CN109977687A - Data sharing method, device, system and readable storage medium storing program for executing based on block chain - Google Patents

Data sharing method, device, system and readable storage medium storing program for executing based on block chain Download PDF

Info

Publication number
CN109977687A
CN109977687A CN201910263993.4A CN201910263993A CN109977687A CN 109977687 A CN109977687 A CN 109977687A CN 201910263993 A CN201910263993 A CN 201910263993A CN 109977687 A CN109977687 A CN 109977687A
Authority
CN
China
Prior art keywords
data
node
change
sharing
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910263993.4A
Other languages
Chinese (zh)
Inventor
万麟
袁丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhi Qian Block Chain Science And Technology Co Ltd
Original Assignee
Shenzhen Zhi Qian Block Chain Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhi Qian Block Chain Science And Technology Co Ltd filed Critical Shenzhen Zhi Qian Block Chain Science And Technology Co Ltd
Priority to CN201910263993.4A priority Critical patent/CN109977687A/en
Publication of CN109977687A publication Critical patent/CN109977687A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of data sharing methods based on block chain, and the method comprising the steps of: monitoring whether the first node in the data-sharing systems occurs altering event;If so, determining change type belonging to the altering event;If it is determined that the change type is data change, then change data corresponding to the altering event encrypt, and obtain change encryption data;The change encryption data is broadcasted into the second node into the data-sharing systems, completes data synchronization updating so that the second node is based on the change encryption data.The invention also discloses a kind of data sharing device based on block chain, system and readable storage medium storing program for executing.The present invention by first determining change type, then encrypts corresponding change data when monitoring that altering event occurs for node, give the change data broadcasting of encryption to other nodes again, it while realizing data sharing, guarantees data security, improves the intelligence of data sharing.

Description

Data sharing method, device, system and readable storage medium storing program for executing based on block chain
Technical field
The present invention relates to data sharing technology field more particularly to a kind of data sharing method based on block chain, device, System and readable storage medium storing program for executing.
Background technique
In government affairs department, due to the particularity of function, the intersection of each few data of department, so that the public is handling phase It is very inconvenient when the business of pass, it generally requires to repeat to submit in different departments with portion material, wastes the energy of the public, together When for entire government system, the data retained also more redundancy, is unfavorable for keeping and achieves.
Based on the purpose, current way is to establish data sharing channel, realizes interdepartmental data sharing Guarantee that the public has submitted relevant data such as Copy of ID Card in a certain department, it is identical there is no need to submit in another department Data.
But there is also drawbacks for current data sharing, data are in transmission and dangerous, are easy to be intercepted by people, cause to count According to outflow, hence it is evident that not smart enough.
Summary of the invention
It is a primary object of the present invention to propose a kind of data sharing method based on block chain, device, system and calculating Machine readable storage medium storing program for executing, it is intended to solve existing data sharing mode technical problem not smart enough.
To achieve the above object, the present invention provides a kind of data sharing methods based on block chain, described to be based on block The data sharing method of chain is applied to data-sharing systems, and the data sharing method based on block chain includes:
Monitor whether the first node in the data-sharing systems occurs altering event;
If so, determining change type belonging to the altering event;
If it is determined that the change type is data change, then change data corresponding to the altering event encrypt, Obtain change encryption data;
The change encryption data is broadcasted into the second node into the data-sharing systems, for the second node Data synchronization updating is completed based on the change encryption data.
Preferably, described if it is determined that the change type be data change, then to the corresponding change number of the altering event According to being encrypted, obtain change encryption data the step of include:
If it is determined that the change type is data change, then the corresponding public key of the second node is obtained;
Based on the public key, change data corresponding to the altering event are encrypted, and obtain change encryption data.
Preferably, described that the change encryption data is broadcasted into the second node into the data-sharing systems, for The second node be based on the change encryption data completion data synchronization updating the step of include:
The change encryption data is broadcasted into the second node into the data-sharing systems, for the second node Data synchronization updating is completed based on the change encryption data;
Wherein, the second node is decrypted the change encryption data using corresponding private key, obtains the change More data;
The second node is based on common recognition algorithm and carries out common recognition operation to the change data, and account is written in operation result In this, data synchronization updating is completed.
Preferably, described if so, the method is also after the step of determining change type belonging to the altering event Include:
If it is determined that the change type is version change, then the corresponding version number of the altering event is obtained;
The version number is broadcasted to the second node, so that the second node is based on the version number to described the The version of two nodes synchronizes upgrading.
Preferably, the method also includes:
When detecting the access of third node, the corresponding access public key of the third node is obtained;
Based on the access public key, the corresponding data of node all in the data-sharing systems are encrypted, are obtained To access encryption data;
The access encryption data is broadcasted to the third node, so that the third node is encrypted based on the access Data complete data synchronization updating.
Preferably, described when detecting the access of third node, obtain the step of the corresponding access public key of the third node Suddenly include:
When detecting the access of third node, judge whether the third node is sky node;
If so, obtaining the corresponding access public key of the third node.
Preferably, described when detecting the access of third node, the step of whether the third node is sky node judged Later, the method also includes:
If it is determined that the third node is non-empty node, then the corresponding access public key of the third node, and number are obtained According to the corresponding public public key of shared system;
Based on the access public key, the corresponding data of node all in the data-sharing systems are encrypted, are obtained To access encryption data;
Based on the public public key, the corresponding data of the third node are encrypted, obtain newly-increased encryption data;
The access encryption data is broadcasted to the third node, so that the third node is encrypted based on the access Data complete data synchronization updating;
The newly-increased encryption data is broadcasted into the node all into the data-sharing systems, for the data sharing All nodes are based on the newly-increased encryption data and complete data synchronization updating in system.
In addition, to achieve the above object, it is described to be based on the present invention also provides a kind of data sharing device based on block chain The data sharing device of block chain includes:
Whether monitoring modular, the first node for monitoring in the data-sharing systems occur altering event;
Determining module, for if so, determining change type belonging to the altering event;
Encrypting module is used for if it is determined that the change type is data change, then to the corresponding change of the altering event Data are encrypted, and change encryption data is obtained;
Broadcast module, for the change encryption data to be broadcasted the second node into the data-sharing systems, with The change encryption data, which is based on, for the second node completes data synchronization updating.
In addition, to achieve the above object, the present invention also provides a kind of data-sharing systems, the data-sharing systems include Memory, processor and it is stored in the data sharing based on block chain that can be run on the memory and on the processor Program, the step of data sharing method as described above based on block chain is realized when described program is executed by the processor.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium The data sharing program based on block chain is stored on storage medium, the data sharing program based on block chain is by processor The step of data sharing method as described above based on block chain is realized when execution.
Whether data sharing method based on block chain of the invention monitors first node in the data-sharing systems Altering event occurs;If so, determining change type belonging to the altering event;If it is determined that the change type is data change More, then change data corresponding to the altering event encrypt, and obtain change encryption data;By the change encryption data The second node into the data-sharing systems is broadcasted, completes number so that the second node is based on the change encryption data According to synchronized update.The present invention is when monitoring that altering event occurs for node, by first determining change type, then to corresponding change Data are encrypted, then give the change data broadcasting of encryption to other nodes, while realizing data sharing, guarantee data peace Entirely, the intelligence of data sharing is improved.
Detailed description of the invention
Fig. 1 is the structural schematic diagram for the data-sharing systems hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is that the present invention is based on the flow diagrams of the data sharing method first embodiment of block chain;
Fig. 3 is that the present invention is based on the functional block diagrams of the data sharing device first embodiment of block chain.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that described herein, specific examples are only used to explain the present invention, is not intended to limit the present invention.
The solution of the embodiment of the present invention is mainly: monitoring whether the first node in the data-sharing systems occurs Altering event;If so, determining change type belonging to the altering event;If it is determined that the change type is data change, Then change data corresponding to the altering event encrypt, and obtain change encryption data;The change encryption data is wide The second node in the data-sharing systems is cast to, completes data so that the second node is based on the change encryption data Synchronized update.To solve technical problem not smart enough in a manner of existing data sharing.
As shown in Figure 1, Fig. 1 is the structure of the data-sharing systems for the hardware running environment that the embodiment of the present invention is related to Schematic diagram.The data-sharing systems may include: processor 1001, such as CPU, communication bus 1002, owner's interface 1003, net Network interface 1004, memory 1005.Wherein, communication bus 1002 is for realizing the connection communication between these components.Owner connects Mouth 1003 may include display screen (Display), input unit such as keyboard (Keyboard), and optionally owner's interface 1003 is gone back It may include the wireline interface (such as connecting wired keyboard, wire mouse etc.) of standard, wireless interface (such as connecting Wireless Keyboard, wireless mouse).Network interface 1004 optionally may include the wireline interface of standard (for connecting wired network Network), wireless interface (such as WI-FI interface, blue tooth interface, infrared interface, for connecting wireless network).Memory 1005 can To be high speed RAM memory, it is also possible to stable memory (non-volatile memory), such as magnetic disk storage.It deposits Reservoir 1005 optionally can also be the storage device independently of aforementioned processor 1001.
It will be understood by those skilled in the art that structure paired data is not shared for data-sharing systems structure shown in Fig. 1 The restriction of system may include perhaps combining certain components or different component cloth than illustrating more or fewer components It sets.
As shown in Figure 1, as may include operating system, net in a kind of memory 1005 of computer readable storage medium Network communication module, owner's interface module and the data sharing program based on block chain.Wherein, operating system is to manage and control The program of data-sharing systems and software resource supports network communication module, owner's interface module, the data based on block chain total Enjoy the operation of program and other programs or software;Network communication module is for managing and controlling network interface 1002;Owner connects Mouth mold block is for managing and controlling owner's interface 1003.
In data-sharing systems shown in Fig. 1, the data-sharing systems call memory by processor 1001 The data sharing program based on block chain stored in 1005, and execute the data provided in an embodiment of the present invention based on block chain Sharing method.
Based on the hardware configuration of above-mentioned data-sharing systems, propose that the present invention is based on the data sharing method of block chain is each Embodiment.
The present invention provides a kind of data sharing method based on block chain.
Data sharing method based on block chain is optional to be applied in data-sharing systems.
It is that the present invention is based on the flow diagrams of the data sharing method first embodiment of block chain referring to Fig. 2, Fig. 2.
In the present embodiment, the embodiment of the data sharing method based on block chain is provided, it should be noted that although Logical order is shown in flow charts, but in some cases, can be executed with the sequence for being different from herein it is shown or The step of description.
In the present embodiment, the data sharing method based on block chain includes:
Step S10, monitors whether the first node in the data-sharing systems occurs altering event;
Step S20, if so, determining change type belonging to the altering event;
Step S30, however, it is determined that the change type be data change, then change data corresponding to the altering event into Row encryption obtains change encryption data;
The change encryption data is broadcasted the second node into the data-sharing systems, for described by step S40 Second node is based on the change encryption data and completes data synchronization updating.
In the present embodiment, when monitoring that altering event occurs for node, by first determining change type, then to corresponding Change data are encrypted, then give the change data broadcasting of encryption to other nodes, while realizing data sharing, guarantee number According to safety, the intelligence of data sharing is improved.
Each step will be described in detail below:
Step S10, monitors whether the first node in the data-sharing systems occurs altering event.
In the present embodiment, whether the first node in data-sharing systems Real-time Monitoring Data system occurs to change thing Part, wherein node refers to the corresponding back end of each department in data-sharing systems, and first node is data-sharing systems In any one node.
Specifically, the current data of all nodes and version number in data-sharing systems can be obtained, and in this, as basis Data, whether arbitrary node occurs altering event in monitoring data shared system, the corresponding data of specific monitoring node and/or version Whether this number change.When the corresponding data of node any one in data-sharing systems and/or version number change, cause It is different from the basic data got before, all determine that altering event occurs for the node.
Step S20, if so, determining change type belonging to the altering event.
In the present embodiment, altering event is divided into data change and two kinds of version change, and data-sharing systems are determining the After altering event occurs for one node, change type belonging to current altering event need to be further judged, specifically data change, Or version change.Specifically, before this step, data-sharing systems first obtain the corresponding data of all nodes and version number As basic data, after monitoring that altering event occurs for first node, by first node currently corresponding data and version number Data corresponding with first node in basic data and version number are compared, and judge change class belonging to current altering event Type.
Step S30, however, it is determined that the change type be data change, then change data corresponding to the altering event into Row encryption obtains change encryption data.
In the present embodiment, however, it is determined that change type belonging to current altering event is data change, illustrates first segment The corresponding data of point are changed, then obtain the corresponding change data of altering event, and encrypt to change data, obtain Change encryption data.
It should be understood that change data refer to that first node is newly-increased or the data of reduction, therefore to change data When being encrypted, only newly-increased or reduction data are encrypted, without the corresponding data of first node are whole It is encrypted.
Specifically, step S30 includes:
Step S31, however, it is determined that the change type is data change, then obtains the corresponding public key of the second node.
In the present embodiment, change data are encrypted using the rivest, shamir, adelman of block chain, therefore, in determination Change type belonging to current altering event is the corresponding public key of acquisition second node, so as to data sharing system after data change The encryption data that system can just unlock change data encryption at only second node.
Step S32 is based on the public key, and change data corresponding to the altering event encrypt, and obtains change and adds Ciphertext data.
In the present embodiment, data-sharing systems using second node public key change data corresponding to altering event into Row encryption obtains change encryption data, so that the subsequent corresponding private key of change encryption data only second node can just be unlocked, Even if guaranteeing that change encryption data is truncated to by people, data outflow will not be caused.
The change encryption data is broadcasted the second node into the data-sharing systems, for described by step S40 Second node is based on the change encryption data and completes data synchronization updating.
In the present embodiment, after it will change data encryption into change encryption data, change encryption data is broadcasted to number According to the second node in shared system, so that second node completes data synchronization updating according to change encryption data, wherein second Node is all nodes in data-sharing systems in addition to the first node.
Specifically, step S40 includes:
The change encryption data is broadcasted the second node into the data-sharing systems, for described by step S41 Second node is based on the change encryption data and completes data synchronization updating;
Step S42, wherein the second node is decrypted the change encryption data using corresponding private key, obtains To the change data;
Step S43, the second node are based on common recognition algorithm and carry out common recognition operation to the change data, and by operation knot Fruit is written in account book, completes data synchronization updating.
In the present embodiment, data-sharing systems broadcast the second section into data-sharing systems for encryption data is changed Point, second node are decrypted change encryption data after receiving the change encryption data, using corresponding private key, obtain Data are changed, then, second node carries out common recognition operation to change data with common recognition algorithm, and account book is written in operation result In, complete data synchronization updating.
The present embodiment monitors whether the first node in the data-sharing systems occurs altering event;If so, determining Change type belonging to the altering event;If it is determined that the change type is data change, then it is corresponding to the altering event Change data encrypted, obtain change encryption data;The change encryption data is broadcasted to the data-sharing systems In second node, for the second node be based on the change encryption data completion data synchronization updating.The present invention is supervising When measuring node generation altering event, by first determining change type, then corresponding change data are encrypted, then will encryption Change data broadcasting guaranteed data security while realizing data sharing to other nodes, improve the intelligence of data sharing It can property.
Further, propose that the present invention is based on the implementations of the second of the data sharing method of block chain based on first embodiment Example.
The first of the second embodiment of data sharing method based on block chain and the data sharing method based on block chain The difference of embodiment is, the method also includes:
Step S33, however, it is determined that the change type is version change, then obtains the corresponding version number of the altering event;
Step S34 broadcasts the version number to the second node, so that the second node is based on the version number Upgrading is synchronized to the version of the second node.
In the present embodiment, it when change type further includes version change, when determining change type is version change, is not necessarily to Version number is encrypted, directly broadcast to second node, to complete synchronous upgrading.
Each step will be described in detail below:
Step S33, however, it is determined that the change type is version change, then obtains the corresponding version number of the altering event.
In the present embodiment, change type belonging to altering event further includes version change other than data change, when When data-sharing systems determine that change type belonging to current altering event is version change, illustrate the corresponding data of first node Content does not change, and only its corresponding operating system is upgraded, at this point, obtaining the corresponding version of altering event Number.
Step S34 broadcasts the version number to the second node, so that the second node is based on the version number Upgrading is synchronized to the version of the second node.
In the present embodiment, after getting the corresponding version number of altering event, version number is broadcasted to second node, with Upgrading is synchronized according to version of the version number to second node for second node, it is possible to understand that, since version number does not relate to And arrive specific data content, it should not need that it is encrypted, i.e., in the present embodiment, only when current change thing When change type belonging to part is that data change, just need to encrypt corresponding change data;If current altering event institute When the change type of category is version change, do not need to encrypt corresponding version number.
It should be noted that version number can be top version number, it is also possible to lowest version number, top version number represents upgrading, Lowest version number, which represents, to degrade, and such as needs higher operational capability and selects upgraded version, and version number's relative data at this time is shared It is top version number for the basic data got before system;If top version number operation is unstable, when needing degraded running, this When version number's relative data shared system before for the basic data that gets, be lowest version number.
The present embodiment further includes version change when change type, when determining change type is version change, without to version This number is encrypted, directly broadcast to second node, is only data change in current change type to complete synchronous upgrading When, it just needs to encrypt change data, realizes the intellectual determination of data-sharing systems.
Further, propose that the present invention is based on the thirds of the data sharing method of block chain based on the first and second embodiments Embodiment.
The first of the 3rd embodiment of data sharing method based on block chain and the data sharing method based on block chain Difference with second embodiment is, the method also includes:
Step S50 obtains the corresponding access public key of the third node when detecting the access of third node;
Step S60 is based on the access public key, carries out to the corresponding data of node all in the data-sharing systems Encryption obtains access encryption data;
Step S70 broadcasts the access encryption data to the third node, so that the third node is based on described It accesses encryption data and completes data synchronization updating.
The present embodiment is added the corresponding data of nodes all in former data-sharing systems when there is new node access Close, broadcast to the new node makes new node faster incorporate data-sharing systems so that new node is completed data and synchronized In.
Each step will be described in detail below:
Step S50 obtains the corresponding access public key of the third node when detecting the access of third node.
In the present embodiment, when data-sharing systems detect the access of third node, the identity of third node is carried out Verifying, only authentication, specifically, obtaining the corresponding identity information of third node, are sentenced by just third node being allowed to access Whether the identity information that breaks is consistent with preset identity information, if so, third node is allowed to access, wherein preset identity Information is to be recommended jointly by three or more nodes as a result, then, and data-sharing systems obtain that third node is corresponding to be connect Enter public key.
Further, step S50 includes:
Step S51 judges whether the third node is sky node when detecting the access of third node.
It is to judge whether third node is sky node when detecting that third node accesses, wherein empty node refers to the section The corresponding data of point are sky, i.e. the node does not have corresponding data, are an empty nodes.
Step S52, if so, obtaining the corresponding access public key of the third node.
If it is determined that third node is empty node, it is same to illustrate that data-sharing systems do not need the acquisition data from third node It walks on other nodes, then need to only obtain the corresponding access public key of third node.
Step S60 is based on the access public key, carries out to the corresponding data of node all in the data-sharing systems Encryption obtains access encryption data.
Data-sharing systems encrypt the corresponding data of all nodes using access public key, obtain access encryption number According to so that access encryption data only third node can just be unlocked.
Step S70 broadcasts the access encryption data to the third node, so that the third node is based on described It accesses encryption data and completes data synchronization updating.
Then, access encryption data is broadcasted to third node, so that third node is docked using corresponding access private key Enter encryption data to be decrypted, and completes data synchronization updating according to the access data after decryption.
Further, the method also includes:
Step S80, however, it is determined that the third node is non-empty node, then it is public to obtain the corresponding access of the third node Key and the corresponding public public key of data-sharing systems.
If data-sharing systems determine that third node is non-empty node, i.e., the corresponding data of third node are not empty, explanation Third node carries data, and the corresponding data of node all in data-sharing systems are being synchronized to the third node newly accessed Except, it also needs then to obtain third section in other nodes that the included data of third node are synchronized in data-sharing systems The corresponding access public key of point and the corresponding public public key of data-sharing systems, wherein public public key is in data-sharing systems The common public public key of all nodes, also, node all in data-sharing systems has public public key corresponding public Private key.
Step S90 is based on the access public key, carries out to the corresponding data of node all in the data-sharing systems Encryption obtains access encryption data.
Data-sharing systems pass through the access public key that gets, to the corresponding data of nodes all in data-sharing systems into Row encryption obtains access encryption data, so that access encryption data only third node can just be unlocked.
Step S100 is based on the public public key, encrypts, newly increased to the corresponding data of the third node Ciphertext data.
Data-sharing systems pass through the public public key got, encrypt to the corresponding data of third node, obtain new Increase ciphertext data, so that the node in newly-increased encryption data only data-sharing systems can just be unlocked.Other than data-sharing systems Node can not unlock.
Step S110 broadcasts the access encryption data to the third node, so that the third node is based on institute It states access encryption data and completes data synchronization updating.
Data-sharing systems are broadcasted encryption data is accessed to third node, so that third node is private using corresponding access Access encryption data is decrypted in key, obtains access data, and with common recognition algorithm, carries out common recognition operation to access data, Operation result is recorded in corresponding account book again, completes data synchronization updating.
The newly-increased encryption data is broadcasted the node all into the data-sharing systems, for institute by step S120 It states node all in data-sharing systems and is based on the newly-increased encryption data completion data synchronization updating.
Newly-increased encryption data is broadcasted into data-sharing systems all nodes by data-sharing systems, for data sharing All nodes are decrypted newly-increased encryption data using corresponding public private key in system, obtain newly-increased data, and use Newly-increased data are carried out common recognition operation, operation result are respectively being recorded in corresponding account book by common recognition algorithm, and it is same to complete data Step updates.
The present embodiment judges whether new node is sky node, if so, former data are total to when there is new node access It enjoys the corresponding data of all nodes in system to be encrypted, broadcast to the new node, so as to complete data synchronous for new node, Incorporate new node faster in data-sharing systems;If non-empty node, then all sections in obtaining former data-sharing systems The corresponding data of point are encrypted and are broadcasted to except third node, and also the corresponding data of acquisition third node encrypt simultaneously wide Node all in data-sharing systems is cast to, realizes the intelligent synchronization of data.
In addition, the embodiment of the present invention also provides a kind of data sharing device based on block chain.
It is that the present invention is based on the signals of the functional module of the data sharing device first embodiment of block chain referring to Fig. 3, Fig. 3 Figure.
In the present embodiment, the data sharing device based on block chain includes:
Whether monitoring modular 10, the first node for monitoring in the data-sharing systems occur altering event;
Determining module 20, for if so, determining change type belonging to the altering event;
Encrypting module 30 is used for if it is determined that the change type is data change, then to the corresponding change of the altering event More data are encrypted, and obtain change encryption data;
Broadcast module 40, for the change encryption data to be broadcasted the second node into the data-sharing systems, Data synchronization updating is completed so that the second node is based on the change encryption data.
Further, the encrypting module 30 specifically includes:
First acquisition unit is used to then obtain second node correspondence if it is determined that the change type is that data change Public key;
First encryption unit, for being based on the public key, change data corresponding to the altering event are encrypted, are obtained To change encryption data.
Further, the broadcast module 40 specifically includes:
First radio unit, for the change encryption data to be broadcasted the second section into the data-sharing systems Point completes data synchronization updating so that the second node is based on the change encryption data;
First decryption unit, for wherein, the second node using corresponding private key to the change encryption data into Row decryption, obtains the change data;
First common recognition arithmetic element is based on common recognition algorithm for the second node and carries out common recognition fortune to the change data It calculates, and operation result is written in account book, complete data synchronization updating.
Further, the data sharing device based on block chain further include:
Second acquisition unit is used to that it is corresponding then to obtain the altering event if it is determined that the change type is version change Version number;
Second radio unit, for broadcasting the version number to the second node, so that the second node is based on The version number synchronizes upgrading to the version of the second node.
Further, the data sharing device based on block chain further include:
Third acquiring unit, for it is public to obtain the corresponding access of the third node when detecting the access of third node Key;
Second encryption unit, it is corresponding to node all in the data-sharing systems for being based on the access public key Data encrypted, obtain access encryption data;
Third radio unit, for broadcasting the access encryption data to the third node, for the third section Point completes data synchronization updating based on the access encryption data.
Further, the third acquiring unit specifically includes:
Judging unit, for judging whether the third node is sky node when detecting the access of third node;
4th acquiring unit, for if so, obtaining the corresponding access public key of the third node.
Further, the data sharing device based on block chain further include:
5th acquiring unit is used to that it is corresponding then to obtain the third node if it is determined that the third node is non-empty node Access public key and the corresponding public public key of data-sharing systems;
Third encryption unit, it is corresponding to node all in the data-sharing systems for being based on the access public key Data encrypted, obtain access encryption data;
4th encryption unit encrypts the corresponding data of the third node, obtains for being based on the public public key To newly-increased encryption data;
4th radio unit, for broadcasting the access encryption data to the third node, for the third section Point completes data synchronization updating based on the access encryption data;
5th radio unit, for the newly-increased encryption data to be broadcasted the section all into the data-sharing systems Point completes data synchronization updating so that node all in the data-sharing systems is based on the newly-increased encryption data.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium.
The data sharing program based on block chain is stored on the computer readable storage medium, it is described computer-readable Storage medium application is realized as above in data-sharing systems, when the data sharing program based on block chain is executed by processor The step.
Computer readable storage medium specific embodiment of the present invention and the above-mentioned data sharing method based on block chain are each Embodiment is essentially identical, and details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and And further include the other elements being not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that more terminal devices (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of data sharing method based on block chain, which is characterized in that the data sharing method based on block chain is answered For data-sharing systems, the data sharing method based on block chain the following steps are included:
Monitor whether the first node in the data-sharing systems occurs altering event;
If so, determining change type belonging to the altering event;
If it is determined that the change type is data change, then change data corresponding to the altering event encrypt, and obtain Change encryption data;
The change encryption data is broadcasted into the second node into the data-sharing systems, so that the second node is based on The change encryption data completes data synchronization updating.
2. the data sharing method as described in claim 1 based on block chain, which is characterized in that described if it is determined that the change The step of type is data change, then change data corresponding to the altering event encrypt, and obtains change encryption data Include:
If it is determined that the change type is data change, then the corresponding public key of the second node is obtained;
Based on the public key, change data corresponding to the altering event are encrypted, and obtain change encryption data.
3. the data sharing method as claimed in claim 2 based on block chain, which is characterized in that described to encrypt the change Second node of the data broadcasting into the data-sharing systems, so that the second node is complete based on the change encryption data Include: at the step of data synchronization updating
The change encryption data is broadcasted into the second node into the data-sharing systems, so that the second node is based on The change encryption data completes data synchronization updating;
Wherein, the second node is decrypted the change encryption data using corresponding private key, obtains the change number According to;
The second node is based on common recognition algorithm and carries out common recognition operation to the change data, and account book is written in operation result In, complete data synchronization updating.
4. the data sharing method as described in claim 1 based on block chain, which is characterized in that described if so, determining institute After the step of stating change type belonging to altering event, the method also includes:
If it is determined that the change type is version change, then the corresponding version number of the altering event is obtained;
The version number is broadcasted to the second node, so that the second node is based on the version number to second section The version of point synchronizes upgrading.
5. the data sharing method as described in claim 1 based on block chain, which is characterized in that the method also includes:
When detecting the access of third node, the corresponding access public key of the third node is obtained;
Based on the access public key, the corresponding data of node all in the data-sharing systems are encrypted, are connect Enter encryption data;
The access encryption data is broadcasted to the third node, so that the third node is based on the access encryption data Complete data synchronization updating.
6. the data sharing method as claimed in claim 5 based on block chain, which is characterized in that described to detect third section When point access, the step of obtaining the third node corresponding access public key, includes:
When detecting the access of third node, judge whether the third node is sky node;
If so, obtaining the corresponding access public key of the third node.
7. the data sharing method as claimed in claim 6 based on block chain, which is characterized in that described to detect third section When point access, after judging the step of whether the third node is sky node, the method also includes:
If it is determined that the third node is non-empty node, then obtains the corresponding access public key of the third node and data are total Enjoy the corresponding public public key of system;
Based on the access public key, the corresponding data of node all in the data-sharing systems are encrypted, are connect Enter encryption data;
Based on the public public key, the corresponding data of the third node are encrypted, obtain newly-increased encryption data;
The access encryption data is broadcasted to the third node, so that the third node is based on the access encryption data Complete data synchronization updating;
The newly-increased encryption data is broadcasted into the node all into the data-sharing systems, for the data-sharing systems In all node be based on the newly-increased encryption data and complete data synchronization updating.
8. a kind of data sharing device based on block chain, which is characterized in that the data sharing device packet based on block chain It includes:
Whether monitoring modular, the first node for monitoring in the data-sharing systems occur altering event;
Determining module, for if so, determining change type belonging to the altering event;
Encrypting module is used for if it is determined that the change type is data change, then to the corresponding change data of the altering event It is encrypted, obtains change encryption data;
Broadcast module, for the change encryption data to be broadcasted the second node into the data-sharing systems, for institute It states second node and is based on change encryption data completion data synchronization updating.
9. a kind of data-sharing systems, which is characterized in that the data-sharing systems include memory, processor and are stored in institute State the data sharing program based on block chain that can be run on memory and on the processor, the number based on block chain The data based on block chain as described in any one of claims 1 to 7 are realized when being executed according to shared routing by the processor The step of sharing method.
10. a kind of computer readable storage medium, which is characterized in that be stored on the computer readable storage medium based on area The data sharing program of block chain realizes such as claim 1 when the data sharing program based on block chain is executed by processor The step of to data sharing method based on block chain described in any one of 7.
CN201910263993.4A 2019-04-02 2019-04-02 Data sharing method, device, system and readable storage medium storing program for executing based on block chain Pending CN109977687A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910263993.4A CN109977687A (en) 2019-04-02 2019-04-02 Data sharing method, device, system and readable storage medium storing program for executing based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910263993.4A CN109977687A (en) 2019-04-02 2019-04-02 Data sharing method, device, system and readable storage medium storing program for executing based on block chain

Publications (1)

Publication Number Publication Date
CN109977687A true CN109977687A (en) 2019-07-05

Family

ID=67082611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910263993.4A Pending CN109977687A (en) 2019-04-02 2019-04-02 Data sharing method, device, system and readable storage medium storing program for executing based on block chain

Country Status (1)

Country Link
CN (1) CN109977687A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110619207A (en) * 2019-08-20 2019-12-27 广州海颐信息安全技术有限公司 Distributed storage method and device for privileged account
CN112333192A (en) * 2020-11-06 2021-02-05 广州笑脸教育科技有限公司 Data sharing method and system
CN113032485A (en) * 2021-03-16 2021-06-25 上海图灵加佳网络科技有限公司 Data storage device and data storage method of block chain node
CN117201203A (en) * 2023-11-07 2023-12-08 西安芝麻数据科技发展有限公司 Block chain-based supply chain data secure sharing system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108599969A (en) * 2018-05-02 2018-09-28 北京链链信息技术有限公司 The method and apparatus of data sharing in a kind of block chain
CN108900464A (en) * 2018-04-26 2018-11-27 平安科技(深圳)有限公司 Electronic device, data processing method and computer storage medium based on block chain
CN109033855A (en) * 2018-07-18 2018-12-18 腾讯科技(深圳)有限公司 A kind of data transmission method based on block chain, device and storage medium
WO2019015547A1 (en) * 2017-07-18 2019-01-24 众安信息技术服务有限公司 Data sharing method and data sharing system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019015547A1 (en) * 2017-07-18 2019-01-24 众安信息技术服务有限公司 Data sharing method and data sharing system
CN108900464A (en) * 2018-04-26 2018-11-27 平安科技(深圳)有限公司 Electronic device, data processing method and computer storage medium based on block chain
CN108599969A (en) * 2018-05-02 2018-09-28 北京链链信息技术有限公司 The method and apparatus of data sharing in a kind of block chain
CN109033855A (en) * 2018-07-18 2018-12-18 腾讯科技(深圳)有限公司 A kind of data transmission method based on block chain, device and storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110619207A (en) * 2019-08-20 2019-12-27 广州海颐信息安全技术有限公司 Distributed storage method and device for privileged account
CN110619207B (en) * 2019-08-20 2021-12-17 广州海颐信息安全技术有限公司 Distributed storage method and device for privileged account
CN112333192A (en) * 2020-11-06 2021-02-05 广州笑脸教育科技有限公司 Data sharing method and system
CN113032485A (en) * 2021-03-16 2021-06-25 上海图灵加佳网络科技有限公司 Data storage device and data storage method of block chain node
CN117201203A (en) * 2023-11-07 2023-12-08 西安芝麻数据科技发展有限公司 Block chain-based supply chain data secure sharing system and method
CN117201203B (en) * 2023-11-07 2024-02-23 西安芝麻数据科技发展有限公司 Block chain-based supply chain data secure sharing system and method

Similar Documents

Publication Publication Date Title
EP3772700B1 (en) Method and device for encrypting model of neural network, and storage medium
CN109977687A (en) Data sharing method, device, system and readable storage medium storing program for executing based on block chain
EP3694244B1 (en) Rrc connection recovery method and apparatus
US11924635B2 (en) Security authentication method and apparatus thereof, and electronic device
CN106104549A (en) Method and apparatus for the data of verification process
CN111478771B (en) Method for safety access between micro services and micro service system
US20140122645A1 (en) Method and system for automatic agnostic provisioning of a computing device
US9197672B2 (en) Method and system for selective application of device policies
TR201900554T4 (en) Method and apparatus for defining the resource for key processing after a transition failure.
US20200067715A1 (en) Security verification method for vehicle-mounted device, electronic apparatus, and readable storage medium
WO2021082647A1 (en) Federated learning system, training result aggregation method, and device
US20220272511A1 (en) Subscription data management method and apparatus
CN111970304A (en) Message processing method and device
CN115552933A (en) Federal learning in a telecommunications system
CN112446985A (en) Intelligent door lock unlocking method and device
CN110266582A (en) A kind of information push method, system, server and communication terminal
CN114168293A (en) Hybrid architecture system and task scheduling method based on data transmission time consumption
CN113240836A (en) Bluetooth lock connection method adopting two-dimensional code and related configuration system
CN110891270B (en) Selection method and device of authentication algorithm
CN114553612B (en) Data encryption and decryption method and device, storage medium and electronic equipment
CN104023045B (en) Data back up method and device
CN115037453B (en) Data protection method and system and electronic equipment
CN113014545B (en) Data processing method and device, computer equipment and storage medium
US20210083874A1 (en) Blockchain Token Holding Social Event History
CN114826724A (en) Data processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190705

RJ01 Rejection of invention patent application after publication