number or both combination, can using it is preset with The fixed length random number of the generation re-encrypted private key of machine number generator 34.
Further, the public key of the data supplier, the public key of the data requirements side and institute are obtained in acquisition module 311 After the fixed length random number for stating re-encrypted private key, by the public key by splicing module 312 to the data supplier, data requirements side Public key and the fixed length random number of re-encrypted private key spliced, obtain splicing value.
In specific implementation, splicing module 312 can public key according to preset sequence to data supplier, data requirements The public key of side and the fixed length random number of re-encrypted private key are spliced, or are also possible to be conducive to test re-encrypted private key The mode of card is spliced, and is not particularly limited to this.
In specific implementation, after obtaining the splicing value by the splicing module 312, the first Hash operation can be passed through Module 313 carries out Hash operation to the splicing value, obtains the cryptographic Hash for corresponding to the splicing value, for example, can be using default Hash algorithm to the splicing value carry out Hash calculation, obtain the cryptographic Hash of the splicing value, be specifically referred to institute above It states, this is not repeated them here.
In specific implementation, the Kazakhstan for the splicing value that first Hash operation module 313 can be generated by contrast module 315 Uncommon value with and the cryptographic Hash of re-encrypted private key of the second hash generation module 314 generation compare, verify the splicing value Cryptographic Hash it is whether consistent with the cryptographic Hash of the re-encrypted private key, so that it is determined that whether re-encrypted private key correct.
In specific implementation, if verification result is consistent, it is determined that the re-encrypted private key is correct, if verification result is different It causes, it is determined that the re-encrypted private key mistake.
Pass through the fixed length random number to the public key of data supplier of acquisition, the public key of data requirements side and re-encrypted private key Spliced, then the cryptographic Hash of splicing value is obtained by Hash calculation, compares the cryptographic Hash of re-encrypted private key and the Kazakhstan of splicing value Whether uncommon value is consistent, is verified as a result, therefore can guarantee the safety of data trade.
In specific implementation, to further increase verification efficiency, the public affairs that module 311 obtains the data supplier are obtained Before the fixed length random number of key, the public key of the data requirements side and the re-encrypted private key, re-encrypted private key can also be passed through Total length authentication module 316 verifies the total length of re-encrypted private key, determine the re-encrypted private key total length whether For preset length value.
In specific implementation, the preset length value of re-encrypted private key is fixed, by verifying the re-encrypted private key Whether total length is preset length value, can determine whether to continue to execute according to verification result, can save system resource.
For example, the preset length value of re-encrypted private key is 56, if the total length of verifying re-encrypted private key is 64, weigh Encryption key authentication failed returns verification result to data supplier.If verifying the total length of re-encrypted private key and presetting length Degree is consistent, then re-encrypted private key is proved to be successful, and can obtain the public key of the data supplier, the public key of the data requirements side With the fixed length random number of the re-encrypted private key, to carry out the subsequent authentication process of re-encrypted private key.
It is random in the public key for the public key, data requirements side for obtaining the data supplier and the fixed length of the re-encrypted private key Before number, the total length of re-encrypted private key is verified, can determine whether to continue re-encryption based on verification result close The verifying of key can be improved verification efficiency, and can reduce system resource waste.
In specific implementation, re-encrypted private key can also be verified using other modes.For example, can be added with counterweight The timestamp of key is verified, and whether the particular point in time verified when generating re-encrypted private key is preset time point.Alternatively, Re-encrypted private key can be verified with the mode of digital signature, whether verifying abstract is default abstract.
In the present invention one in the specific implementation, the verification result of the re-encryption key is correct, then the re-encryption is used Encryption data described in key pair carries out re-encryption, generates encryption data.
After data requirements side obtains the transaction data, it can be generated based on data requirements side's public private key pair generator 33 The transaction data is decrypted in private key, to obtain the clear data of the transaction data.
Re-encrypted private key is generated by the private key of public key and data requirements side using data supplier, and described in utilization Re-encrypted private key encrypts the encryption data, so as to be that the transaction data generated only has the private key of data requirements side It can be decrypted, the safety of data trade can be promoted.
The present invention it is another in the specific implementation, the re-encrypted private key verification result mistake, then to data supplier send out Verification result is sent, so that the data supplier retransmits re-encrypted private key.In specific implementation, re-encrypted private key is tested Card, when verification result is mistake, alternatively, Xiang Suoshu data supplier sends verification result, so that described Data supplier retransmits re-encrypted private key to continue to complete transaction.
In specific implementation, if data supplier thinks that the re-encrypted private key of oneself is correct, institute can be sent again State re-encrypted private key.If data supplier has found that the re-encrypted private key of oneself is mistake, a new weight can be regenerated Encryption key is simultaneously sent again.
By transmitting verification result to data supplier, data supplier can be made to learn that transaction is interrupted in time Reason, and suitable processing scheme is selected, the efficiency of data trade can be improved.
It continues to refer to figure 1, in specific implementation, data service unit 12 may include security service subelement, can be by It is configured to login username, the password of management data supplier and data requirements side, user authority management can also be carried out.? In specific implementation, proxy re-encryption can also generate subelement 121 by transaction data and security service subelement is called to carry out.
In specific implementation, the transaction data of generation can store in the database of data service system 10, transaction data Data requirements side can be given to by multi-exchange mode.
For example, it may be generating the storage address of fixed time limit, and the transaction data is stored to the storage address, Data service system 10, which is issued by forms such as mail or short messages to data requirements side, to be stored the data of the transaction data and deposits Address is stored up, so that the available transaction data in data requirements side.
Transaction data generates the subelement information of supplier and the information of the data requirements side based on the data, right It is encrypted from the data received as the data supplier, can make to generate encryption data with specific aim, number of deals According to the data supplier is corresponded only to data requirements side, the safety of data trade can be promoted.
In conjunction with reference Fig. 1 and Fig. 4, in the present invention one in the specific implementation, the data service system 10 (shown in Fig. 1) may be used also To include: data analysis service unit 40, the data analysis service unit 40 may include:
Demand information receiving subelement 41 is analyzed, is configured as receiving analysis demand information from user's end interface 111, Analysis demand of the analysis demand information instruction to data;
Computation subunit 42 is configured as being received according to the analysis demand information to from user's end interface 111 Data carry out analytical calculation obtain analysis result;
Analyze result and return to subelement 43, be configured as returning by user's end interface 111 the analysis result with Respond the analysis demand information.
Wherein, analysis demand information can be user to the analysis demand of data, can be in big data neck to a large amount of The statistical analysis demand of data, wherein may include specific analysis parameter and index.For example, it may be insurance company is to driving The analysis demand information of behavior is sailed, wherein may include the classification to driving behavior, and the analysis indexes of different driving behaviors Deng.
The computing object of computation subunit 42 can be the data received from user's end interface 111, can be history number According to or real time data.It can specifically be calculated in many ways, such as Secure calculating (Multi- can be carried out Party Computation, MPC), call distributed computing unit, without trusting relationship between each distributed computing unit, In this way, calculating speed can be promoted, it is more applicable for big data analysis.
Computation subunit 42 can calculate the data encrypted by the way of homomorphic cryptography.It is supplied from data The data just obtained can be homomorphic cryptography data, by analyzing homomorphism data, can protect data-privacy.
To more fully understand those skilled in the art and realizing the embodiment of the present invention, below in conjunction with Fig. 5 and Fig. 6, pass through The process for spreading process and data trade of data is described in detail in specific application scenarios.
With reference to Fig. 5, in one kind in the specific implementation, the data that data supplier provides are acquired by transacter 51, For example, it may be the sensor 511 by transacter 51 acquires, by taking car data as an example, the voltage that can be vehicle is passed Sensor, tyre pressure sensor etc..
In specific implementation, transacter 51 can carry out Hash to the data of acquisition after collecting data Operation generates corresponding verify data, and generates the index data of the data of the corresponding acquisition.
In specific implementation, the encryption chip 512 of data acquisition device 51 can carry out the data that sensor 511 acquires Encryption, to obtain encryption data.
For example, it may be encrypting by data of the rivest, shamir, adelman to acquisition, it is specifically referred to institute above It states, this will not be repeated here.
In other embodiments, the data that sensor 511 acquires can also directly be uploaded to data service system, pass through number The encryption of data is carried out according to service system and generates index data.
In specific implementation, it after generating the encryption data, index data and verify data, can be supplied according to data The requirement for the side of answering stores data to specified position.
For example, can store to the database 513 of acquisition device 51, or it can be transmitted and be uploaded by transmission module 514 To gateway 521, data pick-up is carried out by the buffering of data queue 522 and data extraction module 523 of data processing unit 52 Afterwards, by storage adapter 53, the storage location 54 specified to data supplier is stored.
Data can buffer data by data extraction module 523 by the temporary and buffering of data queue 522 Data carry out data processing.
For example, data dimension extension can be carried out to the index data that data supplier uploads, alternatively, on data supplier What is passed is clear data, can be encrypted to clear data, and carries out data pick-up, generates index data, alternatively, can be with The data of cloud third party downloading are parsed, to obtain the data for data service system.
As previously mentioned, storage can be passed through by data queue 522 and data processing module 523 treated data Adapter 53 stores the storage location 54 specified to data supplier.
For example, can be according to the storage demand of data supplier, by being deposited with what decentralization storing data library 542 was docked Adapter 53 is stored up, the data for being uploaded to data service system are stored to the memory node of decentralization database 542, such as The memory node of IPFS, alternatively, the data of upload are stored to centralization database 541 etc..
In specific implementation, storing to the data of storage location 54 can shift according to the storage demand of data supplier To other databases.
For example, data are stored to centralization database 541, storage can be passed through based on the storage demand of data supplier Adapter 53 will store to the data of centralization database 541 and be transferred to data supplier, such as vehicle intelligent terminal 543, or Person stores to the memory node etc. of decentralization database 542.
It should be noted that herein by way of example only, not to the limitation of storage mode and storage location 54.
In specific implementation, data service system can be incited somebody to action after data supplier acquisition data by block chain interface The verify data of acquisition is uploaded to block chain 56.
Specifically, requirement of the block chain 56 to data format and communication mode can be determined by block chain adapter 55, Carried out data transmission by the block chain interface and the block chain 56, for example, being transmitted to ETH or EOS or ONT.
In specific implementation, obtaining data from data supplier by transmission module 514 can also include obtaining from data side Take the origin authentication data of data to be stored.
For example, the data to be stored obtained from data side is data packet, data packet may include verify data, index number According to and at least one of encryption data, then origin authentication data can be data of the data packet after Hash.The original of acquisition Beginning verify data is stored in data service system.
In specific implementation, the circulation of data trade is controlled by running on the intelligent contract of block chain 56.Intelligent contract The intelligent contract template generation provided by intelligent bond service subelement based on intelligent contract template database, the intelligence of generation Contract is affixed one's name to by block chain interface portion to corresponding block chain 56.It should be noted that block chain 56 described herein can be Fig. 2 Described in block chain 22
With reference to Fig. 6, in a kind of specific operation flow, specific business is maintenance business, intelligent contract template library The 61 intelligent contract templates provided are the intelligent contract template of corresponding maintenance, and intelligent contract generation module 62 is based on maintenance and protects It supports business need and maintains intelligent contract template generation and maintain intelligent contract.
Requirement of the intelligent contract to block chain 56 that the intelligent contract of generation can be determined according to intelligent contract adapter 63, Intelligent contract is deployed to corresponding block chain 56 by block chain interface.
For example, the intelligent contract generated is the intelligent contract of corresponding ETH, then pass through block chain interface for the intelligent contract It is deployed to ETH, if the intelligent contract generated is the intelligent contract of corresponding EOS, passes through block chain interface for the intelligent contract It is deployed to EOS.
In specific implementation, the transaction amount payment etc. of the order cochain of data trade, data trade is linked by block Mouth realizes the calling for the intelligent contract for being deployed to block chain 56.
For example, when generating trade order, it can be by the intelligent contract of block chain interface call area block chain 56, to execute friendship Easy order places an order, and when data trade carries out transaction amount payment, the payment of transaction amount can be controlled by intelligent contract.
For the process of data trade, citing is carried out below and is further detailed.
With continued reference to Fig. 5, in specific implementation, data requirements side can be deposited based on block chain 56 or data service system The index data of storage carries out data search, for example, the index data stored by search service subelement to data service system Data search is carried out, determines the data for needing to buy.
After data requirements side determines the data searched by search service subelement, is called and disposed by block chain interface Trade order is generated to the intelligent contract of block chain 56 to place an order to the data searched.In specific implementation, data Supplier can be multiple, and the trade order of generation can be the trade order of corresponding multiple data suppliers.
Trade order of the data service system based on generation, by way of mail or short message, request data supplier Carry out data trade.In specific implementation, when data supplier is multiple, data service system issues request data transaction can be with It is that data trade request is issued to multiple data suppliers respectively, for example, by forms such as mail or short messages respectively to multiple Data supplier issues data trade request.
Further, based on data supplier to the confirmation operation of data transaction request, data service system is based on uploading Verify data, obtain the data packet that storage location 54 stores, and the data packet of acquisition verified.
For example, Hash operation can be carried out to the data packet that storage location 54 obtains, package verification data is generated, is passed through Data checking module 57 is compared package verification data and pre-stored origin authentication data, stores position to determine It sets 54 data whether to increase or delete or change, and then determines whether data trade continues to execute.
In one kind in the specific implementation, if package verification data and pre-stored origin authentication data are inconsistent, The data of storage location can be determined by increasing or being deleted or modified, then data service system can terminate data trade.
In another kind in the specific implementation, if determining that the data packet that data supplier obtains is not by data checking module 57 The data for increasing or modifying or deleting, then data trade can continue to execute, it can pass through transaction data and generate subelement 58 Re-encryption is carried out to the encryption data of acquisition, to obtain transaction data.The transaction data generates the specific implementation of subelement 58, And the specific implementation of other units, it may refer to described previously.
In specific implementation, the encryption key for carrying out re-encryption to encryption data can be raw by the equipment of data supplier At specifically, the private key and data requirements side's key pair generator that can be generated based on data supplier's key pair generator The public key of generation generates re-encrypted private key.Wherein, the public key that data supplier obtains data requirements side can pass through data service System obtains, alternatively, can also be transmitted directly to data supplier by data requirements side.
In specific implementation, the re-encrypted private key of generation can be uploaded to key management module 581, for re-encryption module The encryption data that 582 pairs of storage locations 54 obtain carries out use when re-encryption, to generate transaction data.
In specific implementation, data service system may include one or more in each unit above-mentioned, with full The needs of sufficient different scenes.
Data service system in the embodiment of the present invention is provided arranged to carry out with user terminal by interface service unit User's end interface of data interaction, and circulation service unit are provided arranged to the block chain carried out data transmission with block chain Interface runs on the intelligent contract of block chain to stream compression by circulation Row control subelement triggering in circulation service unit Process controlled, so as to provide data service for multifarious stream compression demand, so that each side of stream compression Can through the embodiment of the present invention in data service system complete stream compression.
Although present disclosure is as above, present invention is not limited to this.Anyone skilled in the art are not departing from this It in the spirit and scope of invention, can make various changes or modifications, therefore protection scope of the present invention should be with claim institute Subject to the range of restriction.

Claims (15)

1. a kind of data service system characterized by comprising
Interface service unit, the interface service unit include the user's termination for being configured as carrying out data interaction with user terminal Mouthful;
Circulate service unit, is configured to supply stream compression service, including be configured as carrying out data transmission with block chain Block chain interface, and circulation Row control subelement, the circulation Row control subelement are configured as through the block Chain interface, which triggers, runs on the intelligent contract of block chain, controls stream compression process, the stream compression process with from Based on the data that the user terminal interface arrives.
2. data service system according to claim 1, which is characterized in that user's end interface be configured as receiving into The business demand information of the row stream compression, the circulation service unit further include: intelligent bond service subelement is configured To provide intelligent contract template by user's end interface according to the business demand information, it is based on from user's end interface The determining intelligent contract to match with the business demand information of the response message of acquisition.
3. data service system according to claim 2, which is characterized in that the business demand information includes target block The information of chain, the block chain interface are configured as supporting the deployment intelligent contract to the target block chain.
4. data service system according to claim 1, which is characterized in that the circulation service unit further include: adaptation Device, the adapter are configured as the requirement according to the block chain to data format and communication mode, pass through the block chain Interface carries out data transmission with the block chain.
5. data service system according to claim 4, which is characterized in that the adapter is configured as converting from described The data that user terminal receives are to meet the data format of the block chain requirement.
6. data service system according to claim 1, which is characterized in that further include:
Data service unit is configured to supply data processing service, including transaction data generates subelement, the transaction data Subelement is generated to be configured as generating the number of deals for supporting data trade based on the data arrived by the user terminal interface According to;
The circulation service unit is configured as carrying out the transaction data control of data trade process.
7. data service system according to claim 6, which is characterized in that user's end interface is configured as and data Supplier and data requirements side carry out data interaction, the data service unit further include: are configured as according to from as institute The data generation index data that the user terminal of data supplier receives is stated, the user terminal search of the data requirements side is provided as Search service subelement.
8. data service system according to claim 7, which is characterized in that the circulation Row control subelement is matched The confirmation of the search result provided according to the user terminal as the data requirements side described search service subelement is provided, is led to Cross the intelligent contract that the block chain interface triggering runs on the block chain.
9. data service system according to claim 6, which is characterized in that the data service unit further include: storage Adapter is configured as determining the data storage location during the data trade by user's end interface.
10. data service system according to claim 6, which is characterized in that user's end interface is configured as and number Data interaction, the data service unit further include: data cochain subelement is matched are carried out according to supplier and data requirements side It is set to according to the data acquisition verify data provided by user's end interface from the data supplier, passes through the block The verify data cochain, the verify data are carried out the verifying of the transaction data for the data requirements side by chain interface.
11. data service system according to claim 6, which is characterized in that the data service unit further includes verifying Subelement is serviced, is configured as obtaining the corresponding initial data of the transaction data, the initial data is verified;It is described Circulate service unit further include: subelement is called in verifying, is configured as calling the service for checking credentials subelement to the original number According to being verified, after being verified, triggers the transaction data and generate the subelement generation transaction data.
12. data service system according to claim 6, which is characterized in that the transaction data generates subelement, is matched It is set to and the data received from the user terminal is encrypted, generate the transaction data.
13. data service system according to claim 6, which is characterized in that user's end interface is configured as and number Data interaction is carried out according to supplier and data requirements side, the transaction data generates subelement, is configured as based on the number According to the information of supplier and the information of the data requirements side, carried out to from the data received as the data supplier Encryption.
14. data service system according to claim 1, which is characterized in that further include: data analysis service unit, institute Stating data analysis service unit includes:
Demand information receiving subelement is analyzed, is configured as analyzing demand information, the analysis from the user terminal interface Demand information indicates the analysis demand to data;
Computation subunit, be configured as according to it is described analysis demand information to from the user terminal interface to data carry out Analytical calculation obtains analysis result;
It analyzes result and returns to subelement, be configured as returning to the analysis result by user's end interface to respond described point Analyse demand information.
15. data service system according to claim 14, which is characterized in that from the user terminal interface to number According to the homomorphic cryptography data to be encrypted in a manner of homomorphic cryptography, the computation subunit is configured as adding the homomorphism Ciphertext data carries out analytical calculation.
CN201811613014.5A 2018-12-27 2018-12-27 A kind of data service system Pending CN109754322A (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CN201811613014.5A CN109754322A (en) 2018-12-27 2018-12-27 A kind of data service system
US16/366,043 US10459990B1 (en) 2018-12-27 2019-03-27 Data processing method and device, medium and terminal thereof
US16/409,822 US11546348B2 (en) 2018-12-27 2019-05-12 Data service system
US16/726,777 US10725744B2 (en) 2018-12-27 2019-12-24 Method for adapting to blockchain and device, terminal and medium performing the same
US16/746,868 US11509637B2 (en) 2018-12-27 2020-01-18 Data transmission method, system and platform using blockchain, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811613014.5A CN109754322A (en) 2018-12-27 2018-12-27 A kind of data service system

Publications (1)

Publication Number Publication Date
CN109754322A true CN109754322A (en) 2019-05-14

Family

ID=66403971

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811613014.5A Pending CN109754322A (en) 2018-12-27 2018-12-27 A kind of data service system

Country Status (1)

Country Link
CN (1) CN109754322A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111309813A (en) * 2020-03-17 2020-06-19 北京百度网讯科技有限公司 Information processing method, device, equipment and storage medium in data circulation
CN112688845A (en) * 2020-12-23 2021-04-20 北京天融信网络安全技术有限公司 Communication method and device of vehicle-mounted CAN network
WO2021223104A1 (en) * 2020-05-06 2021-11-11 云图技术有限公司 System testing method and apparatus
CN113824757A (en) * 2020-12-23 2021-12-21 京东科技控股股份有限公司 Data acquisition method, system and computer readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106484836A (en) * 2016-09-30 2017-03-08 深圳市华傲数据技术有限公司 Data processing method based on block chain technology and system
CN106651346A (en) * 2016-11-28 2017-05-10 上海凯岸信息科技有限公司 Block chain-based credit investigation data sharing and trading system
CN108009646A (en) * 2017-11-30 2018-05-08 深圳市轱辘车联数据技术有限公司 Vehicle data processing method and server
CN108650073A (en) * 2018-05-07 2018-10-12 浙江工商大学 A kind of secret protection price competing method based on block chain
CN108830601A (en) * 2018-06-25 2018-11-16 上海延华大数据科技有限公司 Smart city information security application method and system based on block chain
CN108920514A (en) * 2018-05-31 2018-11-30 百度在线网络技术(北京)有限公司 A kind of information storage means based on block chain, device, equipment and storage medium
CN108989357A (en) * 2018-09-12 2018-12-11 中国人民解放军国防科技大学 User authorization and data sharing access control method based on block chain
CN109002349A (en) * 2018-06-25 2018-12-14 百度在线网络技术(北京)有限公司 Application program exchange method, implementation method, device, equipment and medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106484836A (en) * 2016-09-30 2017-03-08 深圳市华傲数据技术有限公司 Data processing method based on block chain technology and system
CN106651346A (en) * 2016-11-28 2017-05-10 上海凯岸信息科技有限公司 Block chain-based credit investigation data sharing and trading system
CN108009646A (en) * 2017-11-30 2018-05-08 深圳市轱辘车联数据技术有限公司 Vehicle data processing method and server
CN108650073A (en) * 2018-05-07 2018-10-12 浙江工商大学 A kind of secret protection price competing method based on block chain
CN108920514A (en) * 2018-05-31 2018-11-30 百度在线网络技术(北京)有限公司 A kind of information storage means based on block chain, device, equipment and storage medium
CN108830601A (en) * 2018-06-25 2018-11-16 上海延华大数据科技有限公司 Smart city information security application method and system based on block chain
CN109002349A (en) * 2018-06-25 2018-12-14 百度在线网络技术(北京)有限公司 Application program exchange method, implementation method, device, equipment and medium
CN108989357A (en) * 2018-09-12 2018-12-11 中国人民解放军国防科技大学 User authorization and data sharing access control method based on block chain

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111309813A (en) * 2020-03-17 2020-06-19 北京百度网讯科技有限公司 Information processing method, device, equipment and storage medium in data circulation
CN111309813B (en) * 2020-03-17 2023-08-29 北京百度网讯科技有限公司 Method, device, equipment and storage medium for processing information in data circulation
WO2021223104A1 (en) * 2020-05-06 2021-11-11 云图技术有限公司 System testing method and apparatus
CN112688845A (en) * 2020-12-23 2021-04-20 北京天融信网络安全技术有限公司 Communication method and device of vehicle-mounted CAN network
CN113824757A (en) * 2020-12-23 2021-12-21 京东科技控股股份有限公司 Data acquisition method, system and computer readable storage medium
CN113824757B (en) * 2020-12-23 2024-05-21 京东科技控股股份有限公司 Data acquisition method, system and computer readable storage medium

Similar Documents

Publication Publication Date Title
US10880732B2 (en) Authentication of phone caller identity
US10104074B2 (en) Independent biometric identification system
CN108989346B (en) Third-party valid identity escrow agile authentication access method based on account hiding
US11546348B2 (en) Data service system
CN109754322A (en) A kind of data service system
CN109460966A (en) Contract signing method, apparatus and terminal device based on requesting party's classification
CN104283688B (en) A kind of USBKey security certification systems and safety certifying method
CN110096944A (en) A kind of signature method, system and the terminal device of electronic contract
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
CN112613076B (en) Privacy-protecting multi-party data processing method, device and system
CN110597836B (en) Information inquiry request response method and device based on block chain network
CN109981287A (en) A kind of code signature method and its storage medium
CN112016075B (en) Travel information verification method based on block chain, electronic device and medium
US20190288833A1 (en) System and Method for Securing Private Keys Behind a Biometric Authentication Gateway
CN1753569B (en) System and method for treating mobile communication data business based on false code
CN116502732B (en) Federal learning method and system based on trusted execution environment
CN113239401A (en) Big data analysis system and method based on power Internet of things and computer storage medium
US20200145412A1 (en) System and method for platform-independent biometrically verified secure information transfer and access control
Yang et al. Accountable and verifiable secure aggregation for federated learning in IoT networks
US11741215B1 (en) Recipient credentialing leveraging private keys on keystores read by provisioned devices
CN201717885U (en) Code providing equipment and code identification system
CN105743859B (en) A kind of method, apparatus and system of light application certification
CN110266641A (en) Information-reading method and device
CN113328860A (en) Block chain-based user privacy data security providing method
CN115529170B (en) Reputation management method based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190514