CN110121860A - Data processing method, equipment and system based on block chain - Google Patents

Data processing method, equipment and system based on block chain Download PDF

Info

Publication number
CN110121860A
CN110121860A CN201780081904.3A CN201780081904A CN110121860A CN 110121860 A CN110121860 A CN 110121860A CN 201780081904 A CN201780081904 A CN 201780081904A CN 110121860 A CN110121860 A CN 110121860A
Authority
CN
China
Prior art keywords
equipment
data
block chain
chain network
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780081904.3A
Other languages
Chinese (zh)
Other versions
CN110121860B (en
Inventor
常俊仁
张臣雄
冯淑兰
张亮亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN110121860A publication Critical patent/CN110121860A/en
Application granted granted Critical
Publication of CN110121860B publication Critical patent/CN110121860B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application provides a kind of data processing method based on block chain, equipment and system, this method comprises: the first equipment and the second equipment are established and communicated to connect, second equipment is the equipment in block chain network;The first data needs that first equipment determines that first equipment generates are authenticated in the block chain network;First equipment sends first data to second equipment, to realize that first data are authenticated by the equipment in the block chain network.The application provides a kind of data processing method based on block chain, due to being authenticated using block chain network to data, can reduce the construction and maintenance cost of communication system, improves the security performance of system.And the equipment that the data of the first equipment are sent in block chain network is authenticated by the second equipment, can reduce the Capability Requirement to the first equipment.

Description

Data processing method, equipment and system based on block chain Technical field
The invention relates to the communications fields, and in particular, to data processing method, equipment and system based on block chain.
Background technique
Internet of Things realizes information exchange and communication by computer technologies such as application Intellisense, identification technology and general fit calculations as the network for extending based on the internet and extending.According to there is shutting mechanism prediction, the internet of things equipment quantity in the year two thousand twenty whole world is up to 25,000,000,000 or so.With in Internet of Things number of devices it is normal, if be managed with traditional centralized network mode to internet of things equipment, huge data center's infrastructure construction will be brought to put into and maintenance investment.In addition, the network mode based on centralization can have security risk.
Accordingly, it is desirable to provide a kind of method of data processing, reduces the construction and maintenance cost of communication system, improves the security performance of system.
Apply for content
The application provides a kind of data processing method based on block chain, equipment and system, can reduce the construction and maintenance cost of communication system, improves the security performance of system.
In a first aspect, providing a kind of data processing method based on block chain, comprising: the first equipment and the second equipment are established and communicated to connect, and second equipment is the equipment in block chain network;The first data needs that first equipment determines that first equipment generates are authenticated in the block chain network;First equipment sends first data to second equipment, to realize that first data are authenticated by the equipment in the block chain network.
According to the data processing method based on block chain of the embodiment of the present application, first equipment is when generating the first data for needing to be authenticated in block chain network, the second equipment into block chain network sends the first data, so that the first data are sent to the equipment in block chain network by the second equipment, the certification of the first data is realized.Due to being authenticated using block chain network to data, it can reduce the construction and maintenance cost of communication system, improve the security performance of system.And the equipment that the data of the first equipment are sent in block chain network is authenticated by the second equipment, can reduce the Capability Requirement to the first equipment.
It should be noted that certification refers to the certification of block chain common recognition or consistency certification in the embodiment of the present application.
Optionally, the first equipment can be internet of things equipment, and the first equipment is not the equipment in block chain network.First equipment does not need to authenticate data by formula algorithm.
Optionally, equipment of second equipment by way of broadcast transmission into block chain network sends the first data, and all devices (including second equipment) in block chain network can strive for certification power, authenticate to the first data.
With reference to first aspect, in a kind of implementation of first aspect, first equipment and the second equipment, which are established, to be communicated to connect, it include: that first equipment sends the first message crossed using the first public key encryption to second equipment, it include the first information in the first message, first public key is the public key of second equipment, and the first information is for requesting second equipment to authenticate the equipment that the data that the needs that first equipment generates authenticate in the block chain network are sent in the block chain network;First equipment receives the second information that second equipment is sent, and second information is used to indicate the second equipment confirmation and can authenticate the equipment that the data that the needs that first equipment generates authenticate in the block chain network are sent in the block chain network.
With reference to first aspect and its above-mentioned implementation further includes the second public key in the first message in another implementation of first aspect, and second public key is the public key of first equipment.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, first equipment receives the second information that the second equipment is sent, comprising: first equipment receives second information crossed using second public key encryption that second equipment is sent.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, first equipment sends first data to second equipment, comprising: first equipment generates the block for carrying first data;First equipment sends the block to second equipment.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, before first equipment and the second equipment establish communication connection, the method also includes: first equipment receives the third information that second equipment is sent, and includes the requirement of the first Hash HASH value in the third information;First equipment, which generates, meets the first HASH value that the first HASH value requires.
Since the first equipment can only be after generating the cryptographic Hash for meeting cryptographic Hash requirement, it could establish and communicate to connect with the second equipment, therefore collision probability when multiple equipment and the foundation communication connection of the second equipment can be reduced, and makes block chain network that there is preferable retractility, support the access of the equipment of different demands.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, it is required in the third information including at least one HASH value, includes the first HASH value requirement at least one HASH value requirement, each HASH value at least one HASH value requirement It is required that corresponding at least one type of service;
Wherein, before first equipment generates and meets the first HASH value that the first HASH value requires, the method also includes: first equipment determines the first HASH value according to the corresponding type of service of first data.
The cryptographic Hash requirement of the embodiment of the present application is related to type of service, and thus, it is possible to meet the requirement of the different access delay of equipment and authentication time delay requirement.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, it include the requirement of at least one HASH value in the third information, at least one described HASH value includes the first HASH value requirement in requiring, and each HASH value at least one HASH value requirement requires corresponding at least one equipment group;
Wherein, before first equipment generates and meets the first HASH value that the first HASH value requires, the method also includes: first equipment equipment group according to belonging to first equipment determines the first HASH value.
Optionally, it when the second equipment is grouped equipment, is grouped according to the computing capability of equipment, alternatively, the type of service according to equipment is grouped.
The cryptographic Hash requirement of the embodiment of the present application is related to equipment group, and thus, it is possible to meet the requirement of the different access delay of equipment and authentication time delay requirement.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, the method also includes: first equipment sends the 2nd HASH value relevant to first data to third equipment, the 2nd HASH value determines that the integrality of the second data, the second data are data of first data in the block chain network after certification for the third equipment.
In the embodiment of the present application, the integrality of data is used to indicate during whether data are certified in block chain network and loses or be tampered.
Optionally, third equipment is internet of things equipment, and third equipment is not the equipment in block chain network.
Optionally, the first data are data relevant to the first equipment and third equipment, for example, transaction data of first data between the first equipment and third equipment.Or first data be data relevant to the first equipment and other internet of things equipment, for example, transaction data of first data between the first equipment and other internet of things equipment.
Thereby, it is possible to guarantee the confidentiality of data and integrality, so that the data stored in block chain network have higher reliability.
Optionally, if the first data are crossed without the public key encryption of third equipment, and the second data And crossed without the public key encryption of third equipment, the second equipment can directly calculate the cryptographic Hash of the second data, it is whether consistent with the cryptographic Hash received to compare the cryptographic Hash being calculated later.
Or, if the first data are crossed without the public key encryption of third equipment, but the second data are that the public key encryption by third equipment is crossed, second equipment is got after the second data, first the second data are decrypted, the cryptographic Hash of the data after decryption is calculated later, and then the cryptographic Hash being calculated is compared with the cryptographic Hash received.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, first data are that the public key encryption by the third equipment is crossed.
Optionally, if the second data are that public key encryption by third equipment is crossed, third equipment can directly calculate the cryptographic Hash of the second data, later compare the cryptographic Hash of calculating and the cryptographic Hash received, to determine the integrality of the second data.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, the method also includes:
First equipment determines the 2nd HASH value according to first data.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, first data are that the public key encryption by third equipment is crossed, the method also includes: first equipment sends first data to the third equipment, in order to which the third equipment is after determining the 2nd HASH value according to first data, determine that the integrality of the second data, the second data are data of first data in the block chain network after certification according to the 2nd HASH value.
Optionally, if the second data are that the public key encryption by third equipment is crossed, when third equipment gets the second data, advance decryption, the cryptographic Hash of data after calculating decryption again, the cryptographic Hash of the data after the decryption being calculated and the 2nd HASH value are compared later, to determine the integrality of the second data.
Alternatively, third equipment can directly calculate the cryptographic Hash of the second data if the second data are crossed without the public key encryption of third equipment, the cryptographic Hash being calculated and the 2nd HASH value are compared later, to determine the integrality of the second data.
Optionally, first data are crossed without the public key encryption of third equipment, if the second data are also to cross without the public key encryption of third equipment, third equipment directly calculates the cryptographic Hash of the second data, the cryptographic Hash for the second data being calculated is compared with the 2nd HASH value later, to determine the integrality of the second data.
Alternatively, the first data are crossed without the public key encryption of third equipment, the second data are by What the public key encryption of three equipment was crossed, third equipment is first decrypted the second data, then calculates the cryptographic Hash of the data after decryption, later compares the cryptographic Hash for the encrypted data being calculated with the 2nd HASH value, to determine the integrality of the second data.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, the method also includes: first equipment receives the 4th information that second equipment is sent, 4th information is used to indicate first data and authenticates in the block chain network by n times, and the value of N is preset value.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, the method also includes: first equipment receives the corresponding Mei Keer Merkle tree information of the second data and block information that second equipment is sent, second data are data of first data in the block chain network after certification, and the block information is used to indicate the block that the second data are carried in the block chain network.
When the first equipment receives the corresponding Merkle tree information of the second data and block information, the first equipment can know the complete n times certification in block chain network of the first data.
Optionally, block information is the height of block or the mark of block.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, the method also includes: first equipment is determined deletes the second data from the block chain network, and the second data are data of first data in the block chain network after certification;Equipment of first equipment into the block chain network sends the 5th information, and the equipment that the 5th information is used to indicate in the block chain network deletes the second data from the block chain network.
The data processing method based on block chain of the embodiment of the present application can delete the data stored in block chain network according to demand, thus, it is possible to reduce network load, reduce the transmission bandwidth that the transmission of block chain needs to occupy.
With reference to first aspect and its above-mentioned implementation includes identification information and/or the corresponding Merkle tree information of the second data in the 5th information, the identification information is for identifying the second data in another implementation of first aspect.
With reference to first aspect and its above-mentioned implementation, in another implementation of first aspect, the method also includes: first equipment deletes first data of first equipment being locally stored.
Thereby, it is possible to reduce the storage burden of the first equipment.
Second aspect provides a kind of data processing method based on block chain, comprising: the second equipment and the first equipment are established and communicated to connect, and second equipment is the equipment in block chain network;Described second sets Standby the first data for receiving the needs generated by first equipment that first equipment is sent and being authenticated in the block chain network;Equipment of second equipment into the block chain network sends first data, realizes the certification of first data.
According to the data processing method based on block chain of the embodiment of the present application, second equipment receives the first data that the needs that the first equipment generates are authenticated in block chain network, and the first data are sent to the equipment in block chain network, realize the certification of the first data.Due to being authenticated using block chain network to data, it can reduce construction and the maintenance cost of communication system, improve the security performance of system.And the equipment that the data of the first equipment are sent in block chain network is authenticated by the second equipment, can reduce the Capability Requirement to the first equipment.
In conjunction with second aspect, in a kind of implementation of second aspect, second equipment and first equipment, which are established, to be communicated to connect, it include: that second equipment receives the first message that the first public key encryption of use that first equipment is sent is crossed, it include the first information in the first message, first public key is the public key of second equipment, and the first information is for requesting second equipment to authenticate the equipment that the data that the needs that first equipment generates authenticate in the block chain network are sent in the block chain network;Second equipment sends the second information to first equipment, and second information is used to indicate the second equipment confirmation and can authenticate the equipment that the data that the needs that first equipment generates authenticate in the block chain network are sent in the block chain network.
It further include the second public key in the first message in another implementation of second aspect in conjunction with second aspect and its above-mentioned implementation, second public key is the public key of first equipment.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, second equipment sends the second information to first equipment, comprising: second equipment sends second information crossed using second public key encryption to first equipment.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, after second equipment and the first equipment establish communication connection, the method also includes: second equipment generates the digital cash of preset quantity.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, the method also includes: equipment of second equipment into the block chain network sends the relevant information of the digital cash;If second equipment determines that the digital cash authenticates in the block chain network by M times, second equipment confirms that the digital cash comes into force, and the value of M is preset value.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, second equipment receives the needs of the first equipment transmission generated by first equipment in the block The first data authenticated in chain network, comprising: second equipment receives the block for carrying first data that first equipment is sent;
Wherein, equipment of second equipment into the block chain network sends first data, comprising: equipment of second equipment into the block chain network sends the block of carrying first data.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, equipment of second equipment into the block chain network sends first data, include: the block format that second equipment is required according to the block chain network, generates the block for carrying first data;Equipment of second equipment into the block chain network sends the block of carrying first data.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, before second equipment and first equipment establish communication connection, the method also includes: second equipment determines the requirement of the first Hash HASH value;Second equipment sends third information to first equipment, it include the first HASH value requirement in the third information, so that first equipment is established with second equipment and is communicated to connect after generating the first HASH value for meeting the first HASH value requirement.
Since the first equipment can only be after generating the cryptographic Hash for meeting cryptographic Hash requirement, it could establish and communicate to connect with the second equipment, therefore collision probability when multiple equipment and the foundation communication connection of the second equipment can be reduced, and makes block chain network that there is preferable retractility, support the access of the equipment of different demands.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, it include the requirement of at least one HASH value in the third information, at least one described HASH value includes the first HASH value requirement in requiring, and each HASH value at least one HASH value requirement requires corresponding at least one type of service;
Wherein, second equipment determines the requirement of the first Hash HASH value, comprising: second equipment determines at least one HASH value requirement.
The cryptographic Hash requirement of the embodiment of the present application is related to type of service, and thus, it is possible to meet the requirement of the different access delay of equipment and authentication time delay requirement.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, it include the requirement of at least one HASH value in the third information, at least one described HASH value includes the first HASH value requirement in requiring, and each HASH value at least one HASH value requirement requires corresponding at least one equipment group;
Wherein, second equipment determines the requirement of the first Hash HASH value, comprising: second equipment Determine at least one HASH value requirement.
Optionally, it when the second equipment is grouped equipment, is grouped according to the computing capability of equipment, alternatively, the type of service according to equipment is grouped.
The cryptographic Hash requirement of the embodiment of the present application is related to equipment group, and thus, it is possible to meet the requirement of the different access delay of equipment and authentication time delay requirement.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, the method also includes: second equipment receives the 2nd HASH value relevant to first data that first equipment is sent, the 2nd HASH value determines that the integrality of the second data, the second data are data of first data in the block chain network after certification for third equipment;Second equipment sends the 2nd HASH value to the third equipment.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, first data are that the public key encryption by the third equipment is crossed.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, the 2nd HASH value is to be determined by first equipment according to first data.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, first data are that the public key encryption by third equipment is crossed, the method also includes: second equipment receives first data;Second equipment sends first data to the third equipment, in order to which the third equipment is after determining the 2nd HASH value according to first data, determine that the integrality of the second data, the second data are data of first data in the block chain network after certification according to the 2nd HASH value.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, the method also includes: if second equipment determines that first data have authenticated in the block chain network by n times, second equipment sends the second data to the third equipment and corresponds to Mei Keer Merkle tree information and block information, the block information is used to indicate the block that second data are carried in the block chain network, second data are data of first data in the block chain network after certification, wherein, the value of N is preset value.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, the method also includes: if second equipment determines that first data have authenticated in the block chain network by n times, second equipment sends the 4th information to first equipment, 4th information is used to indicate first data and authenticates in the block chain network by n times, wherein, the value of N is preset value.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, the method also includes: if second equipment determines that first data have authenticated in the block chain network by n times, second equipment sends the corresponding Merkle tree information of the second data and block information to first equipment, the block information is used to indicate the block that the second data are carried in the block chain network, second data are data of first data in the block chain network after certification, wherein, the value of N is preset value.
In conjunction with second aspect and its above-mentioned implementation, in another implementation of second aspect, the method also includes: second equipment receives the 5th information that first equipment is sent, the equipment that 5th information is used to indicate in the block chain network deletes the second data from the block chain network, and the second data are data of first data in the block chain network after certification.
It include identification information and/or the corresponding Merkle tree information of the second data in the 5th information, the identification information is for identifying second data in another implementation of second aspect in conjunction with second aspect and its above-mentioned implementation.
The third aspect, provide a kind of data processing method based on block chain, it include: that third equipment obtains the corresponding Mei Keer Merkle tree information of the second data and block information, the block information is used to indicate the block that second data are carried in block chain network, second data are the data that first data are authenticated in block chain network into the data crossed after authenticating, first data for the needs that the first equipment generates in the block chain network;The third equipment obtains the second data from the block of the second data of carrying according to the Merkle tree information;The third equipment determines the integrality of the second data.
According to the data processing method based on block chain of the application, third equipment can be according to the Merkle tree information and block information received, corresponding second data of the first data that are authenticated in block chain network of needs generated with the first equipment stored in block chain network are obtained, and confirm the integrality of the second data.Thereby, it is possible to guarantee the confidentiality of data and integrality, so that the data stored in block chain network have higher reliability.
In conjunction with the third aspect, in a kind of implementation of the third aspect, if the third equipment confirms that the second data are complete, the method also includes: equipment of the third equipment into the block chain network sends confirmation message, and it is complete that the confirmation message is used to indicate the second data.
In the embodiment of the present application, the confirmation message that third equipment is sent can be authenticated in block chain network.
In conjunction with the third aspect and its above-mentioned implementation, in another implementation of the third aspect, the third equipment obtains the corresponding Mei Keer Merkle tree information of the second data and block information, comprising: institute It states third equipment and receives the Merkle tree information and the block information that the second equipment is sent, wherein second equipment is the equipment in the block chain network.
Optionally, third equipment can receive the Merkle tree information and block information of the transmission of the multiple equipment in block chain network, it is possible thereby to bring potential risk when the equipment in block chain network being avoided to be attacked.
In conjunction with the third aspect and its above-mentioned implementation, in another implementation of the third aspect, second equipment is that first data are sent to the equipment recognized in the block chain network.
In conjunction with the third aspect and its above-mentioned implementation, in another implementation of the third aspect, the method also includes: the third equipment determines the second Hash HASH value relevant to first data;
Wherein, the third equipment determines the integrality of the second data, comprising: the third equipment determines the integrality of the second data according to the consistency of relevant to the second data the 3rd HASH value and the 2nd HASH value.
In conjunction with the third aspect and its above-mentioned implementation, in another implementation of the third aspect, the third equipment determines the second Hash HASH value relevant to first data, it include: that the third equipment receives the 2nd HASH value, wherein, the 2nd HASH value is to be determined by first equipment according to first data.
In conjunction with the third aspect and its above-mentioned implementation, in another implementation of the third aspect, first data are that the public key encryption by the third equipment is crossed.
In conjunction with the third aspect and its above-mentioned implementation, in another implementation of the third aspect, first data are that the public key encryption by the third equipment is crossed, the method also includes: the third equipment receives first data that first equipment is sent;The third equipment determines the 2nd HASH value according to first data.
In conjunction with the third aspect and its above-mentioned implementation, in another implementation of the third aspect, the method also includes: the third equipment, which is determined, deletes the second data from the block chain network;Equipment of the third equipment into the block chain network sends the 5th information, and the equipment that the 5th information is used to indicate in the block chain network deletes the second data from the block chain network.
It include identification information and/or the corresponding Merkle tree information of the second data in the 5th information, the identification information is for identifying the second data in another implementation of the third aspect in conjunction with the third aspect and its above-mentioned implementation.
Fourth aspect provides a kind of equipment, the method in any possible implementation for executing above-mentioned first aspect or first aspect.Specifically, the equipment include for execute above-mentioned first aspect or The functional module of method in any possible implementation of first aspect.
5th aspect, provides a kind of equipment, the method in any possible implementation for executing above-mentioned second aspect or second aspect.Specifically, the equipment includes the functional module for executing the method in any possible implementation of above-mentioned second aspect or second aspect.
6th aspect, provides a kind of equipment, the method in any possible implementation for executing the above-mentioned third aspect or the third aspect.Specifically, the equipment includes the functional module for executing the method in any possible implementation of the above-mentioned third aspect or the third aspect.
7th aspect, provides a kind of equipment, including processor, memory and transceiver.It is communicated with each other between the processor, the memory and the transceiver by internal connecting path, transmitting control and/or data-signal, so that the equipment executes the method in any possible implementation of above-mentioned first aspect or first aspect.
Eighth aspect provides a kind of equipment, including processor, memory and transceiver.It is communicated with each other between the processor, the memory and the transceiver by internal connecting path, transmitting control and/or data-signal, so that the equipment executes the method in any possible implementation of above-mentioned second aspect or second aspect.
9th aspect, provides a kind of equipment, including processor, memory and transceiver.It is communicated with each other between the processor, the memory and the transceiver by internal connecting path, transmitting control and/or data-signal, so that the equipment executes the method in any possible implementation of the above-mentioned third aspect or the third aspect.
Tenth aspect, provides a kind of communication system, including the equipment in fourth aspect, the 5th aspect and the 6th aspect.Or including the equipment in the 7th aspect, eighth aspect and the 9th aspect.
On the one hand tenth, provides a kind of computer-readable medium, for storing computer program, the computer program includes for executing the instruction in any possible implementation of above-mentioned first aspect or first aspect.
12nd aspect, provides a kind of computer-readable medium, for storing computer program, the computer program includes for executing the instruction in any possible implementation of above-mentioned second aspect or second aspect.
13rd aspect, provides a kind of computer-readable medium, for storing computer program, the computer program includes for executing the instruction in any possible implementation of the above-mentioned third aspect or the third aspect.
Detailed description of the invention
Fig. 1 is the schematic diagram of the application scenarios of the embodiment of the present application;
Fig. 2 is the schematic flow chart according to the data processing method based on block chain of the embodiment of the present application;
Fig. 3 is the schematic flow chart that the method for communication connection is established according to the equipment of the embodiment of the present application;
Fig. 4 is the schematic flow chart according to the data processing method based on block chain of another embodiment of the application;
Fig. 5 is the schematic flow chart according to the data processing method based on block chain of the application another embodiment;
Fig. 6 is the schematic flow chart according to the data processing method based on block chain of the application another embodiment;
Fig. 7 is the schematic flow chart according to the data processing method based on block chain of the application another embodiment;
Fig. 8 is the schematic block diagram according to the equipment of the embodiment of the present application;
Fig. 9 is according to the schematic of the equipment of another embodiment of the application;
Figure 10 is the schematic block diagram according to the equipment of the application another embodiment;
Figure 11 is the schematic block diagram according to the equipment of the application another embodiment;
Figure 12 is the schematic block diagram according to the equipment of the application another embodiment;
Figure 13 is the schematic block diagram according to the equipment of the application another embodiment.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, the technical scheme in the embodiment of the application is clearly and completely described.
Fig. 1 is the schematic diagram of the application scenarios of the embodiment of the present application.As shown in Figure 1, a block chain network is constituted between node within the scope of dotted line, internet of things equipment is not in block chain network, and the block node in block chain network can be used as the agent node of internet of things equipment, the data that the needs that internet of things equipment generates are propagated and verified in block chain network are sent to the node in block chain network, realize the verifying of data.It should be noted that " node " and " equipment " meaning having the same in the embodiment of the present application.
In the embodiment of the present application, the block node in block chain network can be privately owned node, Provider network node (for example, base station equipment), be also possible to certain industry organization, organization and individual's deployment Website (Station).
In the embodiment of the present application, internet of things equipment can include but is not limited to mobile station (Mobile Station, MS), mobile terminal (Mobile Terminal), mobile phone (Mobile Telephone), user equipment (User Equipment, UE), mobile phone (handset) and portable equipment (portable equipment), vehicle (vehicle) etc., such as, terminal device can be mobile phone (or being " honeycomb " phone), computer etc. with wireless communication function, terminal device can also be portable, pocket, hand-held, built-in computer or vehicle-mounted mobile device.
And, there is no the hardware of centralization or management organization in block chain network, the rights and duties between arbitrary node be all it is impartial, and any node damage or loss do not affect the running of entire block chain network, therefore, block chain network has the characteristics that decentralization.Data exchange is carried out between each node in block chain network without trusting each other, the operation regulation of entire block chain network is open and clear, all data contents are disclosed, therefore within the scope of the regular scope and time of block chain network, other nodes can not cannot be also cheated between node, therefore, block chain network has the feature for going to trust.The total data block of block chain network safeguarded jointly by the nodes with maintenance function all in whole system, and anyone can participate in when these nodes with maintenance function, and therefore, block chain network has the feature of collective's maintenance.Block chain network allows each participation node that can obtain the copy of a full database by way of divided data library.Unless can control simultaneously be more than in whole network 51% node, it is invalid when otherwise on individual node to the modification of database, can not also influence the data content on other nodes.Therefore, block chain network has reliable database.
Due to block chain network have the equipment in above multiple features and Internet of Things quantity will sharp increase, block chain network can be combined with Internet of Things, realize the self-governance of Internet of Things, and improve the security performance of Internet of Things.
But the computing capability of most of internet of things equipment is very limited, so can not be added directly into internet of things equipment in block chain network.It needs to provide a kind of method of data processing, by the way that block chain network to be combined with Internet of Things, reduces construction and the maintenance cost of communication system, improve the security performance of system.
In order to facilitate the application is understood, before describing the present processes in conjunction with Fig. 1, the working method of the block node in the several elements and block chain network in block chain network is specifically introduced herein first.
It should be noted that the data that equipment generates include data relevant to the equipment and its opposite equip. and common data in the embodiment of the present application.In the element and block chain network in description block chain network when the working method of block node, with data instance relevant to equipment and its opposite equip., tool Body is described so that data relevant to equipment and its opposite equip. are transaction data as an example, but this does not limit the range of the embodiment of the present application.Wherein:
Block is the container data structures for having polymerize data being comprised in block chain, it is made of a lot of transaction of a block head and composition block main body immediately after comprising metadata.Block specifically includes: block size field, usually 4 bytes;Block head file, usually 80 bytes;Transaction counter field, generally 1-9 byte record number of transaction;Transaction field, usually variable-length, records Transaction Details.
Block head is made of three group metadatas, is the data of one group of reference father's block cryptographic Hash first, this group metadata is for the block to be connected with the previous block in block chain.Second group metadata includes difficulty, timestamp and is with primary number (Number used once, referred to as " Nonce ").Third element data are Mei Keer (Merkle) several (a kind of data structures for effectively summarizing All Activity in block).Block head specifically includes following field: version field, usually 4 byte;Father's block Hash value field, usually 32 byte, for quoting the cryptographic Hash of father's block in block chain;Merkle root field, for recording the cryptographic Hash for the Merkle tree root traded in the block;Timestamp field, usually 4 field is accurate to the second for identifying the time proximity of block generation;Nonce field is the counter for proof of work algorithm.
Each block can quote previous block by " the father's block Hash value field " of its block head.That is, each block head includes the cryptographic Hash of its father's block.And only one father's block of each block, but can temporarily have multiple sub-blocks.There is the case where multiple sub-blocks referred to as " block chain bifurcated " in one block.Block chain bifurcated indicates that a transition condition, only one final sub-block can become a part of block chain.
Block chain, is the data structure being orderly chained up from back to front by block, and each block all points to previous block.It can be stored as a kind of file comprising non-relativeness record, or be stored in a simple database.Block chain can be regarded as to a storehouse, highly mean that the distance between block and first block and top or top indicate newest block.Encryption Kazakhstan (for example, secure hash algorithm (Secure Hash Algorithm, referred to as " SHA ")) is carried out to each block head, produces a cryptographic Hash.The correspondence block in block chain can be identified by this cryptographic Hash.
For entire block chain network, needing target to be achieved is that all nodes agree to some information jointly and update it into total shared account book.For this purpose, introducing common recognition mechanism in block chain network, two kinds of typical algorithms are that proof of work and equity prove in common recognition mechanism.Wherein:
Proof of work (Proof Of Work, referred to as " PoW "), essence are to transmit to be added for information Cost reduces the rate of information transmission, and a random element is added and guarantees that only one node can have the right to carry out information broadcast in a period.This random element is exactly that node is allowed to go to calculate a random Harsh value.Particularly as being input data of the block node according to acquisition, be calculated a string 64 random digit and letter character string, but the node for only obtaining meeting the cryptographic Hash of cryptographic Hash requirement can be received to be proof of work by block chain network.And the hash algorithm of proof of work also by way of the input value of hash algorithm next time, realizes wearing for historical information, forms retrospective chain (block chain) using the information in each newborn block.
Equity proves, it is therefore an objective to realize that block chain is ensured by those people with economic interests, this method is that coin number of days (Coindays) the Lai Shixian equity destroyed by every transaction proves.Existing equity identity system, such as point point coin (Peercoin) are based on evidence block, and in evidence block, the target and destruction coin number of days that miner must reach are negatively correlated.The people for possessing Peercoin must select the digging mine people that referred to as equity proves, and contribute their a part of coin whithin a period of time to protect block chain network.
Below in conjunction with above description, the data processing method based on block chain according to the embodiment of the present application is described in detail.Fig. 2 shows the data processing methods based on block chain according to the embodiment of the present application.As shown in Fig. 2, method 100 includes:
S101, the first equipment and the second equipment, which are established, to be communicated to connect, and the second equipment is the equipment in block chain network;
S102, the first equipment generate the data for needing to authenticate in block chain network;
S103, the second equipment receive the data that the needs that the first equipment is sent authenticate in block chain network;
S104, equipment of second equipment into block chain network send the data, realize the certification of the data.
It should be noted that the certification in the embodiment of the present application refers to carrying out the certification of block chain common recognition or consistency certification.
Optionally, the first equipment is the equipment in internet of things equipment in the method 100, and the computing capability of the first equipment is limited.The data of first equipment are sent to the equipment in block chain network by the second equipment, it can be understood as the second equipment is the agent equipment of the first equipment.
Specifically, in some embodiments, the first equipment and the second equipment can method according to Fig.3, establish and communicate to connect.It is described so that the first equipment is internet of things equipment as an example, as shown in figure 3, method 200 includes:
S201, internet of things equipment receive the public key information that the second equipment is sent;
In S201, internet of things equipment can receive the public key information that all devices for having the function of servicing internet of things equipment in block chain network are sent, internet of things equipment can be according to parameters such as the qualities of reception of information later, judgement selects that equipment in block chain network as the agent equipment of oneself, the equipment data that the needs that oneself is generated authenticate in block chain network being sent in block chain network.
S202 after internet of things equipment determines the second equipment as its agent equipment, determines the access sequence of the second equipment of access;
It should be noted that agent equipment of second equipment as internet of things equipment, it is understood that be that the second equipment is equipment associated with internet of things equipment.
Optionally, the access sequence in S202 can be the random access sequence in existing (Long Term Evolution, referred to as " LTE ").For example, can be Zadoff-Chu (ZC) sequence.
S203, internet of things equipment are synchronized with the second equipment;
Optionally, it when the distance between internet of things equipment and the second equipment are greater than preset value, needs to synchronize between internet of things equipment and the second equipment.At this point, the second equipment can no longer broadcast the message in broadcast public key information, but carry public key information by the related news in synchronizing process.
But it should be recognized that when internet of things equipment and the second equipment do not need to synchronize, for example, when the distance between internet of things equipment and the second equipment are less than or equal to preset value.Second equipment needs to broadcast the public key information of oneself to internet of things equipment in S201.
S204, internet of things equipment send the initial access message crossed using the public key encryption of the second equipment to the second equipment;
It wherein, include the first information in initial access message, the first information is for requesting the second equipment to authenticate the equipment that the data of internet of things equipment are sent in block chain network.Here the first information can be the instruction information of display, it is also possible to the information of implicit instruction, such as, the first information specifically can be block information, when the second equipment determines in initial access message comprising block information, the second equipment confirms Physical Network device request oneself by the data forwarding of internet of things equipment to the other equipment in block chain network.
It further include the public key information of internet of things equipment in initial access message alternatively, further.
S205, the second equipment determine whether the data that the needs that it can be forwarded to generate for internet of things equipment are authenticated in block chain network;
Optionally, after the second equipment receives the initial access message that internet of things equipment is sent, using the private key encryption of oneself initial access message, then it is confirmed whether to receive the request of internet of things equipment according to the receiving ability of itself.
Alternatively, the second equipment first decides whether to can receive the request of internet of things equipment, when determination can receive the internet of things equipment, use its private key encryption initial access message, it is to be understood that in this fashion, the above-mentioned first information is needed included in the message header of initial access message
S206, the second equipment send feedback information to internet of things equipment;
In S206, feedback information is used to inform the equipment that the data that the needs that internet of things equipment generates authenticate in block chain network can be sent in block chain network by the second equipment of internet of things equipment, realizes the certification of data.
Optionally, when in the initial access message in S204 including the public key information of internet of things equipment, the second equipment uses the public key encryption feedback information of internet of things equipment to internet of things equipment, rear encrypted feedback information is sent to internet of things equipment.
S207, internet of things equipment are established with the second equipment and are communicated to connect according to feedback information.
In turn, internet of things equipment and the second equipment are established after communication connection, internet of things equipment sends the data to the second equipment first, data broadcasting is authenticated and propagated into block chain network by the second equipment when generating the data for needing to be authenticated in block chain network.
As described in the text, the data that internet of things equipment generates include transaction data and common data.For example, internet of things equipment can be intelligent washing machine, intelligent washing machine can buy liquid detergent automatically, and the data generated in this process of exchange are transaction data.Or internet of things equipment is the intelligent tap of family, tap can buy the water of waterworks automatically, different taps can buy different water sources, such as purification water, slurry, use in toilet water etc., each different tap can independently carry on transactions, and generate transaction data.
Or some key components and parts of many electric appliances can add specific internet of things sensors, user can use the time to pay to producer by this component, in components, there may be when potential faults, producer will actively be repaired or replaced, under this scene, the data that internet of things equipment generates are common data namely nontransaction data.For another example the air purifier of family, the data of the PM2.5 detected are also common data.
In the embodiment of the present application, after the second equipment receives internet of things equipment, the second equipment can have the right to generate a certain number of digital cash.Therefore, method 200 further include:
S208, the second equipment generate the digital cash of preset quantity;
It is alternatively possible to the generation rule of digital cash be preset, for example, can be with one digital cash of generation in prespecified every 10 minutes.
S209, other equipment of second equipment into block chain network broadcast the phase of the digital cash of its generation Close information;
Optionally, the relevant information of digital cash includes the quantity of digital cash.
Optionally, in the second device broadcasts while its digital cash generated, the relevant information of internet of things equipment can be broadcasted to the other equipment in block chain network, the relevant information effect of internet of things equipment here be that the generation for informing other equipment these digital cash in block chain network is due to having received internet of things equipment just to generate.For example, the relevant information of internet of things equipment may include the public key information of internet of things equipment or other specifying informations of internet of things equipment, for example, internet of things equipment identifier information etc..
S210, when second node confirms that the raw digital cash of its production has carried out M certification in block chain network, the digital cash that the second equipment confirms that it is generated comes into force.
Optionally, in S210 the numerical value of M can be it is pre-set.For example, the value of M is 6.
Internet of things equipment and the second equipment establish communication connection according to method 200 as a result,.Later, when internet of things equipment generate need authenticated in block chain network data when, can method according to Fig.4, communicated with the second equipment.As shown in figure 4, method 300 includes:
S301, internet of things equipment produce the data for needing to be authenticated in block chain network;
S302, internet of things equipment send the data to the second equipment;
Optionally, internet of things equipment can directly send the data to internet of things equipment or internet of things equipment generates the block including the data, and block is sent to the second equipment.
S303, the second equipment authenticate the data broadcasting received into block chain network;
Optionally, the second equipment generates the block for carrying the data according to the block format in block chain network, and block is broadcast in block chain.Alternatively, if in S302 the second equipment receive be the carrying data that internet of things equipment is sent block, the block received is directly broadcast in block chain network by the second equipment.
S304, the equipment in block chain network authenticate the data;
Optionally, the method that the equipment in block chain network authenticates data can use the above proof of work method or equity method of verification, and to avoid repeating, details are not described herein.
S305, the second equipment determine that data have already passed through n times certification;
Second equipment is according to the depth of the block chain broadcasted in current network, it can determines whether data have already passed through n times certification.
S306, the second equipment send certification to internet of things equipment and complete message;
The certification completes message and is used to that its data generated of internet of things equipment to be notified to have already been through n times and recognize Card;
S307, internet of things equipment delete the data of storage;
Optionally, after message is completed in the certification that internet of things equipment receives the transmission of the second equipment, confirm that the data of generation have carried out n times certification by the equipment in block chain network, all internet of things equipment delete the data being locally stored.
It can be seen that, data are handled using the method in method 100 to 300, it is communicated to connect due to enabling to the equipment in internet of things equipment and block chain network to establish, so that the data broadcasting authenticate that the equipment in block chain network generates internet of things equipment authenticates data into block chain network, and through the equipment in block chain network.It is highly beneficial particularly with low cost, the internet of things equipment of low-power consumption thus, it is possible to which the calculating force request of internet of things equipment is effectively reduced.
But, when the quantity of internet of things equipment is more, multiple internet of things equipment may select to establish communication connection with the same equipment in block chain network, access interference can thus occur, and different data may have different access delay and certification delay requirement, therefore it on the basis of the above method 100 to 300, needs to reduce the collision probability when access of multiple internet of things equipment, meets requirement of the different data to access delay and authentication time delay.
Fig. 5 shows the data processing method based on block chain according to the application another embodiment, by taking the first equipment is internet of things equipment as an example, as shown in figure 5, method 400 includes:
S401, the second equipment determine cryptographic Hash requirement;
Optionally, the second equipment determines that cryptographic Hash requirement or the second equipment determine cryptographic Hash requirement according to the access request amount in certain access peak period of prediction according to the quantity for the internet of things equipment for currently establishing communication connection.For example, the number of the biggish cryptographic Hash requirement of broadcast difficulty, the bit that the larger low level that can be understood as requirement generation of difficulty here is zero is more than certain threshold value when the quantity of the determining internet of things equipment for currently establishing communication connection of the second equipment is more.For example, it is zero or preset amount that the cryptographic Hash generated, which requires the bit for the low level preset quantity that can be cryptographic Hash,.
S402, its cryptographic Hash determined of the second device broadcasts require;
S403, internet of things equipment generate the cryptographic Hash for meeting cryptographic Hash requirement, establish communicate to connect with the second equipment later;
Internet of things equipment and the second equipment method for establishing communication connection are identical with method 200 in S403, and to avoid repeating, details are not described herein.
S404, internet of things equipment send the data for needing to be authenticated in block chain network to the second equipment;
S405, the second equipment authenticate the data broadcasting received into block chain network;
Optionally, second equipment by data broadcasting into block chain network when, it can strive for verifying power simultaneously, when the second equipment obtains certification temporary, second equipment data of all internet of things equipment according to present in current block chain network generate new block, and be serially connected in the block of generation in current block chain, block chain is broadcast in block chain network later.
S406, the second equipment update cryptographic Hash requirement;
Optionally, the second equipment can be according to the access amount of internet of things equipment, perhaps according to the access request amount or access interference probability in certain access peak period of prediction, adjustment cryptographic Hash requirement.For example, second equipment, which determines, embarrasses lesser cryptographic Hash requirement when the second equipment determines that current access request is less or access interference probability is less.
S407, the second equipment send updated cryptographic Hash requirement to internet of things equipment;
S408, the cryptographic Hash requirement of the second equipment of internet of things equipment more new record;
S409 sends data to the second equipment, realizes the certification of data when the internet of things equipment data in need authenticated in block chain network again.
Optionally, in S401 or S406, the second equipment can determine different cryptographic Hash requirements according to different types of service.Corresponding, in S402 or S407, the second equipment requires multiple cryptographic Hash to be sent to internet of things equipment.When internet of things equipment generates the data for needing to be authenticated in block chain network, internet of things equipment is according to the types of service of data, determine the cryptographic Hash requirement that the cryptographic Hash generated needs to meet, after generating the cryptographic Hash for meeting cryptographic Hash requirement, it establishes and communicates to connect with the second equipment, realize the certification of data.
Alternatively, internet of things equipment is grouped (for example, can be grouped according to the ability of internet of things equipment) by the second equipment in S401 or S406, different cryptographic Hash requirements is generated according to different groupings.Corresponding, in S402 or S407, the second equipment requires multiple cryptographic Hash to be sent to internet of things equipment.When internet of things equipment generates the data for needing to be authenticated in block chain network, grouping of the internet of things equipment according to belonging to oneself, determine the cryptographic Hash requirement that the cryptographic Hash generated needs to meet, after generating the cryptographic Hash for meeting cryptographic Hash requirement, it establishes and communicates to connect with the second equipment, realize the certification of data.Wherein, the second equipment can carry the grouping information of internet of things equipment in broadcast message, and internet of things equipment determines the grouping belonging to oneself according to grouping information.
As a result, according to the method for the processing data in method 400, it can guarantee that the equipment in internet of things equipment and block chain network establishes the flexibility of communication connection, so that communication system has good retractility.
In the embodiment of the present application, it when the data that internet of things equipment generates are transaction data, needs to guarantee The confidentiality and integrality of the transaction data of internet of things equipment, it is therefore desirable to which the opposite equip. of internet of things equipment can verify the authenticity of associated transaction data in time.By taking the opposite equip. of internet of things equipment is equally internet of things equipment as an example, the data processing method based on block chain according to the application another embodiment is described, for convenience, the internet of things equipment interacted is respectively labeled as internet of things equipment A and internet of things equipment B.As shown in fig. 6, method 500 includes:
S501, when internet of things equipment A determines that transaction data needs are authenticated in block chain network, internet of things equipment A sends cryptographic Hash relevant to transaction data to internet of things equipment B;
It should be noted that this transaction data that internet of things equipment A is determined can be the transaction data between internet of things equipment A and internet of things equipment B, it is also possible to the transaction data of internet of things equipment A He other internet of things equipment.
Optionally, cryptographic Hash relevant to transaction data is to be generated by internet of things equipment A according to transaction data, and transaction data here can be to be crossed by the public key encryption of internet of things equipment B, is also possible to cross without the public key encryption of internet of things equipment B.The embodiment of the present application is not construed as limiting the specific method for generating cryptographic Hash.
Optionally, cryptographic Hash relevant to transaction data can be sent to internet of things equipment B by its agent node (for example, second equipment in Fig. 6) or other communication nodes by internet of things equipment A.
S502, internet of things equipment A send transaction data to the second equipment;
Optionally, internet of things equipment A can be not encrypted transaction data to the transaction data that the second equipment is sent.Or the transaction data that internet of things equipment A is sent is to carry out encrypted transaction data only with the public key of internet of things equipment B.Or the transaction data that internet of things equipment A is sent is after first being encrypted using the public key of internet of things equipment B, encrypted transaction data is carried out using the private key of the second equipment again, in such cases, when second equipment receives transaction data, pass through the public key decryptions transaction data of the second equipment, to ensure the legitimacy of transaction data that internet of things equipment A is sent to the second equipment, the transaction data of the public key encryption using internet of things equipment B is broadcast in block chain network by the second equipment later, is authenticated.
Transaction data is broadcast in block chain network and authenticates by S503, the second equipment;
S504, the second equipment confirm that transaction data completes n times certification in block chain network;
S505, the second equipment send certification to internet of things equipment A and complete message;
Optionally, Merkle tree information and block information including data corresponding with transaction data in block chain network in message are completed in certification, block information is used to indicate the block that data corresponding with transaction data are carried in block chain network, and data corresponding with transaction data are substantially transaction in block chain network here Data of the data in block chain network after n times authenticate.
Or, the second equipment directly sends the Merkle tree information and block information of data corresponding with transaction data in block chain network to internet of things equipment A in S505, internet of things equipment A is when receiving the two information, it can determines that transaction data has already passed through this certification of N.
S506, the second equipment or other block chain equipment send the Merkle tree information and block information of the data corresponding with transaction data stored in block chain network to internet of things equipment B;
Optionally, the multiple equipment in block chain network, which can send Merkle tree information and block information, internet of things equipment B to internet of things equipment B simultaneously, can compare the multiple information received, and thus, it is possible to further increase the reliability of communication system.
Optionally, internet of things equipment B receives the Merkle tree information and block information of its agent node transmission.Or the received Merkle tree information of internet of things equipment B and block information are sent by distinct device.
S507, internet of things equipment B verify the integrality of data corresponding with the transaction data in block chain network;
Optionally, internet of things equipment B determines the block for carrying corresponding with transaction data data according to block information, later internet of things equipment B according to and the Merkle tree information of the corresponding data of transaction data data corresponding with transaction data are found from this block.Here block information is the height or mark of block.
Optionally, if cryptographic Hash relevant to transaction data is to be generated by internet of things equipment A according to the transaction data for the public key encryption of internet of things equipment B not being used to cross in S501, and internet of things equipment A to the transaction data that the second equipment is sent is not cross by the public key encryption of internet of things equipment B in S502, when internet of things equipment B obtains data corresponding with transaction data from block, the cryptographic Hash for calculating the data corresponding with transaction data got, compares the cryptographic Hash of calculating later and whether the cryptographic Hash received is consistent.If consistent, internet of things equipment B thinks that the data got are completely, and otherwise, internet of things equipment B thinks that the data got are incomplete.
Or, if cryptographic Hash relevant to transaction data is to be generated by internet of things equipment A according to the transaction data for the public key encryption of internet of things equipment B not being used to cross in S501, and in S502, internet of things equipment A to the transaction data that the second equipment is sent is crossed using the public key encryption of internet of things equipment B, when the data for the correspondence transaction data that internet of things equipment B is got from block, internet of things equipment is first decrypted the data got, and the cryptographic Hash of the data after decryption is calculated, compare the cryptographic Hash of calculating later and whether the cryptographic Hash received is consistent.If consistent, internet of things equipment B thinks the data got It is completely, otherwise, internet of things equipment B thinks that the data got are incomplete.
Or, if cryptographic Hash relevant to transaction data is to be generated by internet of things equipment A according to the transaction data that the public key encryption using internet of things equipment B is crossed in S501, and in S502, internet of things equipment A to the transaction data that the second equipment is sent is crossed using the public key encryption of internet of things equipment B, when internet of things equipment B obtains data corresponding with transaction data from block, the cryptographic Hash for calculating the data corresponding with transaction data got, compares the cryptographic Hash of calculating later and whether the cryptographic Hash received is consistent.If consistent, internet of things equipment B thinks that the data got are completely, and otherwise, internet of things equipment B thinks that the data got are incomplete.
S508 sends confirmation message, it is complete that confirmation message is used to indicate data corresponding with transaction data if internet of things equipment B verifying data corresponding with transaction data are complete.
Optionally, the confirmation message that internet of things equipment B is sent can also be authenticated by the equipment in block chain network.
Optionally, in S501, internet of things equipment A does not send cryptographic Hash to internet of things equipment B, but transaction data is sent to internet of things equipment B, when internet of things equipment B receives transaction data, internet of things equipment B determines the cryptographic Hash of the transaction data received, is later compared the cryptographic Hash of the cryptographic Hash of the transaction data of calculating and the data corresponding with transaction data obtained from block, determines whether the data got are complete.
Such as, if internet of things equipment A to the transaction data that internet of things equipment B is sent is crossed by the public key encryption of internet of things equipment B in S501, and internet of things equipment A to the transaction data that the second equipment is sent is also to cross by the public key encryption of internet of things equipment B in S502, the cryptographic Hash for the transaction data that the internet of things equipment A that internet of things equipment B is directly received is sended over, and the cryptographic Hash of the data got, the two cryptographic Hash are compared later.
Or, if internet of things equipment A to the transaction data that internet of things equipment B is sent is crossed by the public key encryption of internet of things equipment B in S501, and internet of things equipment A to the transaction data that the second equipment is sent is crossed without the public key encryption of internet of things equipment B in S502, the Internet of Things A received the transaction data sended over is decrypted internet of things equipment B, the cryptographic Hash of the data after decryption is calculated later, internet of things equipment compares the two cryptographic Hash after the cryptographic Hash that the data got are calculated.
Or, if internet of things equipment A to the transaction data that internet of things equipment B is sent is crossed without the public key encryption of internet of things equipment B in S501, and internet of things equipment A to the transaction data that the second equipment is sent is also to cross without the public key encryption of internet of things equipment B in S502, internet of things equipment B The cryptographic Hash for the transaction data that the directly internet of things equipment A that receives is sended over, and the cryptographic Hash of data got, later compare the two cryptographic Hash.
Or, if internet of things equipment A to the transaction data that internet of things equipment B is sent is crossed without the public key encryption of internet of things equipment B in S501, and internet of things equipment A to the transaction data that the second equipment is sent is crossed by the public key encryption of internet of things equipment B in S502, the data that internet of things equipment B first will acquire are decrypted, the cryptographic Hash of the data after decryption is calculated later, internet of things equipment compares the two cryptographic Hash after the cryptographic Hash for receiving the transaction data that internet of things equipment B is sended over is calculated.
It should be noted that the data that internet of things equipment B is got be it is complete, illustrate that data that internet of things equipment B is got with transaction data are identical, that is to say, that transaction data in block chain network into crossing after n times authenticate, not by malicious modification.
In above-mentioned all embodiments, the different data that internet of things equipment generates might have different memory requirements, therefore can further be handled according to the memory requirement of data data.By taking the opposite equip. of internet of things equipment is equally internet of things equipment as an example, the data processing method based on block chain according to the application another embodiment is described, for convenience, the internet of things equipment interacted is respectively labeled as internet of things equipment A and internet of things equipment B.As shown in fig. 7, method 600 includes:
S601, internet of things equipment A and internet of things equipment B determine that the transaction data of both sides is already recorded in block chain network;
Optionally, one side internet of things equipment A and internet of things equipment B determines that the transaction data of both sides is already recorded in block chain network, and another aspect internet of things equipment A and internet of things equipment B can further get the Merkle tree information and block information of data corresponding with transaction data.Specifically, agent node A will trade and issue internet of things equipment A by the instruction information that block chain network completes verifying, and carry Merkle tree information and block information.In addition, the information that verifying is completed in transaction is sent to internet of things equipment B by agent node A or agent node B, and carry Merkle tree information and block information.
S602, internet of things equipment A and/or internet of things equipment B determine that data corresponding with transaction data can be deleted from block chain network;
Optionally, internet of things equipment A determines that data corresponding with transaction data can be deleted from block chain network according to the default storage duration of transaction data, perhaps internet of things equipment B can be deleted from block chain network according to the determining data corresponding with transaction data of the default storage duration of transaction data or internet of things equipment A and internet of things equipment B determination data corresponding with transaction data can be from block chain through consultation It is deleted in network.
The equipment of S603, internet of things equipment A and/or internet of things equipment B into block chain network, which is sent, deletes instruction information;
Optionally, delete may include the corresponding Merkle tree information of corresponding with transaction data data and block information in instruction information.
Optionally, internet of things equipment A is sent by equipment of second equipment into block chain network and deletes instruction information, realizes the deletion of data.Although the second equipment, by obtaining verifying power, can also realize the deletion of data as the other equipment in block chain network it should be noted that the second equipment, which will delete instruction information, is sent to the equipment in block chain network.
S604 receives the equipment in the block chain network for the deletion instruction information that internet of things equipment A or internet of things equipment B is sent and broadcasts deletion instruction information in block chain network, realizes the deletion of data corresponding with transaction data;
Optionally, after deleting instruction information broadcast in block chain network, the equipment in block chain network starts to fight for certification power, obtains the equipment of certification power when generating new block chain, confirmation can delete corresponding with transaction data.Such as according to the Merkle tree information and block information deleted in instruction information, determine the specific location of data corresponding with transaction data within a block, data corresponding with transaction data are deleted when secondary generation block chain, or, instruction information can will be deleted as special transaction data, after the certification of N number of equipment in block chain network, being deleted by the equipment that n-th gets certification power should data corresponding with transaction data.
It should be noted that the other equipment in method 600 in block chain network can consider the agent equipment for referring to internet of things equipment B.
Thereby, it is possible to reduce the storage burden of block chain network, the transmission bandwidth that the transmission of block chain needs to occupy is reduced.
Combine Fig. 2 to Fig. 7 that the data processing method based on block chain according to the embodiment of the present application is described in detail above, below in conjunction with Fig. 8 detailed description according to the equipment of the embodiment of the present application, as shown in figure 8, equipment 10 includes:
Processing module 11, for establishing the communication connection of the equipment Yu the second equipment, second equipment is the equipment in block chain network;
The processing module 11 is also used to generate and determine that the first data needs are authenticated in the block chain network;
Transceiver module 12, for sending first data to second equipment, to realize described first Data are authenticated by the equipment in the block chain network.
Therefore, according to the equipment of the embodiment of the present application when generating the first data for needing to be authenticated in block chain network, the second equipment into block chain network sends the first data, so that the first data are sent to the equipment in block chain network by the second equipment, realizes the certification of the first data.Due to being authenticated using block chain network to data, it can reduce the construction and maintenance cost of communication system, improve the security performance of system.And the equipment that the data of equipment are sent in block chain network is authenticated by the second equipment, can reduce the Capability Requirement to equipment.
In the embodiment of the present application, optionally, the transceiver module 12 is specifically used for: the second equipment of Xiang Suoshu sends the first message crossed using the first public key encryption, it include the first information in the first message, first public key is the public key of second equipment, and the first information is for requesting second equipment to authenticate the equipment that the data that the needs that the equipment generates authenticate in the block chain network are sent in the block chain network;The second information that second equipment is sent is received, second information is used to indicate the second equipment confirmation and can authenticate the equipment that the data that the needs that the equipment generates authenticate in the block chain network are sent in the block chain network.
It in the embodiment of the present application, optionally, further include the second public key in the first message, second public key is the public key of the equipment.
In the embodiment of the present application, optionally, the transceiver module 12 is specifically used for: receiving second information crossed using second public key encryption that second equipment is sent.
In the embodiment of the present application, optionally, the processing module 11 is also used to: generating the block for carrying first data;
The transceiver module 12 is specifically used for sending the block to second equipment.
In the embodiment of the present application, optionally, the transceiver module 12 is also used to: being received the third information that second equipment is sent, is included the requirement of the first Hash HASH value in the third information;
The processing module 11 is also used to generate the first HASH value for meeting the first HASH value requirement.
In the embodiment of the present application, optionally, it is required in the third information including at least one HASH value, includes the first HASH value requirement at least one HASH value requirement, each HASH value requirement at least one HASH value requirement is corresponding at least one type of service;
Wherein, the processing module 11 is also used to: according to the corresponding type of service of first data, determining the first HASH value.
It in the embodiment of the present application, optionally, include that at least one HASH value is wanted in the third information It asks, includes the first HASH value requirement at least one HASH value requirement, each HASH value at least one HASH value requirement requires corresponding at least one equipment group;
Wherein, the processing module 11 is also used to: according to equipment group belonging to the equipment, determining the first HASH value.
In the embodiment of the present application, optionally, the transceiver module 12 is also used to: sending the 2nd HASH value relevant to first data to third equipment, the 2nd HASH value determines that the integrality of the second data, the second data are data of first data in the block chain network after certification for the third equipment.
In the embodiment of the present application, optionally, first data are that the public key encryption by the third equipment is crossed.
In the embodiment of the present application, optionally, the processing module is also used to: determining the 2nd HASH value according to first data.
In the embodiment of the present application, optionally, first data are that the public key encryption by third equipment is crossed, the transceiver module 12 is also used to: Xiang Suoshu third equipment sends first data, in order to which the third equipment is after determining the 2nd HASH value according to first data, determine that the integrality of the second data, the second data are data of first data in the block chain network after certification according to the 2nd HASH value.
In the embodiment of the present application, optionally, the transceiver module 12 is also used to: receiving the 4th information that second equipment is sent, the 4th information is used to indicate first data and authenticates in the block chain network by n times, and the value of N is preset value.
In the embodiment of the present application, optionally, the transceiver module 12 is also used to: receiving the corresponding Mei Keer Merkle tree information of the second data and block information that second equipment is sent, second data are data of first data in the block chain network after certification, and the block information is used to indicate the block that the second data are carried in the block chain network.
In the embodiment of the present application, optionally, the processing module 11 is also used to: being determined and is deleted the second data from the block chain network, the second data are data of first data in the block chain network after certification;
The transceiver module 12, the equipment being also used into the block chain network send the 5th information, and the equipment that the 5th information is used to indicate in the block chain network deletes the second data from the block chain network.
It in the embodiment of the present application, optionally, include identification information and/or the second number in the 5th information According to corresponding Merkle tree information, the identification information is for identifying the second data.
In the embodiment of the present application, optionally, the processing module 11 is also used to: deleting first data of the equipment being locally stored.
It should be understood that the equipment 10 in the embodiment of the present invention is embodied in the form of functional unit.In an optional example, it will be understood by those skilled in the art that equipment 10 can correspond to the first equipment in above-mentioned some embodiments, it can be used for executing each process corresponding with the first equipment and/or step in above method embodiment, to avoid repeating, details are not described herein.
Specifically, in embodiments of the present invention, processing module 11 can be realized by processor.Transceiver module 12 can be realized by transceiver, it should be appreciated that transceiver can be the device for being provided simultaneously with receive capabilities and sending function, is also possible to have the receiving device of receive capabilities and has the assembled devices of the sending device of sending function.
Fig. 9 shows the equipment according to another embodiment of the application, as shown in figure 9, equipment 20 includes:
Processing module 21, for establishing the communication connection of the equipment Yu the first equipment, the equipment is the equipment in block chain network;
Transceiver module 22, the first data authenticated in the block chain network for receiving the needs generated by first equipment that first equipment is sent;
The transceiver module 22, the equipment being also used into the block chain network send first data, realize the certification of first data.
Therefore, the first data that the needs that the first equipment generates are authenticated in block chain network are received according to the equipment of the embodiment of the present application, and the first data is sent to the equipment in block chain network, realize the certification of the first data.Due to being authenticated using block chain network to data, it can reduce the construction and maintenance cost of communication system, improve the security performance of system.And the equipment that the data of the first equipment are sent in block chain network is authenticated by equipment, can reduce the Capability Requirement to the first equipment.
In the embodiment of the present application, optionally, the transceiver module 22 is specifically used for: receiving the first message that the first public key encryption of use that first equipment is sent is crossed, it include the first information in the first message, first public key is the public key of the equipment, and the first information is for requesting the equipment to authenticate the equipment that the data that the needs that first equipment generates authenticate in the block chain network are sent in the block chain network;The second information is sent to first equipment, second information is used to indicate the equipment confirmation and can authenticate the equipment that the data that the needs that first equipment generates authenticate in the block chain network are sent in the block chain network.
It in the embodiment of the present application, optionally, further include the second public key in the first message, described Two public keys are the public key of first equipment.
In the embodiment of the present application, optionally, the transceiver module 22 is specifically used for: the first equipment of Xiang Suoshu sends second information crossed using second public key encryption.
In the embodiment of the present application, optionally, the processing module 21 is also used to: generating the digital cash of preset quantity.
In the embodiment of the present application, optionally, the transceiver module 22 is also used to: the equipment in Xiang Suoshu block chain network sends the relevant information of the digital cash;
The processing module 21, be also used to if it is determined that the digital cash in the block chain network by M certification, confirm that the digital cash comes into force, the value of M is preset value.
In the embodiment of the present application, optionally, the transceiver module 22 is specifically used for: receiving the block for carrying first data that first equipment is sent;Equipment into the block chain network sends the block of carrying first data.
In the embodiment of the present application, optionally, the processing module 21 is also used to: the block format required according to the block chain network generates the block for carrying first data;
The transceiver module 22 is also used to the block that the equipment into the block chain network sends carrying first data.
In the embodiment of the present application, optionally, the processing module 21 is also used to: determining the requirement of the first Hash HASH value;
The transceiver module 22, specifically for sending third information to first equipment, it include the first HASH value requirement in the third information, so that first equipment is established with the equipment and communicated to connect after generating the first HASH value for meeting the first HASH value requirement.
In the embodiment of the present application, optionally, it is required in the third information including at least one HASH value, includes the first HASH value requirement at least one HASH value requirement, each HASH value requirement at least one HASH value requirement is corresponding at least one type of service;
Wherein, the processing module 21 is specifically used for: determining at least one HASH value requirement.
In the embodiment of the present application, optionally, it is required in the third information including at least one HASH value, includes the first HASH value requirement at least one HASH value requirement, each HASH value requirement at least one HASH value requirement is corresponding at least one equipment group;
Wherein, the processing module 21 is specifically used for: determining at least one HASH value requirement.
In the embodiment of the present application, optionally, the transceiver module 22 is also used to: receiving the 2nd HASH value relevant to first data that first equipment is sent, the 2nd HASH value is used for Third equipment determines that the integrality of the second data, the second data are data of first data in the block chain network after certification;The 2nd HASH value is sent to the third equipment.
In the embodiment of the present application, optionally, first data are that the public key encryption by the third equipment is crossed.
In the embodiment of the present application, optionally, the 2nd HASH value is to be determined by first equipment according to first data.
In the embodiment of the present application, optionally, first data are that the public key encryption by third equipment is crossed, and the transceiver module 22 is also used to: receiving first data;First data are sent to the third equipment, in order to which the third equipment is after determining the 2nd HASH value according to first data, determine that the integrality of the second data, the second data are data of first data in the block chain network after certification according to the 2nd HASH value.
In the embodiment of the present application, optionally, the transceiver module 22 is also used to: if the processing module 21 determines that first data authenticate in the block chain network by n times, the second data, which are sent, to the third equipment corresponds to Mei Keer Merkle tree information and block information, the block information is used to indicate the block that second data are carried in the block chain network, and the second data are data of first data in the block chain network after certification.
In the embodiment of the present application, optionally, the transceiver module 22 is also used to: if the processing module 21 determines that first data authenticate in the block chain network by n times, the 4th information is sent to first equipment, 4th information is used to indicate first data and authenticates in the block chain network by n times, wherein, the value of N is preset value.
In the embodiment of the present application, optionally, the transceiver module 22 is also used to: if the processing module 21 determines that first data authenticate in the block chain network by n times, the corresponding Merkle tree information of the second data and block information are sent to first equipment, the block information is used to indicate the block that the second data are carried in the block chain network, and the second data are data of first data in the block chain network after certification.
In the embodiment of the present application, optionally, the transceiver module 22 is also used to: receiving the 5th information that first equipment is sent, the equipment that 5th information is used to indicate in the block chain network deletes the second data from the block chain network, and the second data are data of first data in the block chain network after certification.
It in the embodiment of the present application, optionally, include identification information and/or the corresponding Merkle tree information of the second data in the 5th information, the identification information is for identifying second data.
It should be understood that the equipment 20 in the embodiment of the present invention is embodied in the form of functional unit.In an optional example, it will be understood by those skilled in the art that equipment 20 can correspond to the second equipment in above-mentioned some embodiments, it can be used for executing each process corresponding with the second equipment and/or step in above method embodiment, to avoid repeating, details are not described herein.
Specifically, in embodiments of the present invention, processing module 21 can be realized by processor.Transceiver module 22 can be realized by transceiver, it should be appreciated that transceiver can be the device for being provided simultaneously with receive capabilities and sending function, is also possible to have the receiving device of receive capabilities and has the assembled devices of the sending device of sending function.
Figure 10 shows the equipment according to the application another embodiment, and as shown in Figure 10, equipment 30 includes:
Transceiver module 31, for obtaining the corresponding Mei Keer Merkle tree information of the second data and block information, the block information is used to indicate the block that second data are carried in block chain network, second data are data of first data in the block chain network after certification, and first data are the data that the needs that the first equipment generates are authenticated in the block chain network;
The transceiver module 31 is also used to obtain the second data from the block of the second data of carrying according to the Merkle tree information;
Processing module 32, for determining the integrality of the second data.
Therefore, it can be according to the Merkle tree information and block information received according to the equipment of the application, corresponding second data of the first data that are authenticated in block chain network of needs generated with the first equipment stored in block chain network are obtained, and confirm the integrality of the second data.Thereby, it is possible to guarantee the confidentiality of data and integrality, so that the data stored in block chain network have higher reliability.
In the embodiment of the present application, optionally, if second data are complete, the transceiver module 31 is also used to: the equipment in Xiang Suoshu block chain network sends confirmation message, and it is complete that the confirmation message is used to indicate the second data.
In the embodiment of the present application, optionally, the transceiver module 31 is specifically used for: receiving the Merkle tree information and the block information that the second equipment is sent, wherein second equipment is the equipment in the block chain network.
In the embodiment of the present application, optionally, second equipment is that first data are sent to the equipment recognized in the block chain network.
In the embodiment of the present application, optionally, the processing module 32 is also used to: determining the second Hash HASH value relevant to first data;According to the 3rd HASH value relevant to the second data and The consistency of the 2nd HASH value, determines the integrality of the second data.
In the embodiment of the present application, optionally, the processing module 32 is specifically used for: receiving the 2nd HASH value, wherein the 2nd HASH value is to be determined by first equipment according to first data.
In the embodiment of the present application, optionally, first data are that the public key encryption by the equipment is crossed.
In the embodiment of the present application, optionally, first data are that the public key encryption by the equipment is crossed, and the transceiver module 31 is also used to: receiving first data that first equipment is sent;
Wherein, the processing module 32 is specifically used for: according to first data, determining the 2nd HASH value.
In the embodiment of the present application, optionally, the processing module 32 is also used to: determination deletes the second data from the block chain network;
The transceiver module 31, the equipment being also used into the block chain network send the 5th information, and the equipment that the 5th information is used to indicate in the block chain network deletes the second data from the block chain network.
It in the embodiment of the present application, optionally, include identification information and/or the corresponding Merkle tree information of the second data in the 5th information, the identification information is for identifying the second data.
It should be understood that the equipment 30 in the embodiment of the present invention is embodied in the form of functional unit.In an optional example, it will be understood by those skilled in the art that equipment 30 can correspond to the internet of things equipment B in above-mentioned some embodiments, it can be used for executing each process corresponding with internet of things equipment B and/or step in above method embodiment, to avoid repeating, details are not described herein.
Specifically, in embodiments of the present invention, processing module 32 can be realized by processor.Transceiver module 31 can be realized by transceiver, it should be appreciated that transceiver can be the device for being provided simultaneously with receive capabilities and sending function, is also possible to have the receiving device of receive capabilities and has the assembled devices of the sending device of sending function.
Figure 11 shows the equipment according to the application another embodiment.As shown in figure 11, equipment 100 includes processor 110 and transceiver 120, and processor 110 is connected with transceiver 120, and optionally, which further includes memory 130, and memory 130 is connected with processor 110.Wherein, processor 110, memory 130 and transceiver 120 can be communicated with each other by internal connecting path.Wherein, processor 110, for establishing the communication connection of the equipment Yu the second equipment, second equipment is the equipment in block chain network;Processor 110, be also used to generate and determine the first data need in the block chain network into Row certification;Transceiver 120, for sending first data to second equipment, to realize that first data are authenticated by the equipment in the block chain network.
Therefore, according to the equipment of the embodiment of the present application when generating the first data for needing to be authenticated in block chain network, the second equipment into block chain network sends the first data, so that the first data are sent to the equipment in block chain network by the second equipment, realizes the certification of the first data.Due to being authenticated using block chain network to data, it can reduce the construction and maintenance cost of communication system, improve the security performance of system.And the equipment that the data of equipment are sent in block chain network is authenticated by the second equipment, can reduce the Capability Requirement to equipment.
The equipment 10 of corresponding the embodiment of the present application is referred to according to the equipment 100 of the embodiment of the present application, also, each unit/module in the equipment and other above-mentioned operation and/or functions are respectively for the corresponding process in the above method, for sake of simplicity, details are not described herein.
Figure 12 shows the schematic block diagram of the equipment according to the application another embodiment, and as shown in figure 12, equipment 200 includes: processor 210 and transceiver 220, processor 210 is connected with transceiver 220, optionally, the equipment 200 further includes memory 230, and memory 230 is connected with processor 210.Wherein, processor 210, memory 230 and transceiver 220 can be communicated with each other by internal connecting path.Wherein, the processor 210, for establishing the communication connection of the equipment Yu the first equipment, the equipment is the equipment in block chain network;The transceiver 220, the first data authenticated in the block chain network for receiving the needs generated by first equipment that first equipment is sent;The transceiver 220, the equipment being also used into the block chain network send first data, realize the certification of first data.
Therefore, the first data that the needs that the first equipment generates are authenticated in block chain network are received according to the equipment of the embodiment of the present application, and the first data is sent to the equipment in block chain network, realize the certification of the first data.Due to being authenticated using block chain network to data, it can reduce construction and the maintenance cost of communication system, improve the security performance of system.And the equipment that the data of the first equipment are sent in block chain network is authenticated by equipment, can reduce the Capability Requirement to the first equipment.
The equipment 20 of corresponding the embodiment of the present application is referred to according to the equipment 200 of the embodiment of the present application, also, each unit/module in the equipment and other above-mentioned operation and/or functions are respectively for the corresponding process in the above method, for sake of simplicity, details are not described herein.
Figure 13 shows the schematic block diagram of the equipment according to the application another embodiment, and as shown in figure 13, equipment 300 includes: processor 310 and transceiver 320, processor 310 is connected with transceiver 320, optionally, the equipment 300 further includes memory 330, and memory 330 is connected with processor 310. Wherein, processor 310, memory 330 and transceiver 320 can be communicated with each other by internal connecting path.Wherein, the transceiver 320, for obtaining the corresponding Mei Keer Merkle tree information of the second data and block information, the block information is used to indicate the block that second data are carried in block chain network, second data are data of first data in the block chain network after certification, and first data are the data that the needs that the first equipment generates are authenticated in the block chain network;The transceiver 320 is also used to obtain the second data from the block of the second data of carrying according to the Merkle tree information;The processor 310, for determining the integrality of the second data.
Therefore, it can be according to the Merkle tree information and block information received according to the equipment of the application, corresponding second data of the first data that are authenticated in block chain network of needs generated with the first equipment stored in block chain network are obtained, and confirm the integrality of the second data.Thereby, it is possible to guarantee the confidentiality of data and integrality, so that the data stored in block chain network have higher reliability.
The equipment 30 of corresponding the embodiment of the present application is referred to according to the equipment 300 of the embodiment of the present application, also, each unit/module in the equipment and other above-mentioned operation and/or functions are respectively for the corresponding process in the above method, for sake of simplicity, details are not described herein.
It is appreciated that the processor in the embodiment of the present application can be a kind of IC chip, the processing capacity with signal.Above-mentioned processor can be general processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present application.General processor can be microprocessor or the processor is also possible to any conventional processor etc..
Memory in the embodiment of the present application can be volatile memory or nonvolatile memory, or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), Erasable Programmable Read Only Memory EPROM (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as External Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDR SDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links dynamic random access memory (Synchlink DRAM,) and direct rambus random access memory (Direct Rambus RAM, DR RAM) SLDRAM.It should be noted that the memory of system and method described herein is intended to include but is not limited to the memory of these and any other suitable type.
Those of ordinary skill in the art may be aware that unit described in conjunction with the examples disclosed in the embodiments of the present disclosure and algorithm steps, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Professional technician can use different methods to achieve the described function each specific application, but this realization is it is not considered that exceed scope of the present application.
It is apparent to those skilled in the art that for convenience and simplicity of description, system, the specific work process of device and unit of foregoing description can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods may be implemented in other ways.Such as, the apparatus embodiments described above are merely exemplary, such as, the division of the unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, and component shown as a unit may or may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in each embodiment of the application can integrate in one processing unit, it is also possible to each unit and physically exists alone, can also be integrated in one unit with two or more units.
If the function is realized in the form of SFU software functional unit and when sold or used as an independent product, can store in a computer readable storage medium.Based on this understanding, substantially the part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products the technical solution of the application in other words, which is stored in a storage medium In, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes all or part of the steps of each embodiment the method for the application.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), the various media that can store program code such as magnetic or disk.
It is described above; the only specific embodiment of the application, but the protection scope of the application is not limited thereto, and anyone skilled in the art is within the technical scope of the present application; it can easily think of the change or the replacement, should all cover within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.

Claims (95)

  1. A kind of data processing method based on block chain characterized by comprising
    First equipment and the second equipment, which are established, to be communicated to connect, and second equipment is the equipment in block chain network;
    The first data needs that first equipment determines that first equipment generates are authenticated in the block chain network;
    First equipment sends first data to second equipment, to realize that first data are authenticated by the equipment in the block chain network.
  2. The method according to claim 1, wherein first equipment and the second equipment are established and are communicated to connect, comprising:
    First equipment sends the first message crossed using the first public key encryption to second equipment, it include the first information in the first message, first public key is the public key of second equipment, and the first information is for requesting second equipment to authenticate the equipment that the data that the needs that first equipment generates authenticate in the block chain network are sent in the block chain network;
    First equipment receives the second information that second equipment is sent, and second information is used to indicate the second equipment confirmation and can authenticate the equipment that the data that the needs that first equipment generates authenticate in the block chain network are sent in the block chain network.
  3. According to the method described in claim 2, it is characterized in that, further including the second public key in the first message, second public key is the public key of first equipment.
  4. According to the method described in claim 3, it is characterized in that, first equipment receives the second information that the second equipment is sent, comprising:
    First equipment receives second information crossed using second public key encryption that second equipment is sent.
  5. Method according to claim 1 to 4, which is characterized in that first equipment sends first data to second equipment, comprising:
    First equipment generates the block for carrying first data;
    First equipment sends the block to second equipment.
  6. The method according to any one of claims 1 to 5, which is characterized in that before first equipment and the second equipment establish communication connection, the method also includes:
    First equipment receives the third information that second equipment is sent, and includes the requirement of the first Hash HASH value in the third information;
    First equipment, which generates, meets the first HASH value that the first HASH value requires.
  7. According to the method for claim 6, it is characterized in that, it include the requirement of at least one HASH value in the third information, at least one described HASH value includes the first HASH value requirement in requiring, and each HASH value at least one HASH value requirement requires corresponding at least one type of service;
    Wherein, before first equipment generates and meets the first HASH value that the first HASH value requires, the method also includes:
    First equipment determines the first HASH value according to the corresponding type of service of first data.
  8. According to the method for claim 6, it is characterized in that, it include the requirement of at least one HASH value in the third information, at least one described HASH value includes the first HASH value requirement in requiring, and each HASH value at least one HASH value requirement requires corresponding at least one equipment group;
    Wherein, before first equipment generates and meets the first HASH value that the first HASH value requires, the method also includes:
    First equipment equipment group according to belonging to first equipment, determines the first HASH value.
  9. Method according to any one of claim 1 to 8, which is characterized in that the method also includes:
    First equipment sends the 2nd HASH value relevant to first data to third equipment, the 2nd HASH value determines that the integrality of the second data, the second data are data of first data in the block chain network after certification for the third equipment.
  10. According to the method described in claim 9, it is characterized in that, first data are that public key encryption by the third equipment is crossed.
  11. Method according to claim 9 or 10, which is characterized in that the method also includes:
    First equipment determines the 2nd HASH value according to first data.
  12. Method according to any one of claim 1 to 8, which is characterized in that first data are that the public key encryption by third equipment is crossed, the method also includes:
    First equipment sends first data to the third equipment, in order to which the third equipment is after determining the 2nd HASH value according to first data, determine the integrality of the second data according to the 2nd HASH value, the second data be first data in the block chain network after certification Data.
  13. Method according to any one of claim 1 to 12, which is characterized in that the method also includes:
    First equipment receives the 4th information that second equipment is sent, and the 4th information is used to indicate first data and authenticates in the block chain network by n times, and the value of N is preset value.
  14. Method according to any one of claim 1 to 12, which is characterized in that the method also includes:
    First equipment receives the corresponding Mei Keer Merkle tree information of the second data and block information that second equipment is sent, second data are data of first data in the block chain network after certification, and the block information is used to indicate the block that the second data are carried in the block chain network.
  15. According to claim 1 to method described in any one of 14, which is characterized in that the method also includes:
    First equipment is determined deletes the second data from the block chain network, and the second data are data of first data in the block chain network after certification;
    Equipment of first equipment into the block chain network sends the 5th information, and the equipment that the 5th information is used to indicate in the block chain network deletes the second data from the block chain network.
  16. According to the method for claim 15, which is characterized in that include identification information and/or the corresponding Merkle tree information of the second data in the 5th information, the identification information is for identifying the second data.
  17. According to claim 1 to method described in any one of 16, which is characterized in that the method also includes:
    First equipment deletes first data of first equipment being locally stored.
  18. A kind of data processing method based on block chain characterized by comprising
    Second equipment and the first equipment, which are established, to be communicated to connect, and second equipment is the equipment in block chain network;
    Second equipment receives the first data that the needs generated by first equipment that first equipment is sent authenticate in the block chain network;
    Equipment of second equipment into the block chain network sends first data, realizes the certification of first data.
  19. According to the method for claim 18, which is characterized in that second equipment and first equipment are established and communicated to connect, comprising:
    Second equipment receives the first message that the first public key encryption of use that first equipment is sent is crossed, it include the first information in the first message, first public key is the public key of second equipment, and the first information is for requesting second equipment to authenticate the equipment that the data that the needs that first equipment generates authenticate in the block chain network are sent in the block chain network;
    Second equipment sends the second information to first equipment, and second information is used to indicate the second equipment confirmation and can authenticate the equipment that the data that the needs that first equipment generates authenticate in the block chain network are sent in the block chain network.
  20. According to the method for claim 19, which is characterized in that further include the second public key in the first message, second public key is the public key of first equipment.
  21. According to the method for claim 20, which is characterized in that second equipment sends the second information to first equipment, comprising:
    Second equipment sends second information crossed using second public key encryption to first equipment.
  22. Method described in any one of 8 to 21 according to claim 1, which is characterized in that after second equipment and the first equipment establish communication connection, the method also includes:
    Second equipment generates the digital cash of preset quantity.
  23. According to the method for claim 22, which is characterized in that the method also includes:
    Equipment of second equipment into the block chain network sends the relevant information of the digital cash;
    If second equipment determines that the digital cash authenticates in the block chain network by M times, second equipment confirms that the digital cash comes into force, and the value of M is preset value.
  24. Method described in any one of 8 to 23 according to claim 1, which is characterized in that second equipment receives the first data that the needs generated by first equipment that first equipment is sent authenticate in the block chain network, comprising:
    Second equipment receives the block for carrying first data that first equipment is sent;
    Wherein, equipment of second equipment into the block chain network sends first data, comprising:
    Equipment of second equipment into the block chain network sends the block of carrying first data.
  25. Method described in any one of 8 to 23 according to claim 1, which is characterized in that equipment of second equipment into the block chain network sends first data, comprising:
    The block format that second equipment is required according to the block chain network generates the block for carrying first data;
    Equipment of second equipment into the block chain network sends the block of carrying first data.
  26. Method described in any one of 8 to 25 according to claim 1, which is characterized in that before second equipment and first equipment establish communication connection, the method also includes:
    Second equipment determines the requirement of the first Hash HASH value;
    Second equipment sends third information to first equipment, it include the first HASH value requirement in the third information, so that first equipment is established with second equipment and is communicated to connect after generating the first HASH value for meeting the first HASH value requirement.
  27. According to the method for claim 26, it is characterized in that, it include the requirement of at least one HASH value in the third information, at least one described HASH value includes the first HASH value requirement in requiring, and each HASH value at least one HASH value requirement requires corresponding at least one type of service;
    Wherein, second equipment determines the requirement of the first Hash HASH value, comprising:
    Second equipment determines at least one HASH value requirement.
  28. According to the method for claim 26, it is characterized in that, it include the requirement of at least one HASH value in the third information, at least one described HASH value includes the first HASH value requirement in requiring, and each HASH value at least one HASH value requirement requires corresponding at least one equipment group;
    Wherein, second equipment determines the requirement of the first Hash HASH value, comprising:
    Second equipment determines at least one HASH value requirement.
  29. Method described in any one of 8 to 28 according to claim 1, which is characterized in that the method also includes:
    Second equipment receives the 2nd HASH value relevant to first data that first equipment is sent, the 2nd HASH value determines that the integrality of the second data, the second data are data of first data in the block chain network after certification for third equipment;
    Second equipment sends the 2nd HASH value to the third equipment.
  30. According to the method for claim 29, which is characterized in that first data are that the public key encryption by the third equipment is crossed.
  31. The method according to claim 29 or 30, which is characterized in that the 2nd HASH Value is to be determined by first equipment according to first data.
  32. Method described in any one of 8 to 27 according to claim 1, which is characterized in that first data are that the public key encryption by third equipment is crossed, the method also includes:
    Second equipment receives first data;
    Second equipment sends first data to the third equipment, in order to which the third equipment is after determining the 2nd HASH value according to first data, determine that the integrality of the second data, the second data are data of first data in the block chain network after certification according to the 2nd HASH value.
  33. Method described in any one of 8 to 32 according to claim 1, which is characterized in that the method also includes:
    If second equipment determines that first data authenticate in the block chain network by n times, second equipment sends the second data to the third equipment and corresponds to Mei Keer Merkle tree information and block information, the block information is used to indicate the block that second data are carried in the block chain network, second data are data of first data in the block chain network after certification, wherein, the value of N is preset value.
  34. Method described in any one of 8 to 33 according to claim 1, which is characterized in that the method also includes:
    If second equipment determines that first data authenticate in the block chain network by n times, second equipment sends the 4th information to first equipment, 4th information is used to indicate first data and authenticates in the block chain network by n times, wherein, the value of N is preset value.
  35. Method described in any one of 8 to 33 according to claim 1, which is characterized in that the method also includes:
    If second equipment determines that first data authenticate in the block chain network by n times, second equipment sends the corresponding Merkle tree information of the second data and block information to first equipment, the block information is used to indicate the block that the second data are carried in the block chain network, second data are data of first data in the block chain network after certification, wherein, the value of N is preset value.
  36. Method described in any one of 8 to 35 according to claim 1, which is characterized in that the method also includes:
    Second equipment receives the 5th information that first equipment is sent, and the 5th information is for referring to Show that the equipment in the block chain network deletes the second data from the block chain network, the second data are data of first data in the block chain network after certification.
  37. According to the method for claim 36, which is characterized in that include identification information and/or the corresponding Merkle tree information of the second data in the 5th information, the identification information is for identifying second data.
  38. A kind of data processing method based on block chain characterized by comprising
    Third equipment obtains the corresponding Mei Keer Merkle tree information of the second data and block information, the block information is used to indicate the block that second data are carried in block chain network, second data are data of first data in the block chain network after certification, and first data are the data that the needs that the first equipment generates are authenticated in the block chain network;
    The third equipment obtains the second data from the block of the second data of carrying according to the Merkle tree information;
    The third equipment determines the integrality of the second data.
  39. According to the method for claim 38, which is characterized in that if the third equipment confirms that the second data are complete, the method also includes:
    Equipment of the third equipment into the block chain network sends confirmation message, and it is complete that the confirmation message is used to indicate the second data.
  40. The method according to claim 38 or 39, which is characterized in that the third equipment obtains the corresponding Mei Keer Merkle tree information of the second data and block information, comprising:
    The third equipment receives the Merkle tree information and the block information that the second equipment is sent, wherein second equipment is the equipment in the block chain network.
  41. According to the method for claim 40, which is characterized in that second equipment is that first data are sent to the equipment recognized in the block chain network.
  42. The method according to any one of claim 38 to 41, which is characterized in that the method also includes:
    The third equipment determines the second Hash HASH value relevant to first data;
    Wherein, the third equipment determines the integrality of the second data, comprising:
    The third equipment determines the integrality of the second data according to the consistency of relevant to the second data the 3rd HASH value and the 2nd HASH value.
  43. According to the method for claim 42, which is characterized in that the third equipment determines the second Hash HASH value relevant to first data, comprising:
    The third equipment receives the 2nd HASH value, wherein the 2nd HASH value is to be determined by first equipment according to first data.
  44. According to the method for claim 43, which is characterized in that first data are that the public key encryption by the third equipment is crossed.
  45. According to the method for claim 42, which is characterized in that first data are that the public key encryption by the third equipment is crossed, the method also includes:
    The third equipment receives first data that first equipment is sent;
    Wherein, the third equipment determines the second Hash HASH value relevant to first data, comprising:
    The third equipment determines the 2nd HASH value according to first data.
  46. The method according to any one of claim 38 to 45, which is characterized in that the method also includes:
    The third equipment determination deletes the second data from the block chain network;
    Equipment of the third equipment into the block chain network sends the 5th information, and the equipment that the 5th information is used to indicate in the block chain network deletes the second data from the block chain network.
  47. According to the method for claim 46, which is characterized in that include identification information and/or the corresponding Merkle tree information of the second data in the 5th information, the identification information is for identifying the second data.
  48. A kind of equipment characterized by comprising
    Processing module, for establishing the communication connection of the equipment Yu the second equipment, second equipment is the equipment in block chain network;
    The processing module is also used to generate and determine that the first data needs are authenticated in the block chain network;
    Transceiver module, for sending first data to second equipment, to realize that first data are authenticated by the equipment in the block chain network.
  49. Equipment according to claim 48, which is characterized in that the transceiver module is specifically used for:
    The first message crossed using the first public key encryption is sent to second equipment, it include the first information in the first message, first public key is the public key of second equipment, and the first information is for requesting second equipment to authenticate the equipment that the data that the needs that the equipment generates authenticate in the block chain network are sent in the block chain network;
    The second information that second equipment is sent is received, second information is used to indicate the second equipment confirmation and can authenticate the equipment that the data that the needs that the equipment generates authenticate in the block chain network are sent in the block chain network.
  50. Equipment according to claim 49, which is characterized in that further include the second public key in the first message, second public key is the public key of the equipment.
  51. Equipment according to claim 50, which is characterized in that the transceiver module is specifically used for:
    Receive second information crossed using second public key encryption that second equipment is sent.
  52. The equipment according to any one of claim 48 to 51, which is characterized in that the processing module is also used to: the block for carrying first data is generated;
    The transceiver module is specifically used for sending the block to second equipment.
  53. The equipment according to any one of claim 48 to 52, which is characterized in that the transceiver module is also used to:
    The third information that second equipment is sent is received, includes the requirement of the first Hash HASH value in the third information;
    The processing module is also used to generate the first HASH value for meeting the first HASH value requirement.
  54. Equipment according to claim 53, it is characterized in that, it include the requirement of at least one HASH value in the third information, at least one described HASH value includes the first HASH value requirement in requiring, and each HASH value at least one HASH value requirement requires corresponding at least one type of service;
    Wherein, the processing module is also used to:
    According to the corresponding type of service of first data, the first HASH value is determined.
  55. Equipment according to claim 53, it is characterized in that, it include the requirement of at least one HASH value in the third information, at least one described HASH value includes the first HASH value requirement in requiring, and each HASH value at least one HASH value requirement requires corresponding at least one equipment group;
    Wherein, the processing module is also used to:
    According to equipment group belonging to the equipment, the first HASH value is determined.
  56. The equipment according to any one of claim 49 to 55, which is characterized in that the transceiver module is also used to:
    The 2nd HASH value relevant to first data is sent to third equipment, the 2nd HASH value determines that the integrality of the second data, the second data are data of first data in the block chain network after certification for the third equipment.
  57. Equipment according to claim 56, which is characterized in that first data are that the public key encryption by the third equipment is crossed.
  58. The equipment according to claim 56 or 57, which is characterized in that the processing module is also used to: the 2nd HASH value is determined according to first data.
  59. The equipment according to any one of claim 49 to 55, which is characterized in that first data are that the public key encryption by third equipment is crossed, and the transceiver module is also used to:
    First data are sent to the third equipment, in order to which the third equipment is after determining the 2nd HASH value according to first data, determine that the integrality of the second data, the second data are data of first data in the block chain network after certification according to the 2nd HASH value.
  60. The equipment according to any one of claim 48 to 59, which is characterized in that the transceiver module is also used to:
    The 4th information that second equipment is sent is received, the 4th information is used to indicate first data and authenticates in the block chain network by n times, and the value of N is preset value.
  61. The equipment according to any one of claim 48 to 59, which is characterized in that the transceiver module is also used to:
    Receive the corresponding Mei Keer Merkle tree information of the second data and block information that second equipment is sent, second data are data of first data in the block chain network after certification, and the block information is used to indicate the block that the second data are carried in the block chain network.
  62. The equipment according to any one of claim 48 to 61, which is characterized in that the processing module is also used to: determining and delete the second data from the block chain network, and the second data are data of first data in the block chain network after certification;
    The transceiver module, the equipment being also used into the block chain network send the 5th information, and the equipment that the 5th information is used to indicate in the block chain network deletes the second data from the block chain network.
  63. Equipment according to claim 62, which is characterized in that include identification information and/or the corresponding Merkle tree information of the second data in the 5th information, the identification information is for identifying the second data.
  64. The equipment according to any one of claim 48 to 63, which is characterized in that the place Reason module is also used to: deleting first data of the equipment being locally stored.
  65. A kind of equipment characterized by comprising
    Processing module, for establishing the communication connection of the equipment Yu the first equipment, the equipment is the equipment in block chain network;
    Transceiver module, the first data authenticated in the block chain network for receiving the needs generated by first equipment that first equipment is sent;
    The transceiver module, the equipment being also used into the block chain network send first data, realize the certification of first data.
  66. Equipment according to claim 65, which is characterized in that the transceiver module is specifically used for:
    Receive the first message that the first public key encryption of use that first equipment is sent is crossed, it include the first information in the first message, first public key is the public key of the equipment, and the first information is for requesting the equipment to authenticate the equipment that the data that the needs that first equipment generates authenticate in the block chain network are sent in the block chain network;
    The second information is sent to first equipment, second information is used to indicate the equipment confirmation and can authenticate the equipment that the data that the needs that first equipment generates authenticate in the block chain network are sent in the block chain network.
  67. Equipment according to claim 66, which is characterized in that further include the second public key in the first message, second public key is the public key of first equipment.
  68. Equipment according to claim 67, which is characterized in that the transceiver module is specifically used for: the first equipment of Xiang Suoshu sends second information crossed using second public key encryption.
  69. The equipment according to any one of claim 65 to 68, which is characterized in that the processing module is also used to: the digital cash of preset quantity is generated.
  70. Equipment according to claim 69, which is characterized in that the transceiver module is also used to: the equipment in Xiang Suoshu block chain network sends the relevant information of the digital cash;
    The processing module, be also used to if it is determined that the digital cash in the block chain network by M certification, confirm that the digital cash comes into force, the value of M is preset value.
  71. The equipment according to any one of claim 65 to 70, which is characterized in that the transceiver module is specifically used for:
    Receive the block for carrying first data that first equipment is sent;
    Equipment into the block chain network sends the block of carrying first data.
  72. The equipment according to any one of claim 65 to 70, which is characterized in that the processing module is also used to: the block format required according to the block chain network generates the block for carrying first data;
    The transceiver module is also used to the block that the equipment into the block chain network sends carrying first data.
  73. The equipment according to any one of claim 65 to 72, which is characterized in that the processing module is also used to: the requirement of the first Hash HASH value is determined;
    The transceiver module, specifically for sending third information to first equipment, it include the first HASH value requirement in the third information, so that first equipment is established with the equipment and communicated to connect after generating the first HASH value for meeting the first HASH value requirement.
  74. The equipment according to claim 73, it is characterized in that, it include the requirement of at least one HASH value in the third information, at least one described HASH value includes the first HASH value requirement in requiring, and each HASH value at least one HASH value requirement requires corresponding at least one type of service;
    Wherein, the processing module is specifically used for: determining at least one HASH value requirement.
  75. The equipment according to claim 73, it is characterized in that, it include the requirement of at least one HASH value in the third information, at least one described HASH value includes the first HASH value requirement in requiring, and each HASH value at least one HASH value requirement requires corresponding at least one equipment group;
    Wherein, the processing module is specifically used for: determining at least one HASH value requirement.
  76. The equipment according to any one of claim 65 to 75, which is characterized in that the transceiver module is also used to:
    The 2nd HASH value relevant to first data that first equipment is sent is received, the 2nd HASH value determines that the integrality of the second data, the second data are data of first data in the block chain network after certification for third equipment;
    The 2nd HASH value is sent to the third equipment.
  77. The equipment according to claim 76, which is characterized in that first data are that the public key encryption by the third equipment is crossed.
  78. The equipment according to claim 76 or 77, which is characterized in that the 2nd HASH value is to be determined by first equipment according to first data.
  79. The equipment according to any one of claim 65 to 74, which is characterized in that described One data are that the public key encryption by third equipment is crossed, and the transceiver module is also used to:
    Receive first data;
    First data are sent to the third equipment, in order to which the third equipment is after determining the 2nd HASH value according to first data, determine that the integrality of the second data, the second data are data of first data in the block chain network after certification according to the 2nd HASH value.
  80. The equipment according to any one of claim 65 to 79, which is characterized in that the transceiver module is also used to:
    If the processing module determines that first data authenticate in the block chain network by n times, the second data, which are sent, to the third equipment corresponds to Mei Keer Merkle tree information and block information, the block information is used to indicate the block that second data are carried in the block chain network, second data are data of first data in the block chain network after certification, wherein, the value of N is preset value.
  81. The equipment according to any one of claim 65 to 80, which is characterized in that the transceiver module is also used to:
    If the processing module determines that first data authenticate in the block chain network by n times, the 4th information is sent to first equipment, 4th information is used to indicate first data and authenticates in the block chain network by n times, wherein the value of N is preset value.
  82. The equipment according to any one of claim 65 to 80, which is characterized in that the transceiver module is also used to:
    If the processing module determines that first data authenticate in the block chain network by n times, the corresponding Merkle tree information of the second data and block information are sent to first equipment, the block information is used to indicate the block that the second data are carried in the block chain network, second data are data of first data in the block chain network after certification, wherein, the value of N is preset value.
  83. The equipment according to any one of claim 65 to 82, which is characterized in that the transceiver module is also used to:
    Receive the 5th information that first equipment is sent, the equipment that 5th information is used to indicate in the block chain network deletes the second data from the block chain network, and the second data are data of first data in the block chain network after certification.
  84. The equipment according to claim 83, which is characterized in that include identification information and/or the corresponding Merkle tree information of the second data in the 5th information, the identification information is described for identifying Second data.
  85. A kind of equipment characterized by comprising
    Transceiver module, for obtaining the corresponding Mei Keer Merkle tree information of the second data and block information, the block information is used to indicate the block that second data are carried in block chain network, second data are data of first data in the block chain network after certification, and first data are the data that the needs that the first equipment generates are authenticated in the block chain network;
    The transceiver module is also used to obtain the second data from the block of the second data of carrying according to the Merkle tree information;
    Processing module, for determining the integrality of the second data.
  86. The equipment according to claim 85, which is characterized in that if second data are complete, the transceiver module is also used to:
    Equipment into the block chain network sends confirmation message, and it is complete that the confirmation message is used to indicate the second data.
  87. The equipment according to claim 85 or 86, which is characterized in that the transceiver module is specifically used for:
    Receive the Merkle tree information and the block information of the transmission of the second equipment, wherein second equipment is the equipment in the block chain network.
  88. The equipment according to claim 87, which is characterized in that second equipment is that first data are sent to the equipment recognized in the block chain network.
  89. The equipment according to any one of claim 85 to 88, which is characterized in that the processing module is also used to:
    Determine the second Hash HASH value relevant to first data;
    According to the consistency of relevant to the second data the 3rd HASH value and the 2nd HASH value, the integrality of the second data is determined.
  90. The equipment according to claim 89, which is characterized in that the processing module is specifically used for:
    Receive the 2nd HASH value, wherein the 2nd HASH value is to be determined by first equipment according to first data.
  91. The equipment according to claim 90, which is characterized in that first data are that the public key encryption by the equipment is crossed.
  92. The equipment according to claim 89, which is characterized in that first data be by What the public key encryption of the equipment was crossed, the transceiver module is also used to:
    Receive first data that first equipment is sent;
    Wherein, the processing module is specifically used for: according to first data, determining the 2nd HASH value.
  93. The equipment according to any one of claim 85 to 92, which is characterized in that the processing module is also used to:
    Determination deletes the second data from the block chain network;
    The transceiver module, the equipment being also used into the block chain network send the 5th information, and the equipment that the 5th information is used to indicate in the block chain network deletes the second data from the block chain network.
  94. The equipment according to claim 93, which is characterized in that include identification information and/or the corresponding Merkle tree information of the second data in the 5th information, the identification information is for identifying the second data.
  95. A kind of communication system characterized by comprising equipment described in any one of equipment and claim 85 to 94 described in any one of equipment, claim 65 to 84 described in any one of claim 48 to 64.
CN201780081904.3A 2017-01-03 2017-01-03 Data processing method, device and system based on block chain Active CN110121860B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/000052 WO2018126340A1 (en) 2017-01-03 2017-01-03 Blockchain-based data processing method, device and system

Publications (2)

Publication Number Publication Date
CN110121860A true CN110121860A (en) 2019-08-13
CN110121860B CN110121860B (en) 2021-08-13

Family

ID=62788941

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780081904.3A Active CN110121860B (en) 2017-01-03 2017-01-03 Data processing method, device and system based on block chain

Country Status (2)

Country Link
CN (1) CN110121860B (en)
WO (1) WO2018126340A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111478948A (en) * 2020-03-20 2020-07-31 深圳市芯链科技有限公司 Block chain access method, Internet of things equipment and storage medium
CN111552215A (en) * 2020-05-22 2020-08-18 中国联合网络通信集团有限公司 Internet of things equipment safety protection method and system
CN113065118A (en) * 2021-03-16 2021-07-02 青岛海尔科技有限公司 Method and device for determining authentication code, storage medium and electronic device
CN114153827A (en) * 2021-10-11 2022-03-08 北京天德科技有限公司 Transaction data removing method based on block chain system
CN114172665A (en) * 2021-12-07 2022-03-11 东软集团股份有限公司 Block chain zero trust system and method for block chain zero trust system

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11038950B2 (en) * 2018-08-14 2021-06-15 Microsoft Technology Licensing, Llc Blockchain digital twin for transactions on behalf of limited capability devices
CN112116475B (en) * 2020-09-22 2023-07-04 中国科学院沈阳计算技术研究所有限公司 Distributed data transaction method and system based on blockchain
DE102022106864A1 (en) 2022-03-23 2023-09-28 Dr. Ing. H.C. F. Porsche Aktiengesellschaft Method for determining whether a portable device belongs to an associated group of portable devices based on a blockchain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104320262A (en) * 2014-11-05 2015-01-28 中国科学院合肥物质科学研究院 User public key address binding, searching and verifying method and system based on crypto currency open account book technology
US20150356524A1 (en) * 2014-06-04 2015-12-10 MONI Limited System and method for executing financial transactions
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN105790954A (en) * 2016-03-02 2016-07-20 布比(北京)网络技术有限公司 Method and system for constructing electronic evidence
US20160261404A1 (en) * 2015-03-02 2016-09-08 Dell Products L.P. Methods and systems for obfuscating data and computations defined in a secure distributed transaction ledger
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106126722B (en) * 2016-06-30 2019-10-18 中国科学院计算技术研究所 A kind of prefix compound tree and design method based on verifying

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150356524A1 (en) * 2014-06-04 2015-12-10 MONI Limited System and method for executing financial transactions
CN104320262A (en) * 2014-11-05 2015-01-28 中国科学院合肥物质科学研究院 User public key address binding, searching and verifying method and system based on crypto currency open account book technology
US20160261404A1 (en) * 2015-03-02 2016-09-08 Dell Products L.P. Methods and systems for obfuscating data and computations defined in a secure distributed transaction ledger
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN105790954A (en) * 2016-03-02 2016-07-20 布比(北京)网络技术有限公司 Method and system for constructing electronic evidence
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111478948A (en) * 2020-03-20 2020-07-31 深圳市芯链科技有限公司 Block chain access method, Internet of things equipment and storage medium
CN111478948B (en) * 2020-03-20 2023-02-17 深圳市芯链科技有限公司 Block chain access method, internet of things equipment and storage medium
CN111552215A (en) * 2020-05-22 2020-08-18 中国联合网络通信集团有限公司 Internet of things equipment safety protection method and system
CN113065118A (en) * 2021-03-16 2021-07-02 青岛海尔科技有限公司 Method and device for determining authentication code, storage medium and electronic device
CN113065118B (en) * 2021-03-16 2022-06-14 青岛海尔科技有限公司 Method and device for determining authentication code, storage medium and electronic device
CN114153827A (en) * 2021-10-11 2022-03-08 北京天德科技有限公司 Transaction data removing method based on block chain system
CN114153827B (en) * 2021-10-11 2023-01-10 北京天德科技有限公司 Transaction data removing method based on block chain system
CN114172665A (en) * 2021-12-07 2022-03-11 东软集团股份有限公司 Block chain zero trust system and method for block chain zero trust system

Also Published As

Publication number Publication date
WO2018126340A1 (en) 2018-07-12
CN110121860B (en) 2021-08-13

Similar Documents

Publication Publication Date Title
CN110121860A (en) Data processing method, equipment and system based on block chain
CN108270836B (en) Data processing method, device and system based on block chain
CN108235772B (en) Data processing method and device based on block chain, storage medium and electronic equipment
CN110166411B (en) Data transmission method, device and network node
CN111970129B (en) Data processing method and device based on block chain and readable storage medium
CN111797415A (en) Block chain based data sharing method, electronic device and storage medium
US20230316273A1 (en) Data processing method and apparatus, computer device, and storage medium
CN110870252B (en) Method and device for verifying authorization of electronic device
CN112085504B (en) Data processing method and device, computer equipment and storage medium
CN111713088B (en) Method and device for processing data and equipment for processing data
CN110147666B (en) Lightweight NFC identity authentication method in scene of Internet of things and Internet of things communication platform
CN110035058B (en) Resource request method, device and storage medium
CN111800410B (en) Block chain-based data access control method, electronic device and storage medium
Asfia et al. Energy trading of electric vehicles using blockchain and smart contracts
CN110349026A (en) Decentralized Autonomous energy internet power exchange and energy system based on block chain
CN103597456A (en) Method and apparatus for implementing memory segment access control in a distributed memory environment
CN101771992A (en) Method, equipment and system for protection of confidentiality of international mobile subscriber identifier IMSI
CN114039753B (en) Access control method and device, storage medium and electronic equipment
CN113837760B (en) Data processing method, data processing device, computer equipment and storage medium
CN112055357A (en) Credible safe high-performance intelligent networking dynamic networking cooperation method based on block chain
CN111199486A (en) Data processing method and device based on block chain network and storage medium
CN110213252B (en) Communication method, terminal equipment and network equipment
CN106357595A (en) Encryption method and encryption system based on SIM card
CN102291236B (en) Method and system for realizing safe charging in peer-to-peer network
CN110968442B (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant