CN109754322A - A kind of data service system - Google Patents
A kind of data service system Download PDFInfo
- Publication number
- CN109754322A CN109754322A CN201811613014.5A CN201811613014A CN109754322A CN 109754322 A CN109754322 A CN 109754322A CN 201811613014 A CN201811613014 A CN 201811613014A CN 109754322 A CN109754322 A CN 109754322A
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- subelement
- interface
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the invention discloses a kind of data service system, the data service system includes: interface service unit, and the interface service unit includes the user's end interface for being configured as carrying out data interaction with user terminal;Circulate service unit, it is configured to supply stream compression service, including the block chain interface for being configured as carrying out data transmission with block chain, and circulation Row control subelement, the circulation Row control subelement is configured as triggering the intelligent contract for running on block chain by the block chain interface, stream compression process is controlled, the stream compression process by from the user terminal interface to data based on.Data service system in the embodiment of the present invention can provide support for diversified stream compression.
Description
Technical field
The present invention relates to data processing field more particularly to a kind of data service systems.
Background technique
With the development of block chain technology, more and more data can be circulated by block chain, be circulated
The classification of data is various, and data content is very diversified.
How for diversified stream compression support is provided, becomes urgent problem to be solved.
Summary of the invention
The technical issues of embodiment of the present invention solves is to provide a kind of data service that enriched data can be supported to circulate
System.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of data service system, comprising: interface service list
Member, the interface service unit include the user's end interface for being configured as carrying out data interaction with user terminal;Circulate service unit,
It is configured to supply stream compression service, including the block chain interface for being configured as carrying out data transmission with block chain, Yi Jiliu
The program-controlled subunit of turn of tidal stream, the circulation Row control subelement, which is configured as triggering by the block chain interface, runs on area
The intelligent contract of block chain, controls stream compression process, and the stream compression process is with from the user terminal interface
Based on the data arrived.
Optionally, user's end interface is configured as receiving the business demand information for carrying out the stream compression, described
Circulate service unit further include: intelligent bond service subelement is configured as passing through the use according to the business demand information
Family end interface provides intelligent contract template, based on response message determination and the business demand obtained from user's end interface
The intelligent contract that information matches.
Optionally, the business demand information includes the information of target block chain, and the block chain interface is configured as propping up
The deployment intelligent contract is held to the target block chain.
Optionally, the circulation service unit further include: adapter, the adapter are configured as according to the block chain
Requirement to data format and communication mode is carried out data transmission by the block chain interface and the block chain.
Optionally, the adapter is configured as converting the data received from the user terminal being to meet the block chain
It is required that data format.
Optionally, the data service system further include: data service unit is configured to supply data processing service,
Subelement is generated including transaction data, the transaction data generates subelement and is configured as being based on connecing by user's end interface
The data received generate the transaction data for supporting data trade;The circulation service unit, is configured as to the transaction data
Carry out the control of data trade process.
Optionally, user's end interface is configured as carrying out data interaction with data supplier and data requirements side,
The data service unit further include: be configured as raw according to the data received from the user terminal as the data supplier
At index data, it is provided as the search service subelement of the user terminal search of the data requirements side.
Optionally, the circulation Row control subelement, is configured as according to the user terminal as the data requirements side
Confirmation to the search result that described search service subelement provides, runs on the block by block chain interface triggering
The intelligent contract of chain.
Optionally, the data service unit further include: storage adapter is configured as true by user's end interface
Data storage location during the fixed data trade.
Optionally, user's end interface is configured as carrying out data interaction with data supplier and data requirements side,
The data service unit further include: data cochain subelement is configured as basis and passes through user's end interface from the number
According to the data acquisition verify data that supplier provides, by the block chain interface by the verify data cochain, the verifying
Data carry out the verifying of the transaction data for the data requirements side.
Optionally, the data service unit further includes service for checking credentials subelement, is configured as obtaining the transaction data
Corresponding initial data verifies the initial data;The circulation service unit further include: subelement is called in verifying,
It is configured as that the service for checking credentials subelement is called to verify the initial data, after being verified, triggers the transaction
Data generate subelement and generate the transaction data.
Optionally, the transaction data generates subelement, is configured as carrying out the data received from the user terminal
Encryption, generates the transaction data.
Optionally, user's end interface is configured as carrying out data interaction with data supplier and data requirements side,
The transaction data generates subelement, is configured as the letter of the information of supplier and the data requirements side based on the data
Breath, encrypts to from the data received as the data supplier.
Optionally, the data service system further include: data analysis service unit, the data analysis service unit packet
Include: analysis demand information receiving subelement is configured as analyzing demand information from the user terminal interface, and the analysis needs
Ask information instruction to the analysis demand of data;Computation subunit is configured as according to the analysis demand information to from the use
The data that family end interface receives carry out analytical calculation and obtain analysis result;It analyzes result and returns to subelement, be configured as passing through
User's end interface returns to the analysis result to respond the analysis demand information.
Optionally, from the user terminal interface to data be that the homomorphism encrypted in a manner of homomorphic cryptography adds
Ciphertext data, the computation subunit are configured as carrying out analytical calculation to the homomorphic cryptography data.
Compared with prior art, the technical solution of the embodiment of the present invention has the advantages that
In the embodiment of the present invention, it is provided arranged to carry out the user of data interaction with user terminal by interface service unit
End interface, and circulation service unit are provided arranged to the block chain interface carried out data transmission with block chain, pass through circulation
The intelligent contract that the Row control subelement triggering that circulates in service unit runs on block chain controls the process of stream compression
System, so as to provide data service for multifarious stream compression demand, enables each side of stream compression to pass through this hair
Data service system in bright embodiment completes stream compression.
Further, the business demand information based on stream compression provides corresponding business demand by user's end interface
The intelligent contract template of information, and the determining intelligent contract to match with the business demand information, can be according to business demand
It determines intelligence contract template and intelligent contract, the intelligent contract generated can be made to correspond to different stream compression scenes, provided
Diversified stream compression service.
Further, requirement of the adapter according to block chain to data format and communication mode passes through block chain interface and area
Block chain carries out data transmission, and block chain interface and block chain can be made to carry out data transmission the data format of data fit block chain
And the requirement of communication mode, user can be made without understanding the concrete mode carried out data transmission with different blocks chain, in turn
User experience can be promoted.
Further, the data received from user terminal are converted to the data for meeting the block chain requirement by adapter
Format, so as to so that the data fit block chain interacted with block chain data format requirement, without user understand
Specific format, and then user experience can be promoted.
Further, by uploading verify data to block chain, can be uploaded to block chain for verifying number of deals
According to verify data can not change, thus, after data trade, data requirements side can be according to the verify data pair on block chain
The transaction data of acquisition is verified, and the authenticity of the data of acquisition can be verified.
Further, the corresponding initial data of transaction data is obtained by service for checking credentials subelement, subelement tune is called in verifying
The initial data is verified with the service for checking credentials subelement, after being verified, triggering transaction data generates subelement
Transaction data is generated, the validity of the transaction data of generation can be promoted, the successful probability of data trade can be promoted, can be subtracted
The waste of few system resource.
Further, subelement is generated by transaction data and cryptographic calculation is carried out to the data obtained from data supplier, it is raw
At encryption data, can to avoid when lacking decruption key data the safety of data trade is enhanced by improper acquisition.
Further, transaction data generates the subelement information of supplier and the data requirements side based on the data
Information is encrypted to from the data received as the data supplier, and generation encryption data can be made to have specific aim,
Transaction data corresponds only to the data supplier and data requirements side, can promote the safety of data trade.
Detailed description of the invention
Fig. 1 is a kind of structural schematic diagram of data service system in the embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of data transacting system in the embodiment of the present invention;
Fig. 3 be one in the embodiment of the present invention in re-encrypted private key verifying system structural schematic diagram;
Fig. 4 is a kind of structural schematic diagram of data analysis service unit in the embodiment of the present invention;
Fig. 5 is the partial structure diagram of another data service system in the embodiment of the present invention;
Fig. 6 is the partial structure diagram of another data service system in the embodiment of the present invention.
Specific embodiment
As stated in the background art, how for diversified data trade support is provided, it has also become one urgently to be resolved to ask
Topic.
In embodiments of the present invention, it is provided arranged to carry out the use of data interaction with user terminal by interface service unit
Family end interface, and circulation service unit are provided arranged to the block chain interface carried out data transmission with block chain, pass through stream
The Row control subelement that turns to circulate in service unit via the triggering of block chain interface runs on the intelligent contract of block chain to data
Circulation process controlled, so as to providing data service for multifarious stream compression demand, so that stream compression
Each side can through the embodiment of the present invention in data service system complete stream compression.To make above-mentioned purpose of the invention, spy
Beneficial effect of seeking peace can become apparent understandable, and specific embodiments of the present invention are described in detail with reference to the accompanying drawing.
With reference to the structural schematic diagram of data service system shown in FIG. 1, in embodiments of the present invention, data service system 10
May include:
Interface service unit 11, the interface service unit 11 may include being configured as carrying out data interaction with user terminal
User's end interface 111;
Circulate service unit 13, is configured to supply stream compression service, may include being configured as carrying out with block chain
The block chain interface 131 of data transmission, and circulation Row control subelement 132,132 quilt of circulation Row control subelement
It is configured to trigger the intelligent contract for running on block chain by the block chain interface 131, stream compression process is controlled,
The stream compression process is based on from the data that user's end interface 111 receives.
In specific implementation, the data that data service system 10 can will be received from interface service unit 11, Huo Zheji
The data obtained after the data received are handled are touched by circulation Row control subelement 132 by block chain interface 131
It sends out intelligent contract and is uploaded to block chain.User can be inquired by block chain, alternatively, data service system 10 can also lead to
It crosses interface service unit 11 and query service is provided.
In embodiments of the present invention, stream compression can be the stream compression under several scenes, for example, it may be data are handed over
Easily, or it is also possible to other transmitting of data.Specifically, by taking car data as an example, can be automobile P2P (Peer-to-Peer,
It is point-to-point) Car sharing, car insurance, maintenance, car networking consumption etc. during stream compression.
It will be appreciated by persons skilled in the art that the process of above-mentioned stream compression can if being related to the sharing of economic interests
Using as data trade, or it is also possible to other stream compression processes for not being related to economic interests, " transaction " two word is not pair
The limitation of protection scope, the scene only in the scope of the present invention are illustrated, data flow in all use embodiment of the present invention
The technical solution for turning thought is within the scope of the invention, herein and with no restrictions.
Data service system in the embodiment of the present invention can dock different block chains, use each side of stream compression
Family provides user's end interface, provides flexile selection, and user can select with business demand, in different application scenarios
The each unit provided in the embodiment of the present invention is provided, individually or is used cooperatively, without docking different block chain point respectively
Not carry out data circulation control, so as to promote the efficiency of stream compression and control, and then promote user experience.
Wherein, block chain is a kind of a kind of chain for being sequentially in time combined into data block in such a way that sequence is connected
Formula data structure, and the distributed account book that can not be distorted He can not forge guaranteed in a manner of cryptography.Block chain may include
Publicly-owned chain, privately owned chain or alliance's chain etc..
Publicly-owned chain is the chain of decentralization, and the data for being uploaded to publicly-owned chain can not distort;Privately owned chain is privately owned block chain, is
Refer to that the block chain that write-in permission is organized in hand at one completely, all nodes participated in this block chain all can be controlled strictly
System;Alliance's chain refer to have it is several tissue or the common participative management of mechanism block chain, it is each tissue or mechanism controls one or more
A node, records transaction data jointly, and only these organisations and institutions the data in alliance's chain can be written and read and
Send transaction.
Intelligent contract is the one section of code operated on block chain, the intelligent contract agreement of the logical definition of code it is interior
Hold, the account of contract maintains the operating status of contract.In embodiments of the present invention, friendship of the intelligent contract to the data trade
Easy process is controlled.
User terminal can be the equipment end that user is operated, for example, it may be handheld terminal, mobile unit, plate are set
It is standby to wait terminal devices, either it is also possible to single personal computer, server or server cluster, user terminal is not to device type
Limitation.
According to user's difference, in specific implementation, user terminal can be the user terminal of corresponding data supplier, be also possible to
The user terminal of corresponding data party in request.The data that data interaction is carried out with user's end interface 111 may include multi-exchange data,
For example, by taking car data as an example, it can be the data obtained in the intelligent vehicle-carried hardware, or the vehicle number acquired by sensor
According to, or the third party's data obtained, it is without limitation.
Data service system 10 can support a variety of stream compression processes, and access corresponding a variety of stream compression scenes
Service system.Continue by taking car data as an example, as previously mentioned, can be used for car insurance, maintenance, P2P Car sharing,
The data services such as car networking consumption.
Citing is briefly described below, for example, receiving in the scene of P2P Car sharing from interface service unit 11
The data arrived, may include the identity information of both sides, and the key circulation information of Car sharing believes the selection of intelligent contract template
Breath etc..By the Row control subelement 132 that circulates, the portion of intelligent contract can be carried out according to the selection to intelligent contract template
Administration, triggering run on intelligent contract and progress data interaction in block chain etc., so as to realize the business in the scene
Demand.More specifically implementation may refer to described hereinafter, then this is repeated no more.
Alternatively, the data received from interface service unit 11, may include new car in the scene of Second-hand Vehicle Transaction
After factory data, new car use, data related with vehicle-state, mantenance data for generating in use etc. can also be with
Including the relevant data of other transaction, and the selection information etc. to intelligent contract template.Similar to the scene of P2P Car sharing
In, by the Row control subelement 132 that circulates, according to the selection to intelligent contract template, can carry out intelligent contract deployment,
Triggering runs on intelligent contract and progress data interaction in block chain etc., so as to realize in Second-hand Vehicle Transaction scene
Business demand.
In different application scenarios, it is collected that the data received from interface service unit 11 can be acquisition equipment
Data, user identity data or be also possible to the data that user is selected or input, be also possible to various other numbers
According to.The data type that data service system 10 can be received according to interface service unit 11, is handled data, Jin Erke
To access the types of applications of corresponding several scenes, exploitation threshold is reduced.
Data trade is the important scenes in Various types of data circulation scene, in data trade scene, is usually had more to data
More requirements, such as safety, the privacy of data of data etc..
In specific implementation, data service system 10 can also include data service unit 12, be configured to supply data
Processing service may include that transaction data generates subelement 121, and the transaction data generates subelement 121 and is configured as being based on
The transaction data for supporting data trade is generated by the data that user's end interface 111 receives.
Correspondingly, the circulation service unit 13, can be configured as and carry out data trade process to the transaction data
Control.
Transaction data is generated by data service unit 12, to promote safety and the privacy during data trade
It provides the foundation, therefore trades for Various types of data, including having the transaction of the data of privacy, can provide support.Below
In conjunction with Fig. 1 and Fig. 2 being further detailed to above-mentioned data service system 10.
Data service system 10 can obtain data from user terminal 21 by user's end interface 111, and user terminal 21 can be
As the user terminal 21 of data supplier, though it with a user terminal 21 is example in figure, but it is understood that, user terminal 21
Quantity can be it is multiple, wherein may include the user terminal 21 as data supplier, and the user as data requirements side
End 21.
User terminal 21 as data supplier can be data supply method, apparatus, such as can be intelligent vehicle-carried hardware,
Acquisition device or it is also possible to cloud third party.User terminal 21 as data requirements side can be with data requirements method, apparatus, example
It can such as be intended to obtain manufacturer, insurance company, individual or the service provider of data;Block chain 22 can be ether mill
(ETH), commercial Distributed Design block chain operating system (EOS) or other block chains 22 etc..
Data service system 10 passes through the data that user's end interface 111 is obtained from user terminal 21, can be from above-mentioned conduct
What the user terminal 21 of data supplier obtained, which can be the data with unified format of intelligent vehicle-carried hardware acquisition,
Perhaps the untreated data of the vehicle acquisition equipped with acquisition device or third party's data of cloud third party downloading,
Such as by taking car data as an example, third party's data can be depot after treatment, be uploaded to the data in cloud.
The data that data supplier provides can be stored to local or upload to block chain 22 by data service system 10,
When data requirements side needs to buy data, intelligent contract can be run by block chain 22 and carries out data trade.
Specifically, may include that transaction data generates subelement 121 in data service system 10, it is single that transaction data generates son
Member 121 generates transaction data according to the data of acquisition, and circulation Row control subelement 132 can pass through the block chain interface
131 triggerings run on the intelligent contract of block chain 22, to control the transaction flow of data trade.Data requirements side and data supply
Square data interaction can should be carried out based on data service system 10 by user terminal 21.
Using data service system described in above-described embodiment, transaction data generates subelement and passes through in data service unit
The data that user terminal interface arrives generate transaction data, and circulation Row control subelement passes through block chain in the service unit that circulates
The intelligent contract that interface triggering runs on block chain carries out data trade to transaction data, so as to be the diversified friendship of user
Easy demand provides data service, meets the transactions demand of user.
With continued reference to Fig. 1 and Fig. 2, in specific implementation, user's end interface 111 can be configured as to be supplied with data
Side and data requirements side carry out data interaction, and the data service unit 11 can also include: to be configured as basis from conduct
The data that the user terminal 21 of the data supplier receives generate index data, are provided as the user terminal of the data requirements side
The search service subelement 122 of 21 search.
As previously mentioned, can be multiplicity from the received data of data supplier by user's end interface 111, for example, can
To be from intelligent vehicle-carried hardware, acquisition device or to be also possible to the data that cloud third party receives, specifically can be has
The data of the unified format third number formulary that perhaps the untreated data of sensor acquisition or cloud third party download
According to.According to the difference of the data received from data supplier, search service subelement 122 can be carried out the data received
Different processing, is illustrated individually below.
In a kind of application scenarios, the data received from data supplier may include that original plaintext describes data, tests
It demonstrate,proves data and passes through the encrypted encryption data of intelligent vehicle-carried hardware.
Wherein: original plaintext, which describes data, may include the associated description information of data, for example, may include that data generate
Period, the region that data are formed, data the information such as generating device;Encryption data can be basis and be acquired by sensor
To clear data encrypt;Verify data, can be the data for being verified to clear data, and verify data can
Be it is irreversible, that is, different clear datas, corresponding different verify data, but according to verify data can not be restored
Clear data.In this way, data requirements side can verify data, the safety of data trade is promoted, also, due to verifying
Data it is irreversible, can protect data-privacy.
Original plaintext can be described the database that data are added to search engine by search service subelement 122, with original
As index data, data requirements side can be scanned for description data by search engine in plain text.For example, when data are from intelligence
Data obtained in the vehicle-mounted hardware of energy, original plaintext, which retouches data, to be generated after intelligent vehicle-carried hardware handles, can be direct
Data are described using original plaintext to scan for.
Search service subelement 122 can also describe data to the original plaintext using data dictionary and translate, and obtain
Data are described to plaintext, plaintext description data are added to the database of search engine, describe data in plain text as the index
Data.
For example, the data that data supplier receives are the data of sensor acquisition, the data of upload can be " p_
Vehicle ": " Vehicle $ 4kPKdXjome ", search service subelement 122 can adopt sensor by using data dictionary
The original plaintext that collection obtains describes data and carries out arrangement conversion, for example, by " p_vehicle ": " Vehicle $ 4kPKdXjome "
Be converted to " vehicles identifications ": " Vehicle $ 4kPKdXjome ", to obtain corresponding to the plaintext that the original plaintext describes data
Data are described.
It is translated by describing data to the original plaintext using data dictionary, is available for search engine
The efficiency of data search can be improved to be conducive to the search of search engine in description data in plain text.Also, by data
Translation conversion is carried out, obtains describing data in plain text, the probability that data are searched can be promoted, searching for search engine can be promoted
Without hesitation can.
In specific implementation, the original plaintext that search service subelement 122 can be provided based on data supplier describes number
It is extended according to data dimension, using the data after extending as index data.
For example, original plaintext describes in data, it may include specific vehicle identification number, obtained according to vehicle identification number
The information such as vehicle model, the vehicle place of production, the vehicle age of the corresponding vehicle identification number are taken, and are associated with the information of acquisition to institute
The plaintext for stating car data describes data, and the extension to the data dimension of car data may be implemented.
Data acquisition other data associated with the preset data dimension are described according to original plaintext, and are associated with
In plain text in description data, to describe data in plain text as index, expand so as to the data dimension to plaintext description data
Exhibition, search engine can carry out data search from more data dimensions, can promote the probability that data are searched.Also,
Data search is carried out from more data dimensions, the accuracy of data search can also be promoted.
In another application scenarios, the data obtained from data supplier can be the vehicle number that sensor acquires
According to specifically can be untreated clear data.User's end interface 111 is after data supplier acquisition data, transaction data
Irreversible operation can be carried out to the data of acquisition by generating subelement 121, generate the verify data of corresponding clear data.It is described
Irreversible operation can be Hash operation, for example, it may be SHA256 or SHA3.And it is obtained and is indexed according to clear data
Data are scanned for for the data requirements side by the search service subelement 122 of the user terminal 21.
In specific implementation, data requirements side can service subelement 122 by described search and carry out data search, to look into
Look for the data for meeting data demand.
Further, the circulation Row control subelement 132 can be configured as according to as the data requirements side
User terminal 21 to described search service subelement 122 provide search result confirmation, pass through the block chain interface 131 touch
Hair runs on the intelligent contract of block chain 22.
For example, it may be index data is searched by the search service subelement 122 of user terminal 21 by data requirements side
Rope searches the data of corresponding search need, and confirms to search result, circulation Row control subelement 132 in response to
Confirmation of the data requirements side to search result triggers the intelligent contract for running on block chain 22 by block chain interface 131.
In specific implementation, user's end interface 111 can be configured as the business for receiving and carrying out the stream compression
Demand information, the circulation service unit 13 can also include: intelligent bond service subelement 133, can be configured as basis
The business demand information provides intelligent contract template by user's end interface 111, is based on from user's end interface 111
The determining intelligent contract to match with the business demand information of the response message of acquisition.
Wherein, business demand information can be corresponding previously described car insurance, maintenance, P2P Car sharing, vehicle
The specific demand informations such as networking consumption.In specific implementation, stream compression can be received by user's end interface 111
Business demand information, for example, motor vehicle insurance business, maintenance business etc..
Intelligent contract template can be preset template file, and the intelligence contract template can store in intelligent contract mould
Plate library, intelligent bond service subelement 133 can be provided according to the business demand information is stored in the intelligent contract template
The intelligent contract template in library.In specific implementation, intelligent contract template library can store multiple intelligent contract templates, can be
Respectively at the different corresponding intelligent contract templates of business demand information, for example, may include the automobile corresponding to car insurance
Insure intelligent contract template, or the corresponding maintenance intelligence contract template with maintenance.
Wherein, the response message can be the response message of corresponding different business demand, for example, it may be corresponding automobile
The response message of insurance business demand, or the response message of corresponding car networking consumption service demand in specific implementation can
To be determined according to concrete application scene.
In specific implementation, the intelligent contract template of the correspondence business demand information based on offer and from the use
The intelligent contract of the corresponding business demand information can be generated in the response message that family end interface 111 obtains.For example, according to sound
Information is answered, is modified to by the intelligent contract template of business demand acquisition of information, modified intelligent contract is then based on
Template generation intelligence contract.
Business demand information based on stream compression provides the corresponding business demand information by user's end interface
Intelligent contract template, and the determining intelligent contract to match with the business demand information can determine according to business demand
Intelligent contract template and intelligent contract, can make the intelligent contract generated correspond to different circulation demands, to provide multiplicity
The stream compression service of change.
Further, the business demand information may include the information of target block chain, 131 quilt of block chain interface
It is configured to support the deployment intelligent contract to the target block chain.
In specific implementation, the intelligent contract of the corresponding business demand information can be generated according to business demand information,
And the information based on the target block chain in the business demand information, the business is needed by the block chain interface 131
The intelligent contract for asking information to determine is deployed to the target block chain.
For example, the information of the target block chain is the information of ether mill (ETH), then pass through block chain interface 131 for institute
It states the intelligent contract that business demand information determines and is deployed to the ETH, the information of the target block chain is that commercial distribution is set
The information of block chain operating system (EOS) is counted, then is closed by the intelligence that block chain interface 131 determines the business demand information
About it is deployed to the EOS.
In specific implementation, intelligent bond service subelement 133 can also call intelligence to close by block chain interface 131
About, the interaction of data is carried out by intelligent contract and block chain 22.According to the difference of business, the intelligent contract that specifically calls, friendship
Mutual data content can be different.
It will be appreciated by persons skilled in the art that the above is only for example, not believing block chain 22, business demand
The limitation of breath, intelligent contract, intelligent contract template etc..
In specific implementation, the circulation service unit 13 can also include: adapter 134, and the adapter 134 is matched
It is set to the requirement according to the block chain 22 to data format and communication mode, passes through the block chain interface 131 and the area
Block chain 22 carries out data transmission.
Wherein, the quantity of adapter 134 can be multiple, may include with the one-to-one adapter 134 of block chain 22,
The adapter 134 can carry out data transmission with the block chain 22, for example, ETH adapter can carry out data biography with ETH
Defeated, EOS adapter can carry out data transmission with EOS, can be according to difference corresponding to the adapter 134 of different blocks chain 22
The requirement of requirement and communication mode of the block chain 22 to data format, carries out data transmission.
In specific implementation, the transmission data carried out data transmission may include the deployment of intelligent contract data, with
And one or more of the data of intelligent contract are called, it is without limitation.
Requirement of the adapter according to block chain to data format and communication mode is carried out by block chain interface and block chain
Data transmission, can make block chain interface and block chain carry out data transmission data format and the communication party of data fit block chain
The requirement of formula can make user without understanding the concrete mode carried out data transmission with different blocks chain, and then can be promoted
User experience.
Further, the adapter 134 can be configured as the data that conversion is received from the user terminal 21 as symbol
Close the data format of the block chain requirement.
In specific implementation, different block chain 22, required data format is different, can by the adapter 134
It is converted with the data format of the data received to user terminal 21, obtains the number of the data format corresponding to block chain 22
According to.For example, the data that user terminal 21 receives can be converted to the data of corresponding ETH by the adapter 134 of corresponding ETH
The data of format.
The data received from user terminal are converted to the data format for meeting the block chain requirement by adapter, from
And the data format requirement of data fit block chain interacted with block chain can be made, specific lattice are understood without user
Formula, and then user experience can be promoted.
It continues to refer to figure 1, in specific implementation, the data service unit 12 can also include: storage adapter 123,
It is configured as determining the data storage location during the stream compression by user's end interface 111, for example, data are handed over
The data storage location in storage location or other stream compression scenes during easily.
In specific implementation, storage location may include centralization database, and data supply party database, and go to center
The database etc. of change.Wherein, the database of centralization can be the database of data service system 10 of the present invention, data supplier
Database can be the database etc. of intelligent vehicle-carried hardware, and the database of decentralization can be IPFS (Inter Planetary
File System, interspace file system) etc..It should be noted that herein by way of example only, not to the limit of storage location
System.
In specific implementation, the data storage location of storing data circulation process can be determined by storage adapter 123,
It can be and storage location is determined according to the type of data, for example, large data is stored in data supply party database, small-sized data
It is stored in the database etc. of the database either decentralization of centralization, alternatively, can also be according to the selection of data supplier
It determines storage location, for example, data supplier selection is stored in the database of centralization, then can supply data to party database
Data be transferred to the database purchase of centralization or frequency of stream compression, such as the transaction frequency of data trade etc.
Relevant information determines storage location etc., different one illustrates herein.
Storage adapter determines the storage location of the data during stream compression by user's end interface, so that in data
Data during circulation can store to different storage locations, can be data storage it is more reasonable, data can be optimized
The mode of storage.
In specific implementation, user's end interface 111 can be configured as and data supplier and data requirements side
Data interaction is carried out, the data service unit 12 can also include: data cochain subelement 124, be configured as basis and pass through
The data acquisition verify data that user's end interface 111 is provided from the data supplier passes through the block chain interface 131
By the verify data cochain, the verify data carries out the verifying of the transaction data for the data requirements side.
As previously mentioned, the interaction data for carrying out data interaction with the data supplier and data requirements side may include
Verify data, index data and encryption data can be carried out data transmission by block chain interface 131 with block chain 22.?
In specific implementation, verifying that data cochain subelement 124 will be obtained by the block chain interface 131 from the data supplier
Data are uploaded to block chain 22, for example, ETH or EOS can be uploaded to.Previously described industry is uploaded to specifically, can be
The target block chain that business demand information etc. determines, it is without limitation.
By uploading the verify data to the block chain, can be uploaded to block chain for verifying number of deals
According to verify data can not change, thus, after stream compression, such as after data trade, data requirements side can be according to area
Verify data on block chain verifies the transaction data of acquisition, can verify the authenticity of the data of acquisition.
As previously mentioned, the data of data supplier can store to different storage locations.In specific implementation, data supply
Should side can to storage location store data be increased or be deleted or modified operation, for example, it may be increase or modify or
Delete all or part of data etc. in the data of storage location.
In the data trade based on block chain, since data trade needs to meet the relevant regulations of secret protection bill,
Such as general data conservation regulation (General Data Protection Regulation, GDPR) of European Union etc..Data supply
Square the data for transaction can should be increased or be changed or deleted, therefore, the data of transaction may be to supply by data
Answer the data of Fang Zengjia or change or deletion.A specific embodiment of the invention also provides the technology suitable for above-mentioned scene
Scheme illustrates further below.
In specific implementation, the corresponding initial data of transaction data can be obtained after obtaining data from storage location
Afterwards, to being verified from whether initial data increases or be deleted or modified.To increase to data in data supplier
Under the premise of adding or operation being deleted or modified, whether the operation is carried out to it and has been verified, the safety of transaction has been promoted, is protecting
Hinder data supplier under the premise of the rights of data, ensures the equity of data providing.
In specific implementation, the data service unit 12 can also include: service for checking credentials subelement 125, be configured as
The corresponding initial data of the transaction data is obtained, the initial data is verified, the circulation service unit 13 may be used also
To include: that subelement 135 is called in verifying, it is configured as that the service for checking credentials subelement 125 is called to carry out the initial data
Verifying after being verified, triggers the transaction data generation subelement 121 and generates the transaction data.
In specific implementation, origin authentication data can be received from data supplier, origin authentication data can be data
Supplier carries out what Hash operation obtained to the data of storage location to be deposited, specific hash algorithm can refer to it is described previously,
This will not be repeated here.
Service for checking credentials subelement 123 can obtain initial data from storage location in data trade, to the original got
Beginning data carry out Hash operation, relatively the front and back cryptographic Hash that Hash operation generates twice, determine the acquisition from storage location with this
Initial data authenticity.
If the cryptographic Hash that comparison result determines that Hash operation obtains twice is consistent, from the initial data of storage location acquisition
It for unmodified or not deleted data, is then verified, however, it is determined that the cryptographic Hash that Hash operation obtains twice is inconsistent, then from depositing
The initial data of storage position acquisition is the data after increasing or modify or deleting, then verifies and do not pass through.
The corresponding initial data of transaction data is obtained by service for checking credentials subelement, verifying is called tests described in subelement calling
Card service subelement verifies the initial data, and after being verified, triggering transaction data is generated described in subelement generation
Transaction data can promote the validity of the transaction data of generation, can promote the successful probability of data trade, it is possible to reduce be
The waste for resource of uniting.
In specific implementation, initial data can be data packet, and service for checking credentials subelement 123 can be obtained from data supplier
Take the origin authentication data of data packet.It may include foregoing index data, verify data and encryption number in data packet
According to.Data supplier, which increases the initial data or modifies or delete can be, carries out the partial data in data packet
Increase or be deleted or modified, for example, encryption data can be deleted only, or only deletes index data, in other embodiments,
It can be and delete entire data packet.
In specific implementation, it has been uploaded to block chain 22 for verifying the verify data of encryption data authenticity, be uploaded to
The verify data of block chain 22 not can increase or delete or changes, and the verify data and storage location for being uploaded to block chain 22 store
Data there are incidence relations.If the data that data supplier stores storage location increase or are deleted or modified, area
The incidence relation for the data that verify data on block chain 22 is stored with storage location will change, and data service system 10 can be with
By determining that incidence relation changes so that it is determined that the data of storage location are by increasing or deleting or changing operation, Jin Erke
To terminate transaction.
In specific implementation, the transaction data generates subelement 121, can be configured as and connects to from the user terminal 21
The data received are encrypted, and transaction data is generated.
As previously mentioned, data supplier is different, the data obtained from the user terminal 21 of data supplier are different.Specific real
Shi Zhong, transaction data generate subelement 121 and can encrypt to the data obtained from data supplier, for example, data are supplied
The data that the user terminal 21 of side obtains are clear data, transaction data generate subelement 121 can to the clear data of acquisition into
Row cryptographic calculation generates the encryption data of corresponding clear data.
In specific implementation, carrying out cryptographic calculation to the clear data of acquisition can be using asymmetric encryption to being stated clearly
Literary data carry out cryptographic calculation.For example, algorithm involved in asymmetric encryption operation can be RSA Algorithm, Elgamal algorithm,
Knapsack algorithm, Rabin algorithm, D-H algorithm, ECC (Error Correcting Code, elliptic curve encryption algorithm) etc., specifically
The selection of Encryption Algorithm is herein with no restrictions.In other embodiments, it is also possible to other cipher modes.
Subelement is generated by transaction data, cryptographic calculation is carried out to the data obtained from data supplier, generate encryption number
According to, can to avoid when lacking decruption key data the safety of data trade is enhanced by improper acquisition.
In specific implementation, transaction data generates subelement 121, can be to the encrypted encryption number of the clear data of acquisition
According to re-encryption is carried out, corresponding transaction data is generated.Or the data that the user terminal 21 of data supplier obtains have been to carry out
Encrypted encryption data, transaction data generates subelement 121 can the information of supplier and the number based on the data
According to the information of party in request, re-encryption is carried out to the encryption data, to generate corresponding transaction data.
Wherein, the information of the data supplier and the information of the data requirements side can be corresponding data re-encryption
Encryption key information, the re-encrypted private key can private key and data requirements side based on data supplier public key it is raw
At.In specific implementation, it is respectively right to can use preset public private key pair generator generation for data supplier and data party in request
The public private key pair answered.The public private key pair generator can be realized by software mode, or offline hardware keys are raw
At tool.
In specific implementation, encryption data is to carry out encrypted data by the public key of data supplier, when data supply
When establishing order, data requirements side can be sent by data service system 10 to data supplier for the data requirements side Ying Fangyu
The public key of itself, data supplier can generate re-encrypted private key based on the private key of itself and the public key of the data requirements side.
In specific implementation, after generating the re-encrypted private key, the re-encrypted private key of generation can be verified, it can be with
The re-encrypted private key is verified using various ways.In order to avoid verification process leads to Key Exposure, zero can be used
Knowledge proof mode is verified.In other embodiments, when being verified to the re-encrypted private key, can also using pair
The timestamp of the re-encrypted private key is verified, alternatively, can also be verified with the mode of digital signature.
One in the specific implementation, being verified by zero-knowledge proof mode to re-encrypted private key, specific verification mode with
Under will be described in detail in conjunction with Fig. 3.
In specific implementation, the available data supplier of the acquisition module 311 of re-encrypted private key authentication unit 31
The public key of public private key pair generator 32, the public key of data requirements side's public private key pair generator 33 and the re-encrypted private key
Fixed length random number.Wherein, the fixed length random number can be character string, number or both combination, can using it is preset with
The fixed length random number of the generation re-encrypted private key of machine number generator 34.
Further, the public key of the data supplier, the public key of the data requirements side and institute are obtained in acquisition module 311
After the fixed length random number for stating re-encrypted private key, by the public key by splicing module 312 to the data supplier, data requirements side
Public key and the fixed length random number of re-encrypted private key spliced, obtain splicing value.
In specific implementation, splicing module 312 can public key according to preset sequence to data supplier, data requirements
The public key of side and the fixed length random number of re-encrypted private key are spliced, or are also possible to be conducive to test re-encrypted private key
The mode of card is spliced, and is not particularly limited to this.
In specific implementation, after obtaining the splicing value by the splicing module 312, the first Hash operation can be passed through
Module 313 carries out Hash operation to the splicing value, obtains the cryptographic Hash for corresponding to the splicing value, for example, can be using default
Hash algorithm to the splicing value carry out Hash calculation, obtain the cryptographic Hash of the splicing value, be specifically referred to institute above
It states, this is not repeated them here.
In specific implementation, the Kazakhstan for the splicing value that first Hash operation module 313 can be generated by contrast module 315
Uncommon value with and the cryptographic Hash of re-encrypted private key of the second hash generation module 314 generation compare, verify the splicing value
Cryptographic Hash it is whether consistent with the cryptographic Hash of the re-encrypted private key, so that it is determined that whether re-encrypted private key correct.
In specific implementation, if verification result is consistent, it is determined that the re-encrypted private key is correct, if verification result is different
It causes, it is determined that the re-encrypted private key mistake.
Pass through the fixed length random number to the public key of data supplier of acquisition, the public key of data requirements side and re-encrypted private key
Spliced, then the cryptographic Hash of splicing value is obtained by Hash calculation, compares the cryptographic Hash of re-encrypted private key and the Kazakhstan of splicing value
Whether uncommon value is consistent, is verified as a result, therefore can guarantee the safety of data trade.
In specific implementation, to further increase verification efficiency, the public affairs that module 311 obtains the data supplier are obtained
Before the fixed length random number of key, the public key of the data requirements side and the re-encrypted private key, re-encrypted private key can also be passed through
Total length authentication module 316 verifies the total length of re-encrypted private key, determine the re-encrypted private key total length whether
For preset length value.
In specific implementation, the preset length value of re-encrypted private key is fixed, by verifying the re-encrypted private key
Whether total length is preset length value, can determine whether to continue to execute according to verification result, can save system resource.
For example, the preset length value of re-encrypted private key is 56, if the total length of verifying re-encrypted private key is 64, weigh
Encryption key authentication failed returns verification result to data supplier.If verifying the total length of re-encrypted private key and presetting length
Degree is consistent, then re-encrypted private key is proved to be successful, and can obtain the public key of the data supplier, the public key of the data requirements side
With the fixed length random number of the re-encrypted private key, to carry out the subsequent authentication process of re-encrypted private key.
It is random in the public key for the public key, data requirements side for obtaining the data supplier and the fixed length of the re-encrypted private key
Before number, the total length of re-encrypted private key is verified, can determine whether to continue re-encryption based on verification result close
The verifying of key can be improved verification efficiency, and can reduce system resource waste.
In specific implementation, re-encrypted private key can also be verified using other modes.For example, can be added with counterweight
The timestamp of key is verified, and whether the particular point in time verified when generating re-encrypted private key is preset time point.Alternatively,
Re-encrypted private key can be verified with the mode of digital signature, whether verifying abstract is default abstract.
In the present invention one in the specific implementation, the verification result of the re-encryption key is correct, then the re-encryption is used
Encryption data described in key pair carries out re-encryption, generates encryption data.
After data requirements side obtains the transaction data, it can be generated based on data requirements side's public private key pair generator 33
The transaction data is decrypted in private key, to obtain the clear data of the transaction data.
Re-encrypted private key is generated by the private key of public key and data requirements side using data supplier, and described in utilization
Re-encrypted private key encrypts the encryption data, so as to be that the transaction data generated only has the private key of data requirements side
It can be decrypted, the safety of data trade can be promoted.
The present invention it is another in the specific implementation, the re-encrypted private key verification result mistake, then to data supplier send out
Verification result is sent, so that the data supplier retransmits re-encrypted private key.In specific implementation, re-encrypted private key is tested
Card, when verification result is mistake, alternatively, Xiang Suoshu data supplier sends verification result, so that described
Data supplier retransmits re-encrypted private key to continue to complete transaction.
In specific implementation, if data supplier thinks that the re-encrypted private key of oneself is correct, institute can be sent again
State re-encrypted private key.If data supplier has found that the re-encrypted private key of oneself is mistake, a new weight can be regenerated
Encryption key is simultaneously sent again.
By transmitting verification result to data supplier, data supplier can be made to learn that transaction is interrupted in time
Reason, and suitable processing scheme is selected, the efficiency of data trade can be improved.
It continues to refer to figure 1, in specific implementation, data service unit 12 may include security service subelement, can be by
It is configured to login username, the password of management data supplier and data requirements side, user authority management can also be carried out.?
In specific implementation, proxy re-encryption can also generate subelement 121 by transaction data and security service subelement is called to carry out.
In specific implementation, the transaction data of generation can store in the database of data service system 10, transaction data
Data requirements side can be given to by multi-exchange mode.
For example, it may be generating the storage address of fixed time limit, and the transaction data is stored to the storage address,
Data service system 10, which is issued by forms such as mail or short messages to data requirements side, to be stored the data of the transaction data and deposits
Address is stored up, so that the available transaction data in data requirements side.
Transaction data generates the subelement information of supplier and the information of the data requirements side based on the data, right
It is encrypted from the data received as the data supplier, can make to generate encryption data with specific aim, number of deals
According to the data supplier is corresponded only to data requirements side, the safety of data trade can be promoted.
In conjunction with reference Fig. 1 and Fig. 4, in the present invention one in the specific implementation, the data service system 10 (shown in Fig. 1) may be used also
To include: data analysis service unit 40, the data analysis service unit 40 may include:
Demand information receiving subelement 41 is analyzed, is configured as receiving analysis demand information from user's end interface 111,
Analysis demand of the analysis demand information instruction to data;
Computation subunit 42 is configured as being received according to the analysis demand information to from user's end interface 111
Data carry out analytical calculation obtain analysis result;
Analyze result and return to subelement 43, be configured as returning by user's end interface 111 the analysis result with
Respond the analysis demand information.
Wherein, analysis demand information can be user to the analysis demand of data, can be in big data neck to a large amount of
The statistical analysis demand of data, wherein may include specific analysis parameter and index.For example, it may be insurance company is to driving
The analysis demand information of behavior is sailed, wherein may include the classification to driving behavior, and the analysis indexes of different driving behaviors
Deng.
The computing object of computation subunit 42 can be the data received from user's end interface 111, can be history number
According to or real time data.It can specifically be calculated in many ways, such as Secure calculating (Multi- can be carried out
Party Computation, MPC), call distributed computing unit, without trusting relationship between each distributed computing unit,
In this way, calculating speed can be promoted, it is more applicable for big data analysis.
Computation subunit 42 can calculate the data encrypted by the way of homomorphic cryptography.It is supplied from data
The data just obtained can be homomorphic cryptography data, by analyzing homomorphism data, can protect data-privacy.
To more fully understand those skilled in the art and realizing the embodiment of the present invention, below in conjunction with Fig. 5 and Fig. 6, pass through
The process for spreading process and data trade of data is described in detail in specific application scenarios.
With reference to Fig. 5, in one kind in the specific implementation, the data that data supplier provides are acquired by transacter 51,
For example, it may be the sensor 511 by transacter 51 acquires, by taking car data as an example, the voltage that can be vehicle is passed
Sensor, tyre pressure sensor etc..
In specific implementation, transacter 51 can carry out Hash to the data of acquisition after collecting data
Operation generates corresponding verify data, and generates the index data of the data of the corresponding acquisition.
In specific implementation, the encryption chip 512 of data acquisition device 51 can carry out the data that sensor 511 acquires
Encryption, to obtain encryption data.
For example, it may be encrypting by data of the rivest, shamir, adelman to acquisition, it is specifically referred to institute above
It states, this will not be repeated here.
In other embodiments, the data that sensor 511 acquires can also directly be uploaded to data service system, pass through number
The encryption of data is carried out according to service system and generates index data.
In specific implementation, it after generating the encryption data, index data and verify data, can be supplied according to data
The requirement for the side of answering stores data to specified position.
For example, can store to the database 513 of acquisition device 51, or it can be transmitted and be uploaded by transmission module 514
To gateway 521, data pick-up is carried out by the buffering of data queue 522 and data extraction module 523 of data processing unit 52
Afterwards, by storage adapter 53, the storage location 54 specified to data supplier is stored.
Data can buffer data by data extraction module 523 by the temporary and buffering of data queue 522
Data carry out data processing.
For example, data dimension extension can be carried out to the index data that data supplier uploads, alternatively, on data supplier
What is passed is clear data, can be encrypted to clear data, and carries out data pick-up, generates index data, alternatively, can be with
The data of cloud third party downloading are parsed, to obtain the data for data service system.
As previously mentioned, storage can be passed through by data queue 522 and data processing module 523 treated data
Adapter 53 stores the storage location 54 specified to data supplier.
For example, can be according to the storage demand of data supplier, by being deposited with what decentralization storing data library 542 was docked
Adapter 53 is stored up, the data for being uploaded to data service system are stored to the memory node of decentralization database 542, such as
The memory node of IPFS, alternatively, the data of upload are stored to centralization database 541 etc..
In specific implementation, storing to the data of storage location 54 can shift according to the storage demand of data supplier
To other databases.
For example, data are stored to centralization database 541, storage can be passed through based on the storage demand of data supplier
Adapter 53 will store to the data of centralization database 541 and be transferred to data supplier, such as vehicle intelligent terminal 543, or
Person stores to the memory node etc. of decentralization database 542.
It should be noted that herein by way of example only, not to the limitation of storage mode and storage location 54.
In specific implementation, data service system can be incited somebody to action after data supplier acquisition data by block chain interface
The verify data of acquisition is uploaded to block chain 56.
Specifically, requirement of the block chain 56 to data format and communication mode can be determined by block chain adapter 55,
Carried out data transmission by the block chain interface and the block chain 56, for example, being transmitted to ETH or EOS or ONT.
In specific implementation, obtaining data from data supplier by transmission module 514 can also include obtaining from data side
Take the origin authentication data of data to be stored.
For example, the data to be stored obtained from data side is data packet, data packet may include verify data, index number
According to and at least one of encryption data, then origin authentication data can be data of the data packet after Hash.The original of acquisition
Beginning verify data is stored in data service system.
In specific implementation, the circulation of data trade is controlled by running on the intelligent contract of block chain 56.Intelligent contract
The intelligent contract template generation provided by intelligent bond service subelement based on intelligent contract template database, the intelligence of generation
Contract is affixed one's name to by block chain interface portion to corresponding block chain 56.It should be noted that block chain 56 described herein can be Fig. 2
Described in block chain 22
With reference to Fig. 6, in a kind of specific operation flow, specific business is maintenance business, intelligent contract template library
The 61 intelligent contract templates provided are the intelligent contract template of corresponding maintenance, and intelligent contract generation module 62 is based on maintenance and protects
It supports business need and maintains intelligent contract template generation and maintain intelligent contract.
Requirement of the intelligent contract to block chain 56 that the intelligent contract of generation can be determined according to intelligent contract adapter 63,
Intelligent contract is deployed to corresponding block chain 56 by block chain interface.
For example, the intelligent contract generated is the intelligent contract of corresponding ETH, then pass through block chain interface for the intelligent contract
It is deployed to ETH, if the intelligent contract generated is the intelligent contract of corresponding EOS, passes through block chain interface for the intelligent contract
It is deployed to EOS.
In specific implementation, the transaction amount payment etc. of the order cochain of data trade, data trade is linked by block
Mouth realizes the calling for the intelligent contract for being deployed to block chain 56.
For example, when generating trade order, it can be by the intelligent contract of block chain interface call area block chain 56, to execute friendship
Easy order places an order, and when data trade carries out transaction amount payment, the payment of transaction amount can be controlled by intelligent contract.
For the process of data trade, citing is carried out below and is further detailed.
With continued reference to Fig. 5, in specific implementation, data requirements side can be deposited based on block chain 56 or data service system
The index data of storage carries out data search, for example, the index data stored by search service subelement to data service system
Data search is carried out, determines the data for needing to buy.
After data requirements side determines the data searched by search service subelement, is called and disposed by block chain interface
Trade order is generated to the intelligent contract of block chain 56 to place an order to the data searched.In specific implementation, data
Supplier can be multiple, and the trade order of generation can be the trade order of corresponding multiple data suppliers.
Trade order of the data service system based on generation, by way of mail or short message, request data supplier
Carry out data trade.In specific implementation, when data supplier is multiple, data service system issues request data transaction can be with
It is that data trade request is issued to multiple data suppliers respectively, for example, by forms such as mail or short messages respectively to multiple
Data supplier issues data trade request.
Further, based on data supplier to the confirmation operation of data transaction request, data service system is based on uploading
Verify data, obtain the data packet that storage location 54 stores, and the data packet of acquisition verified.
For example, Hash operation can be carried out to the data packet that storage location 54 obtains, package verification data is generated, is passed through
Data checking module 57 is compared package verification data and pre-stored origin authentication data, stores position to determine
It sets 54 data whether to increase or delete or change, and then determines whether data trade continues to execute.
In one kind in the specific implementation, if package verification data and pre-stored origin authentication data are inconsistent,
The data of storage location can be determined by increasing or being deleted or modified, then data service system can terminate data trade.
In another kind in the specific implementation, if determining that the data packet that data supplier obtains is not by data checking module 57
The data for increasing or modifying or deleting, then data trade can continue to execute, it can pass through transaction data and generate subelement 58
Re-encryption is carried out to the encryption data of acquisition, to obtain transaction data.The transaction data generates the specific implementation of subelement 58,
And the specific implementation of other units, it may refer to described previously.
In specific implementation, the encryption key for carrying out re-encryption to encryption data can be raw by the equipment of data supplier
At specifically, the private key and data requirements side's key pair generator that can be generated based on data supplier's key pair generator
The public key of generation generates re-encrypted private key.Wherein, the public key that data supplier obtains data requirements side can pass through data service
System obtains, alternatively, can also be transmitted directly to data supplier by data requirements side.
In specific implementation, the re-encrypted private key of generation can be uploaded to key management module 581, for re-encryption module
The encryption data that 582 pairs of storage locations 54 obtain carries out use when re-encryption, to generate transaction data.
In specific implementation, data service system may include one or more in each unit above-mentioned, with full
The needs of sufficient different scenes.
Data service system in the embodiment of the present invention is provided arranged to carry out with user terminal by interface service unit
User's end interface of data interaction, and circulation service unit are provided arranged to the block chain carried out data transmission with block chain
Interface runs on the intelligent contract of block chain to stream compression by circulation Row control subelement triggering in circulation service unit
Process controlled, so as to provide data service for multifarious stream compression demand, so that each side of stream compression
Can through the embodiment of the present invention in data service system complete stream compression.
Although present disclosure is as above, present invention is not limited to this.Anyone skilled in the art are not departing from this
It in the spirit and scope of invention, can make various changes or modifications, therefore protection scope of the present invention should be with claim institute
Subject to the range of restriction.
Claims (15)
1. a kind of data service system characterized by comprising
Interface service unit, the interface service unit include the user's termination for being configured as carrying out data interaction with user terminal
Mouthful;
Circulate service unit, is configured to supply stream compression service, including be configured as carrying out data transmission with block chain
Block chain interface, and circulation Row control subelement, the circulation Row control subelement are configured as through the block
Chain interface, which triggers, runs on the intelligent contract of block chain, controls stream compression process, the stream compression process with from
Based on the data that the user terminal interface arrives.
2. data service system according to claim 1, which is characterized in that user's end interface be configured as receiving into
The business demand information of the row stream compression, the circulation service unit further include: intelligent bond service subelement is configured
To provide intelligent contract template by user's end interface according to the business demand information, it is based on from user's end interface
The determining intelligent contract to match with the business demand information of the response message of acquisition.
3. data service system according to claim 2, which is characterized in that the business demand information includes target block
The information of chain, the block chain interface are configured as supporting the deployment intelligent contract to the target block chain.
4. data service system according to claim 1, which is characterized in that the circulation service unit further include: adaptation
Device, the adapter are configured as the requirement according to the block chain to data format and communication mode, pass through the block chain
Interface carries out data transmission with the block chain.
5. data service system according to claim 4, which is characterized in that the adapter is configured as converting from described
The data that user terminal receives are to meet the data format of the block chain requirement.
6. data service system according to claim 1, which is characterized in that further include:
Data service unit is configured to supply data processing service, including transaction data generates subelement, the transaction data
Subelement is generated to be configured as generating the number of deals for supporting data trade based on the data arrived by the user terminal interface
According to;
The circulation service unit is configured as carrying out the transaction data control of data trade process.
7. data service system according to claim 6, which is characterized in that user's end interface is configured as and data
Supplier and data requirements side carry out data interaction, the data service unit further include: are configured as according to from as institute
The data generation index data that the user terminal of data supplier receives is stated, the user terminal search of the data requirements side is provided as
Search service subelement.
8. data service system according to claim 7, which is characterized in that the circulation Row control subelement is matched
The confirmation of the search result provided according to the user terminal as the data requirements side described search service subelement is provided, is led to
Cross the intelligent contract that the block chain interface triggering runs on the block chain.
9. data service system according to claim 6, which is characterized in that the data service unit further include: storage
Adapter is configured as determining the data storage location during the data trade by user's end interface.
10. data service system according to claim 6, which is characterized in that user's end interface is configured as and number
Data interaction, the data service unit further include: data cochain subelement is matched are carried out according to supplier and data requirements side
It is set to according to the data acquisition verify data provided by user's end interface from the data supplier, passes through the block
The verify data cochain, the verify data are carried out the verifying of the transaction data for the data requirements side by chain interface.
11. data service system according to claim 6, which is characterized in that the data service unit further includes verifying
Subelement is serviced, is configured as obtaining the corresponding initial data of the transaction data, the initial data is verified;It is described
Circulate service unit further include: subelement is called in verifying, is configured as calling the service for checking credentials subelement to the original number
According to being verified, after being verified, triggers the transaction data and generate the subelement generation transaction data.
12. data service system according to claim 6, which is characterized in that the transaction data generates subelement, is matched
It is set to and the data received from the user terminal is encrypted, generate the transaction data.
13. data service system according to claim 6, which is characterized in that user's end interface is configured as and number
Data interaction is carried out according to supplier and data requirements side, the transaction data generates subelement, is configured as based on the number
According to the information of supplier and the information of the data requirements side, carried out to from the data received as the data supplier
Encryption.
14. data service system according to claim 1, which is characterized in that further include: data analysis service unit, institute
Stating data analysis service unit includes:
Demand information receiving subelement is analyzed, is configured as analyzing demand information, the analysis from the user terminal interface
Demand information indicates the analysis demand to data;
Computation subunit, be configured as according to it is described analysis demand information to from the user terminal interface to data carry out
Analytical calculation obtains analysis result;
It analyzes result and returns to subelement, be configured as returning to the analysis result by user's end interface to respond described point
Analyse demand information.
15. data service system according to claim 14, which is characterized in that from the user terminal interface to number
According to the homomorphic cryptography data to be encrypted in a manner of homomorphic cryptography, the computation subunit is configured as adding the homomorphism
Ciphertext data carries out analytical calculation.
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811613014.5A CN109754322A (en) | 2018-12-27 | 2018-12-27 | A kind of data service system |
US16/366,043 US10459990B1 (en) | 2018-12-27 | 2019-03-27 | Data processing method and device, medium and terminal thereof |
US16/409,822 US11546348B2 (en) | 2018-12-27 | 2019-05-12 | Data service system |
US16/726,777 US10725744B2 (en) | 2018-12-27 | 2019-12-24 | Method for adapting to blockchain and device, terminal and medium performing the same |
US16/746,868 US11509637B2 (en) | 2018-12-27 | 2020-01-18 | Data transmission method, system and platform using blockchain, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811613014.5A CN109754322A (en) | 2018-12-27 | 2018-12-27 | A kind of data service system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109754322A true CN109754322A (en) | 2019-05-14 |
Family
ID=66403971
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811613014.5A Pending CN109754322A (en) | 2018-12-27 | 2018-12-27 | A kind of data service system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109754322A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309813A (en) * | 2020-03-17 | 2020-06-19 | 北京百度网讯科技有限公司 | Information processing method, device, equipment and storage medium in data circulation |
CN112688845A (en) * | 2020-12-23 | 2021-04-20 | 北京天融信网络安全技术有限公司 | Communication method and device of vehicle-mounted CAN network |
WO2021223104A1 (en) * | 2020-05-06 | 2021-11-11 | 云图技术有限公司 | System testing method and apparatus |
CN113824757A (en) * | 2020-12-23 | 2021-12-21 | 京东科技控股股份有限公司 | Data acquisition method, system and computer readable storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106484836A (en) * | 2016-09-30 | 2017-03-08 | 深圳市华傲数据技术有限公司 | Data processing method based on block chain technology and system |
CN106651346A (en) * | 2016-11-28 | 2017-05-10 | 上海凯岸信息科技有限公司 | Block chain-based credit investigation data sharing and trading system |
CN108009646A (en) * | 2017-11-30 | 2018-05-08 | 深圳市轱辘车联数据技术有限公司 | Vehicle data processing method and server |
CN108650073A (en) * | 2018-05-07 | 2018-10-12 | 浙江工商大学 | A kind of secret protection price competing method based on block chain |
CN108830601A (en) * | 2018-06-25 | 2018-11-16 | 上海延华大数据科技有限公司 | Smart city information security application method and system based on block chain |
CN108920514A (en) * | 2018-05-31 | 2018-11-30 | 百度在线网络技术(北京)有限公司 | A kind of information storage means based on block chain, device, equipment and storage medium |
CN108989357A (en) * | 2018-09-12 | 2018-12-11 | 中国人民解放军国防科技大学 | User authorization and data sharing access control method based on block chain |
CN109002349A (en) * | 2018-06-25 | 2018-12-14 | 百度在线网络技术(北京)有限公司 | Application program exchange method, implementation method, device, equipment and medium |
-
2018
- 2018-12-27 CN CN201811613014.5A patent/CN109754322A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106484836A (en) * | 2016-09-30 | 2017-03-08 | 深圳市华傲数据技术有限公司 | Data processing method based on block chain technology and system |
CN106651346A (en) * | 2016-11-28 | 2017-05-10 | 上海凯岸信息科技有限公司 | Block chain-based credit investigation data sharing and trading system |
CN108009646A (en) * | 2017-11-30 | 2018-05-08 | 深圳市轱辘车联数据技术有限公司 | Vehicle data processing method and server |
CN108650073A (en) * | 2018-05-07 | 2018-10-12 | 浙江工商大学 | A kind of secret protection price competing method based on block chain |
CN108920514A (en) * | 2018-05-31 | 2018-11-30 | 百度在线网络技术(北京)有限公司 | A kind of information storage means based on block chain, device, equipment and storage medium |
CN108830601A (en) * | 2018-06-25 | 2018-11-16 | 上海延华大数据科技有限公司 | Smart city information security application method and system based on block chain |
CN109002349A (en) * | 2018-06-25 | 2018-12-14 | 百度在线网络技术(北京)有限公司 | Application program exchange method, implementation method, device, equipment and medium |
CN108989357A (en) * | 2018-09-12 | 2018-12-11 | 中国人民解放军国防科技大学 | User authorization and data sharing access control method based on block chain |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309813A (en) * | 2020-03-17 | 2020-06-19 | 北京百度网讯科技有限公司 | Information processing method, device, equipment and storage medium in data circulation |
CN111309813B (en) * | 2020-03-17 | 2023-08-29 | 北京百度网讯科技有限公司 | Method, device, equipment and storage medium for processing information in data circulation |
WO2021223104A1 (en) * | 2020-05-06 | 2021-11-11 | 云图技术有限公司 | System testing method and apparatus |
CN112688845A (en) * | 2020-12-23 | 2021-04-20 | 北京天融信网络安全技术有限公司 | Communication method and device of vehicle-mounted CAN network |
CN113824757A (en) * | 2020-12-23 | 2021-12-21 | 京东科技控股股份有限公司 | Data acquisition method, system and computer readable storage medium |
CN113824757B (en) * | 2020-12-23 | 2024-05-21 | 京东科技控股股份有限公司 | Data acquisition method, system and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10880732B2 (en) | Authentication of phone caller identity | |
US10104074B2 (en) | Independent biometric identification system | |
CN108989346B (en) | Third-party valid identity escrow agile authentication access method based on account hiding | |
US11546348B2 (en) | Data service system | |
CN109754322A (en) | A kind of data service system | |
CN109460966A (en) | Contract signing method, apparatus and terminal device based on requesting party's classification | |
CN104283688B (en) | A kind of USBKey security certification systems and safety certifying method | |
CN110096944A (en) | A kind of signature method, system and the terminal device of electronic contract | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
CN112613076B (en) | Privacy-protecting multi-party data processing method, device and system | |
CN110597836B (en) | Information inquiry request response method and device based on block chain network | |
CN109981287A (en) | A kind of code signature method and its storage medium | |
CN112016075B (en) | Travel information verification method based on block chain, electronic device and medium | |
US20190288833A1 (en) | System and Method for Securing Private Keys Behind a Biometric Authentication Gateway | |
CN1753569B (en) | System and method for treating mobile communication data business based on false code | |
CN116502732B (en) | Federal learning method and system based on trusted execution environment | |
CN113239401A (en) | Big data analysis system and method based on power Internet of things and computer storage medium | |
US20200145412A1 (en) | System and method for platform-independent biometrically verified secure information transfer and access control | |
Yang et al. | Accountable and verifiable secure aggregation for federated learning in IoT networks | |
US11741215B1 (en) | Recipient credentialing leveraging private keys on keystores read by provisioned devices | |
CN201717885U (en) | Code providing equipment and code identification system | |
CN105743859B (en) | A kind of method, apparatus and system of light application certification | |
CN110266641A (en) | Information-reading method and device | |
CN113328860A (en) | Block chain-based user privacy data security providing method | |
CN115529170B (en) | Reputation management method based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190514 |