CN110162992A - Data processing method, data processing equipment and computer system - Google Patents

Data processing method, data processing equipment and computer system Download PDF

Info

Publication number
CN110162992A
CN110162992A CN201910475647.2A CN201910475647A CN110162992A CN 110162992 A CN110162992 A CN 110162992A CN 201910475647 A CN201910475647 A CN 201910475647A CN 110162992 A CN110162992 A CN 110162992A
Authority
CN
China
Prior art keywords
endorsement
node
block chain
chain network
encryption data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910475647.2A
Other languages
Chinese (zh)
Other versions
CN110162992B (en
Inventor
马逸龙
王云浩
帅斌成
过晓冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910475647.2A priority Critical patent/CN110162992B/en
Publication of CN110162992A publication Critical patent/CN110162992A/en
Application granted granted Critical
Publication of CN110162992B publication Critical patent/CN110162992B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Computer And Data Communications (AREA)

Abstract

Present disclose provides a kind of data processing methods, applied to an endorsement node in block chain network, block chain network includes multiple nodes, and multiple node includes one or more endorsement nodes, this method comprises: obtaining the endorsement node set specified by client;Each endorsement node for generating key and being distributed in endorsement node set, wherein the endorsement number of nodes in endorsement node set is less than or equal to the endorsement number of nodes in block chain network;It is encrypted based on key pair from the transaction data of client, obtains encryption data;Encryption data is sent to each endorsement node in block chain network, endorsement verifying is carried out to encryption data by each endorsement node, wherein encryption data can be decrypted in the endorsement node for holding key;And if endorsement is proved to be successful, encryption data is sent to block chain network, encryption data is stored in block chain by each node in block chain network.The disclosure additionally provides a kind of data processing equipment and computer system.

Description

Data processing method, data processing equipment and computer system
Technical field
This disclosure relates to a kind of data processing method, data processing equipment and computer system.
Background technique
The target of block chain technology is to realize the distributed reliable memory of data.When block chain implements, data are in net It is stored on multinode using increment type in network, and true by secure hash function (Secure Hash Algorithm, SHA) It has protected can not distorting for chain data, one that data store on each node is realized by common recognition algorithm and the network transmission protocol Cause property.
Block chain can be generally divided into publicly-owned chain (Public Chain) and license chain (Permissioned Chain), Whether middle license chain can be again that single individual (Entity) is divided into alliance's chain (Consortium) and private according to data maintenance side There is chain (Private chain).
However, in the prior art, no matter for which kind of form block chain technology, transaction data is in endorsement and upper chain process In each node in block chain network is visible, lead to not realize transaction data secret protection.
Summary of the invention
An aspect of this disclosure provides a kind of data processing method, and this method is applied to one in block chain network Endorsement node, the block chain network include multiple nodes, and multiple node includes one or more endorsement nodes.Above method packet It includes: obtaining the endorsement node set specified by client;Each endorsement for generating key and being distributed in the endorsement node set Node, wherein the endorsement number of nodes in the endorsement node set is less than or equal to the endorsement node in the block chain network Quantity;It is encrypted based on the key pair from the transaction data of the client, obtains encryption data;By the encryption number According to each endorsement node being sent in the block chain network, endorsement verifying is carried out to the encryption data by each endorsement node, Wherein, the encryption data can be decrypted in the endorsement node for holding the key;And if endorsement is proved to be successful, The encryption data is sent to the block chain network, is deposited the encryption data by each node in the block chain network Enter block chain.
Optionally, above-mentioned generation key includes: to generate the key correspondingly with the endorsement node set.
Optionally, it includes: the confirmation message for receiving the first quantity that above-mentioned endorsement, which is proved to be successful, wherein first number Amount and the ratio of the endorsement number of nodes in the endorsement node set are more than the first predetermined ratio.Specifically, described will add After ciphertext data is sent to each endorsement node in the block chain network, hold any endorsement node of the key based on described Encryption data described in key pair is decrypted, and obtains the transaction data, by any endorsement node to the transaction data Simulation execution is carried out, if implementing result is correct, returns to the confirmation message to one endorsement node.
Optionally, above-mentioned multiple nodes further include ordering joint.It is above-mentioned that the encryption data is sent to the block chain Network includes: that the encryption data is sent to the ordering joint, is arranged by the ordering joint the encryption data Sequence, and at the appointed time the encryption data is sent in the block chain network in addition to ordering joint based on sorting position Other nodes so that the encryption data is stored in corresponding block chain by other described nodes.
Optionally, the encryption data is sent to after each endorsement node in the block chain network above-mentioned, on State method further include: in response to the key request of any node;And if any node is the endorsement node set In endorsement node, the key is sent to any node.
Optionally, if above-mentioned the encryption data is sent to the block chain network includes: the transaction data category In specified classification, the encryption data is sent to the block chain network.
Optionally, the above method further include: if the transaction data is not belonging to the specified classification, by the number of deals According to the block chain network is sent to, common recognition verifying is carried out to the transaction data by each node in the block chain network, And the transaction data is stored in block chain after being verified.
It is optionally, above-mentioned that the encryption data is sent to each endorsement node in the block chain network includes: to be based on The encryption data is sent to each endorsement node in the block chain network by epidemic situation propagation protocol.
Another aspect of the present disclosure provides a kind of data processing equipment, applied to the endorsement section in block chain network Point, the block chain network include multiple nodes, and the multiple node includes one or more endorsement nodes, above-mentioned apparatus packet It includes: obtaining module, generation module, encrypting module, endorsement module and cochain module.Module is obtained for obtaining by client Specified endorsement node set.Each endorsement section that generation module is used to generate key and is distributed in the endorsement node set Point, wherein the endorsement number of nodes in the endorsement node set is less than or equal to the endorsement number of nodes in the block chain network Amount.Encrypting module obtains encryption data for being encrypted based on the key pair from the transaction data that the client is sent. Endorsement module is used to the encryption data being sent to each endorsement node in the block chain network, by each endorsement node to institute It states encryption data and carries out endorsement verifying, wherein the encryption data can be decrypted in the endorsement node for holding the key. Cochain module is used for when endorsement is proved to be successful, and the encryption data is sent to the block chain network, by the block chain The encryption data is stored in block chain by each node in network.
Another aspect of the present disclosure provides a kind of computer system, applied to the endorsement section in block chain network Point, the block chain network include multiple nodes, and the multiple node includes one or more endorsement nodes, the department of computer science System include: memory, processor and storage on a memory and the computer program that can run on a processor, the processor For realizing method as described above when executing described program.
Another aspect of the present disclosure provides a kind of computer readable storage medium, is stored with computer executable instructions, Described instruction is when executed for realizing method as described above.
Another aspect of the present disclosure provides a kind of computer program, and the computer program, which includes that computer is executable, to be referred to It enables, described instruction is when executed for realizing method as described above.
Detailed description of the invention
In order to which the disclosure and its advantage is more fully understood, referring now to being described below in conjunction with attached drawing, in which:
Fig. 1 diagrammatically illustrates the application according to the data processing method of the embodiment of the present disclosure, device and computer system Scene;
Fig. 2 diagrammatically illustrates the flow chart of the data processing method according to the embodiment of the present disclosure;
Fig. 3 A diagrammatically illustrates the schematic diagram of the working principle of block chain network in the prior art;
Fig. 3 B diagrammatically illustrates the schematic diagram of the working principle of block chain network according to an embodiment of the present disclosure;
Fig. 4 diagrammatically illustrates the block diagram of the data processing equipment according to the embodiment of the present disclosure;
Fig. 5 diagrammatically illustrates the block diagram of the data processing equipment according to another embodiment of the disclosure;And
Fig. 6 diagrammatically illustrates the block diagram of computer system according to an embodiment of the present disclosure.
Specific embodiment
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary , and it is not intended to limit the scope of the present disclosure.In the following detailed description, to elaborate many specific thin convenient for explaining Section is to provide the comprehensive understanding to the embodiment of the present disclosure.It may be evident, however, that one or more embodiments are not having these specific thin It can also be carried out in the case where section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid Unnecessarily obscure the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of Or add other one or more features, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification Meaning, without that should be explained with idealization or excessively mechanical mode.
It, in general should be according to this using statement as " at least one in A, B and C etc. " is similar to Field technical staff is generally understood the meaning of the statement to make an explanation (for example, " system at least one in A, B and C " Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or System etc. with A, B, C).Using statement as " at least one in A, B or C etc. " is similar to, generally come Saying be generally understood the meaning of the statement according to those skilled in the art to make an explanation (for example, " having in A, B or C at least One system " should include but is not limited to individually with A, individually with B, individually with C, with A and B, have A and C, have B and C, and/or the system with A, B, C etc.).
Shown in the drawings of some block diagrams and/or flow chart.It should be understood that some sides in block diagram and/or flow chart Frame or combinations thereof can be realized by computer program instructions.These computer program instructions can be supplied to general purpose computer, The processor of special purpose computer or other programmable data processing units, so that these instructions are when executed by this processor can be with Creation is for realizing function/operation device illustrated in these block diagrams and/or flow chart.The technology of the disclosure can be hard The form of part and/or software (including firmware, microcode etc.) is realized.In addition, the technology of the disclosure, which can be taken, is stored with finger The form of computer program product on the computer readable storage medium of order, the computer program product is for instruction execution system System uses or instruction execution system is combined to use.
Embodiment of the disclosure provides a kind of data processing method, device and the department of computer science that can apply this method System.This method includes tactful acquisition stage, key generation phase, data encryption stage, endorsement stage and cochain stage.In plan The stage is slightly obtained, the endorsement node set specified by client is obtained, which characterizes the client and currently make Fixed endorsement strategy, the endorsement node set include the one or more endorsement nodes specified by client.Rank is generated in key Section, each endorsement node for generating key and being distributed in the endorsement node set.In data encryption stage, it is based on the key Transaction data from the client is encrypted, encryption data is obtained.Subsequently into the endorsement stage, encryption data is sent out Each endorsement node into block chain network is sent to carry out endorsement verifying.Finally in cochain stage, the encryption being proved to be successful to endorsement Data carry out cochain storage.
Fig. 1 diagrammatically illustrates the application according to the data processing method of the embodiment of the present disclosure, device and computer system Scene.It should be noted that being only the example that can apply the scene of the embodiment of the present disclosure shown in Fig. 1, to help this field skill Art personnel understand the technology contents of the disclosure, but are not meant to that the embodiment of the present disclosure may not be usable for other equipment, system, ring Border or scene.
As shown in Figure 1, the application scenarios show block chain network (blockchain network) 100, the block chain Network 100 may include node (node) 101~106, and node 101~106 safeguards block chain (blockchain) 110 jointly.
Node 101~106 can be the various calculate nodes with identical or different computing capability, such as can be individual Computer, network server, database server, smart phone etc., it is not limited here.Any two in node 101~106 Point-to-point communication can be all carried out between a node.
Block chain 110 is the distributed data base of the block (block) linked in chronological order by hash pointer.Block The block of chain is added sequentially in time, and when a predetermined condition is satisfied, each node in block chain network allows to work as prosthomere The block is simultaneously added in block chain by point creation block, and the block of addition is as newest block current on the block chain.At certain One particular moment, the current newest block for safeguarding that the node of same block chain is obtained from block chain is identical.
It should be understood that the scale and type of the block chain network in Fig. 1, the quantity of node, the length of block chain, block Quantity etc. is only schematical.According to actual needs, block chain network, any amount of random scale and type be can have Node, the block chain of random length, any number of block etc., herein with no restrictions.
Fig. 2 diagrammatically illustrates the flow chart of the data processing method according to the embodiment of the present disclosure.This method is applied to area An endorsement node in block chain network, the block chain network include multiple nodes, and multiple node includes one or more back Book node.
As shown in Fig. 2, this method includes operation S201~S205:
In operation S201, the endorsement node set specified by client is obtained.
Wherein, the endorsement node set specified by client is including one or more endorsement nodes, in node set of endorsing Endorsement number of nodes be less than or equal to block chain network in endorsement number of nodes.The endorsement node set table specified by client The set for showing the endorsement node of the client trust in this data handling procedure, can be considered in this data handling procedure The prepared endorsement strategy of the client.The endorsement node set that client is specified every time can be identical or different, depending on specific feelings Depending on condition.For example, the endorsement node set specified for the transaction data client of different safety class is different, when different The specified endorsement node set difference, etc. of phase client, it is not limited here.This endorsement node is mutually to bind with the client Endorsement node, then the client can trust this endorsement node, therefore this endorsement node is available in this operation S201 To the endorsement node set specified by the client, and this endorsement node is included at least in the endorsement node set.
In operation S202, each endorsement node for generating key and being distributed in the endorsement node set.
Wherein, after obtaining the endorsement node set specified by client, this operation S202 is directed to the endorsement node set Key is generated, each endorsement node in the endorsement node set is distributed to using the key as the currently active key, so that the visitor The endorsement node that family end is currently trusted can obtain the key, and other endorsement nodes in block chain network cannot be somebody's turn to do Key.
It in operation S203, is encrypted based on the key pair from the transaction data of the client, obtains encryption number According to.
Wherein, it is obtaining the endorsement node set specified by client and is generating and divide for the endorsement node set Send out key after, this operation S203 further obtains the transaction data from the client, above acquired in by the client Specified endorsement node set is corresponding with the transaction data, indicates that the client allows the transaction data to the endorsement node collection Endorsement node in conjunction discloses.Give the client other mistrustful endorsement nodes to guarantee that the transaction data is not leaked, This operation S203 carries out encryption based on the key pair generated above the transaction data to obtain encryption data.
In operation S204, the encryption data is sent to each endorsement node in the block chain network, by each endorsement Node carries out endorsement verifying to the encryption data.
Wherein, the endorsement mechanism in block chain network requires the transaction data for carrying out endorsement verifying being sent to block Each endorsement node in chain network, this operation S204 are sent to area for the encryption data that S203 is obtained is operated according to the endorsement mechanism Each endorsement node in block chain network.For each endorsement node in above-mentioned endorsement node set, these endorsement nodes are held There is corresponding secret key, which can be decrypted, and then endorsement verifying can be carried out to the transaction data after decryption.And For other endorsement nodes for not holding corresponding secret key, the encryption data cannot be decrypted in these endorsement nodes, into And endorsement verifying can not be carried out to transaction data.
The encryption data is sent to the block chain network, by described if endorsement is proved to be successful in operation S205 The encryption data is stored in block chain by each node in block chain network.
This operation S205 can determine whether that endorsement is proved to be successful according to the endorsement result of each endorsement node, if endorsement It is proved to be successful, which can be stored in the encryption data in block chain, each node in block chain network The encryption data can be obtained from block chain, but since it is encryption data, true transaction data only holds key Endorsement node is just available to be arrived.
As it can be seen that the endorsement node set that method shown in Fig. 2 is specified based on client, within the scope of the endorsement node set Key is generated and distributes, for the transaction data from the client, the transaction data is encrypted to obtain based on the key pair Encryption data, then endorsement and cochain are carried out to the encryption data.According to the program, during endorsement, during cochain and After cochain, true transaction data is only for the endorsement node of client trust as it can be seen that the transaction data of protection client is hidden It is private.
In one embodiment of the present disclosure, above-mentioned generation key may include: and accessed endorsement node set Key is generated correspondingly, is held with the endorsement node for guaranteeing that currently valid key is only currently trusted by client, it is right For the key generated every time, when the endorsement node set that client is specified changes, the key is no longer valid, needs to generate New the currently active key.For example, getting the endorsement node set specified by client in first time data handling procedure 1, key 1 is generated for the endorsement node set 1.In second of data handling procedure, gets and specified by the client Endorsement node set 2 generates key 2 for the endorsement node set 2.When endorsement node set 1 is different from endorsement node set 2 When, key 1 and key 2 are different, and when node set 1 of endorsing is identical as endorsement node set 2, key 1 and key 2 can be identical It can also be different.If in practical implementation, getting endorsement node collection using the rule identical with key 2 of key 1 After closing 2, can first judge whether endorsement node set 2 is identical as endorsement node set 1, if it is without regenerating key 2, Key 1 can directly be continued to use.
In one embodiment of the present disclosure, each endorsement node being sent to encryption data above-mentioned in block chain network Afterwards, for any endorsement node 1 for holding the currently active key, which can be somebody's turn to do based on the key pair Encryption data is decrypted, and obtains corresponding transaction data.Any endorsement node 1 can carry out simulation to the transaction data and hold Row, if implementing result is correct, determination is endorsed successfully on the endorsement node 1, then the endorsement node 1 with client to binding This endorsement node returns to confirmation message.For any endorsement node 2 for not holding the currently active key, any endorsement section The encryption data can not be decrypted in point 2, and then simulation execution can not be carried out to the encryption data, then directly determines in the back It endorses and fails on book node 2.
On this basis, it includes: the confirmation message for receiving the first quantity that above-mentioned endorsement, which is proved to be successful, wherein the first number Amount and the ratio of the endorsement number of nodes in accessed endorsement node set are more than the first predetermined ratio.
During above-mentioned endorsement, the endorsement node for holding the currently active key can be smoothly to encrypted transaction data Endorsement verifying is carried out, the endorsement result succeeded or failed.And the endorsement node for not holding the currently active key can not be to adding Transaction data after close carries out endorsement verifying, can only obtain the endorsement result of failure.For client, realizing only allows Current believable endorsement node carries out the purpose of endorsement verifying to transaction data, avoids transaction data in insincere endorsement node On carry out being easy to appear privacy leakage problem during endorsement verifying.
Further, in one embodiment of the present disclosure, multiple nodes in block chain network further include ordering joint. Above-mentioned encryption data is sent to block chain network includes: that the encryption data is sent to the ordering joint, by the ordering joint The encryption data is ranked up, and at the appointed time the encryption data is sent in block chain network based on sorting position and is removed Other nodes except ordering joint, which may include endorsement node and/or ordinary node, so that these other sections The encryption data is stored in corresponding block chain by point.
Under some cases, for the corresponding key of endorsement node set generation got and in the endorsement node set After distributing the key in range, the endorsement node 1 in the endorsement node set loses the key due to unexpected, causes to encrypt Data are sent to after each endorsement node in block chain network, the endorsement node 1 can not using the key pair encryption data into Row decryption and verifying of endorsing.To avoid this phenomenon, which can send close to this endorsement node bound with client Key request, wherein key request refers to the request message for the currently active key.According to the data processing of the embodiment of the present disclosure Method further can also include: the key request in response to any node, and, if any node is currently valid Endorsement node in node set of endorsing, is sent to any node for the currently active key.
In one embodiment of the present disclosure, if above-mentioned encryption data is sent to block chain network includes: to add with this The corresponding transaction data of ciphertext data belongs to specified classification, then the encryption data is sent to block chain network, by block chain network In multiple nodes by the encryption data be stored in block chain.In the case, the encryption data in block chain can not be tampered, Any node in block chain network can obtain the encryption data, but only wherein hold key corresponding with the encryption data Node the encryption data can be decrypted, and then get real transaction data corresponding with the encryption data.Refer to The transaction data for determining classification can be the higher data of secret protection demand, present embodiment ensure that transaction data is after cochain Still available secret protection.
On this basis, further, after determining that encryption data endorsement is proved to be successful, according to the number of the embodiment of the present disclosure If can also include: that transaction data corresponding with the encryption data is not belonging to specified classification according to processing method, directly by the friendship Easy data are sent to block chain network, carry out common recognition verifying to the transaction data by each node in block chain network, and testing It demonstrate,proves and the transaction data is stored in block chain after passing through.Wherein, when transaction data is not belonging to specified classification, illustrate the transaction data Secret protection demand it is lower, at this time can directly against the transaction data carry out cochain.
Below with reference to Fig. 3 A~3B, opened up in conjunction with specific embodiments to according to the data processing method of the embodiment of the present disclosure Open explanation:
Fig. 3 A diagrammatically illustrates the schematic diagram of the working principle of block chain network in the prior art.
Fig. 3 B diagrammatically illustrates the schematic diagram of the working principle of block chain network according to an embodiment of the present disclosure.
As shown in Figure 3A, top illustrates the interactive process between the node in block chain network in the prior art.Block Chain network includes node 1~9, wherein node 1~4 has endorsement verifying ability, is the endorsement node in block chain network, section Point 5 is ordering joint, and node 6~9 is ordinary node, and endorsement node 1 is the node mutually bound with client.Client is to endorsement Node 1 sends transaction data A, and endorsement node 1 carries out endorsement verifying to the transaction data in local, and transaction data A is sent out It send to endorsement node 2~4 and carries out endorsement verifying, determine whether transaction data A endorses according to the endorsement result of endorsement node 1~4 It is proved to be successful, wherein endorsement verification result is established rules really, can be configured according to actual needs, herein with no restrictions.When true Determine transaction data A endorsement be proved to be successful after, by transaction data A send hand over to ordering joint 5, ordering joint 5 does not audit reception The content of the transaction data arrived, ordering joint 5 is according to scheduled ordering rule to transaction data A and other transaction received Data are ranked up service (Order Service), and the opportunity for submitting transaction data A is determined according to sorting position.Corresponding Opportunity reach when, transaction data A is sent to multiple nodes in block chain network by ordering joint 5, for example, be sent to node 2~ 4 and node 6~9, common recognition verifying is carried out by 6~9 couples of transaction data A of node 2~4 and node, is respectively saved after through common recognition verifying Transaction data A is stored in corresponding block chain by point respectively, realizes the cochain of transaction data A.
The course of work of an endorsement node in block chain network in the prior art is illustrated below Fig. 3 A.With endorsement For node 2, endorsement node 2 can carry out simulation chain code (Chaincode) to the transaction data after receiving transaction data A and hold Row after determining the legal conjunction rule of transaction data A, will return to endorsement node 1 after endorsement result signature.And endorsement node 2 is being received Transaction data A is stored in itself corresponding block chain by common recognition verifying after the submission information sent to ordering joint 5, it is real The cochain confirmation (Commit) of block chain is showed.Wherein endorsement 2 local data base of node can only save transaction data A, that is, hand over The open state of easy data A.
In the course of work of block chain network shown in above-mentioned Fig. 3 A, the transaction data of deposit block chain can to all nodes See, and each endorsement node, during carrying out endorsement verifying, transaction data is to each endorsement node as it can be seen that being easy to happen number of deals According to privacy leakage problem.
And the course of work of improved block chain network shown in Fig. 3 B then can solve the above problem.As shown in Figure 3B, Top illustrates the interactive process between the node in the block chain network according to the embodiment of the present disclosure.Block chain network includes section Point 1~9, wherein node 1~3 has endorsement verifying ability, is the endorsement node in block chain network, and node 4 is sequence section Point, node 5~9 are ordinary node, and endorsement node 1 is the node mutually bound with client.The endorsement acquisition of node 1 is referred to by client Fixed endorsement node set, the specified endorsement node set of client is { endorsement node 1, node 2 of endorsing } in this example, indicates visitor Currently trust endorsement node 1 and endorsement node 2 in family end.Node 1 endorse after getting the endorsement node set, is correspondingly generated The key 1 is stored in local, and the key 1 is distributed to endorsement node 2 by specified key management means by key 1.Client It holds to endorsement node 1 and sends transaction data A, endorsement node 1 carries out endorsement verifying to the transaction data in local, and utilizes key 1 couple of transaction data A is encrypted, and obtains encryption data A '.Encryption data A ' is sent to endorsement node 2 by endorsement node 1 ~4 carry out endorsement verifying, determine whether encryption data A ' endorses according to the endorsement result of endorsement node 1~3 and are proved to be successful, wherein Endorsement verification result is established rules really, can be configured according to actual needs, herein with no restrictions.
In another example, key 1 can also be generated in client, and client will be carried on the back by specified key management means Book node set { endorsement node 1, node 2 of endorsing }, key 1 and encryption data A ' are sent to the endorsement node 1 bound with it, Key 1 is distributed to endorsement node 2 by endorsement node 1, and node 1 of endorsing carries out endorsement verifying, and base to encryption data A ' in local Encryption data A ' is sent to endorsement node 2~3 in epidemic situation propagation protocol (Gossip Protocol) and carries out endorsement verifying, root It determines whether encryption data A ' endorses according to the endorsement result of endorsement node 1~3 to be proved to be successful.
After determining that encryption data A ' endorsement is proved to be successful, encryption data A ' is sent and is handed over to ordering joint 4, sequence section Point 4 does not audit the content of the transaction data received, and ordering joint 4 is according to scheduled ordering rule to encryption data A ' and its The transaction data that he receives is ranked up service, and the opportunity for submitting encryption data A ' is determined according to sorting position.Corresponding When opportunity reaches, encryption data A ' is sent to multiple nodes in block chain network by ordering joint 4, such as is sent to node 2 ~3 and node 5~9, common recognition verifying is carried out by 5~9 couples of encryption data A ' of node 2~3 and node, it is each after through common recognition verifying Encryption data A ' is stored in corresponding block chain by node respectively, realizes the cochain of encryption data A '.
The worked of an endorsement node in the block chain network according to the embodiment of the present disclosure is illustrated below Fig. 3 B Journey.By taking node 2 of endorsing as an example, endorse node 2 after receiving encryption data A ' can first with key 1 to encryption data A ' into Row decryption, obtains transaction data A, then carries out simulation chain code (Chaincode) to the transaction data and executes, determines the number of deals After legal conjunction rule, updating endorsement state is to have endorsed, and will return to endorsement node 1 after endorsement result signature.And endorsement node Encryption data A ' is stored in itself corresponding block by common recognition verifying after the submission information for receiving the transmission of ordering joint 4 by 2 In chain, the cochain confirmation (Commit) of block chain is realized.Wherein endorsement 2 local data base of node can save transaction data A Encryption data A ' can also be saved.Again by taking node 3 of endorsing as an example, endorsement node 3 endorsement node set not specified in client In, endorsement node 3 does not hold key 1, can not carry out endorsement verifying to encryption data A '.
It can be seen that for transaction data A during in verification process of endorsing, cochain and after cochain, it is right It is visible in the endorsement node 1~2 for holding key 1, and is sightless for other nodes.Further, according to this public affairs The data processing method for opening embodiment is also provided with key and gives mechanism for change, when the endorsement node that should hold key is for example endorsed section Point 2 due to it is unexpected be lost key 1 when, or when endorsement node 2 has accidentally deleted local private data, endorsement node 2 can not be right Encryption data A ' carries out endorsement verifying, at this point, endorsement node 2 can initiate key request to endorsement node 1, as the case may be Key 1 or corresponding private data are requested, guarantees the inside number of each endorsement node in the specified endorsement node set of client According to consistency.
Fig. 4 diagrammatically illustrates the block diagram of the data processing equipment according to the embodiment of the present disclosure.The data processing equipment 400 Applied to an endorsement node in block chain network, which includes multiple nodes, and multiple node includes one Or multiple endorsement nodes.
As shown in figure 4, data processing equipment 400 includes: to obtain module 410, generation module 420, encrypting module 430, back Book module 440 and cochain module 450.
Module 410 is obtained for obtaining the endorsement node set specified by client.
Each endorsement node that generation module 420 is used to generate key and is distributed in the endorsement node set, wherein institute State the endorsement number of nodes that the endorsement number of nodes in endorsement node set is less than or equal in the block chain network.
Encrypting module 430 is obtained for being encrypted based on the key pair from the transaction data that the client is sent Encryption data.
Endorsement module 440 is used to the encryption data being sent to each endorsement node in the block chain network, by each Endorsement node carries out endorsement verifying to the encryption data, wherein the endorsement node for holding the key can be to the encryption Data are decrypted.
Cochain module 450 is used for when endorsement is proved to be successful, and the encryption data is sent to the block chain network, by The encryption data is stored in block chain by each node in the block chain network.
Fig. 5 diagrammatically illustrates the block diagram of the data processing equipment according to another embodiment of the disclosure.Data processing dress A 500 endorsement nodes being applied in block chain network are set, which includes multiple nodes, and multiple node includes One or more endorsement node.
As shown in figure 5, data processing equipment 500 includes: to obtain module 510, generation module 520, encrypting module 530, back Book module 540 and cochain module 550.Wherein, module 510, generation module 520, encrypting module 530, endorsement module are obtained 540 and cochain module 550 be respectively provided with obtain module 410, generation module 420, encrypting module 430, endorsement module 440, And the corresponding identical function of cochain module 450, duplicate part repeats no more.
In one embodiment of the present disclosure, generation module 520 is specifically used for corresponding with the endorsement node set Ground generates the key.
In one embodiment of the present disclosure, endorsement module 540 is also used to when receiving the confirmation message of the first quantity Determine that endorsement is proved to be successful.Wherein, first quantity and the ratio of the endorsement number of nodes in the endorsement node set are super The first predetermined ratio is crossed, after each endorsement node being sent to the encryption data in the block chain network, is held described Any endorsement node of key is based on encryption data described in the key pair and is decrypted, and the transaction data is obtained, by described Any endorsement node carries out simulation execution to the transaction data, if implementing result is correct, to one endorsement node Endorsement module 540 return to the confirmation message.
In one embodiment of the present disclosure, multiple nodes in block chain network further include ordering joint.Cochain module 550 are specifically used for the encryption data being sent to the ordering joint, are carried out by the ordering joint to the encryption data Sequence, and based on sorting position at the appointed time by the encryption data be sent in the block chain network except ordering joint it Other outer nodes, so that the encryption data is stored in corresponding block chain by other described nodes.
In one embodiment of the present disclosure, data processing equipment 500 further include: respond module 560 and sending module 570.Respond module 560 is used for each endorsement being sent to the encryption data in endorsement module 540 in the block chain network After node, in response to the key request of any node.Sending module 570 is used to when any node be the endorsement node When endorsement node in set, the key is sent to any node.
In one embodiment of the present disclosure, if cochain module 550 is specifically used for the transaction data and belongs to specified class Not, the encryption data is sent to the block chain network.
Specifically, as an optional embodiment, data processing equipment 500 further includes supplementary module 580, for working as institute When stating transaction data and being not belonging to the specified classification, the transaction data is sent to the block chain network, by the block Each node in chain network carries out common recognition verifying to the transaction data, and the transaction data is stored in area after being verified Block chain.
In one embodiment of the present disclosure, endorsement module 540 is specifically used for being based on epidemic situation propagation protocol for the encryption Data are sent to each endorsement node in the block chain network.
It should be noted that in device section Example each module/unit/subelement etc. embodiment, the skill of solution Art problem, the function of realization and the technical effect reached respectively with the implementation of corresponding step each in method section Example Mode, the technical issues of solving, the function of realization and the technical effect that reaches are same or like, and details are not described herein.
It is module according to an embodiment of the present disclosure, submodule, unit, any number of or in which any more in subelement A at least partly function can be realized in a module.It is single according to the module of the embodiment of the present disclosure, submodule, unit, son Any one or more in member can be split into multiple modules to realize.According to the module of the embodiment of the present disclosure, submodule, Any one or more in unit, subelement can at least be implemented partly as hardware circuit, such as field programmable gate Array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated integrated electricity Road (ASIC), or can be by the hardware or firmware for any other rational method for integrate or encapsulate to circuit come real Show, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined next reality It is existing.Alternatively, can be at least by part according to one or more of the module of the embodiment of the present disclosure, submodule, unit, subelement Ground is embodied as computer program module, when the computer program module is run, can execute corresponding function.
For example, obtain module 510, generation module 520, encrypting module 530, endorsement module 540, cochain module 550, ring Any number of may be incorporated in a module in module 560, sending module 570 and supplementary module 580 is answered to realize, or Person's any one module therein can be split into multiple modules.Alternatively, one or more modules in these modules are extremely Small part function can be combined at least partly function of other modules, and be realized in a module.According to the disclosure Embodiment, obtain module 510, generation module 520, encrypting module 530, endorsement module 540, cochain module 550, respond module 560, at least one of sending module 570 and supplementary module 580 can at least be implemented partly as hardware circuit, example As on field programmable gate array (FPGA), programmable logic array (PLA), system on chip, substrate system, in encapsulation be System, specific integrated circuit (ASIC), or can be hard by carrying out any other rational method that is integrated or encapsulating etc. to circuit Part or firmware realize, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several It is appropriately combined to realize.Alternatively, obtain module 510, generation module 520, encrypting module 530, endorsement module 540, cochain module 550, at least one of respond module 560, sending module 570 and supplementary module 580 can be at least implemented partly as Computer program module can execute corresponding function when the computer program module is run.
Fig. 6 is diagrammatically illustrated according to the computer system for being adapted for carrying out method as described above of the embodiment of the present disclosure Block diagram.Computer system shown in Fig. 6 is only an example, should not function to the embodiment of the present disclosure and use scope bring Any restrictions.
As shown in fig. 6, computer system 600 includes processor 610 and computer readable storage medium 620.The computer System 600 can execute the method according to the embodiment of the present disclosure.
Specifically, processor 610 for example may include general purpose microprocessor, instruction set processor and/or related chip group And/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor 610 can also include using for caching The onboard storage device on way.Processor 610 can be the different movements for executing the method flow according to the embodiment of the present disclosure Single treatment unit either multiple processing units.
Computer readable storage medium 620, such as can be non-volatile computer readable storage medium, specific example Including but not limited to: magnetic memory apparatus, such as tape or hard disk (HDD);Light storage device, such as CD (CD-ROM);Memory, such as Random access memory (RAM) or flash memory;Etc..
Computer readable storage medium 620 may include computer program 621, which may include generation Code/computer executable instructions execute processor 610 according to the embodiment of the present disclosure Method or its any deformation.
Computer program 621 can be configured to have the computer program code for example including computer program module.Example Such as, in the exemplary embodiment, the code in computer program 621 may include one or more program modules, for example including 621A, module 621B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 610 When execution, processor 610 is executed according to the method for the embodiment of the present disclosure or its any deformation.
According to an embodiment of the invention, obtain module 510, generation module 520, encrypting module 530, endorsement module 540, At least one of cochain module 550, respond module 560, sending module 570 and supplementary module 580 can be implemented as referring to Data processing method described above may be implemented when being executed by processor 610 in the computer program module of Fig. 6 description.
The disclosure additionally provides a kind of computer readable storage medium, which can be above-mentioned reality It applies included in equipment/device/system described in example;Be also possible to individualism, and without be incorporated the equipment/device/ In system.Above-mentioned computer readable storage medium carries one or more program, when said one or multiple program quilts When execution, the method according to the embodiment of the present disclosure is realized.
In accordance with an embodiment of the present disclosure, computer readable storage medium can be non-volatile computer-readable storage medium Matter, such as can include but is not limited to: portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), portable compact disc read-only memory (CD-ROM), light Memory device, magnetic memory device or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or Person is in connection.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
It will be understood by those skilled in the art that the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination, even if such combination or combination are not expressly recited in the disclosure.Particularly, exist In the case where not departing from disclosure spirit or teaching, the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present disclosure.
Although the disclosure, art technology has shown and described referring to the certain exemplary embodiments of the disclosure Personnel it should be understood that in the case where the spirit and scope of the present disclosure limited without departing substantially from the following claims and their equivalents, A variety of changes in form and details can be carried out to the disclosure.Therefore, the scope of the present disclosure should not necessarily be limited by above-described embodiment, But should be not only determined by appended claims, also it is defined by the equivalent of appended claims.

Claims (10)

1. a kind of data processing method, applied to an endorsement node in block chain network, the block chain network includes more A node, the multiple node include one or more endorsement nodes, which comprises
Obtain the endorsement node set specified by client;
Each endorsement node for generating key and being distributed in the endorsement node set, wherein in the endorsement node set The endorsement number of nodes that number of nodes of endorsing is less than or equal in the block chain network;
It is encrypted based on the key pair from the transaction data of the client, obtains encryption data;
The encryption data is sent to each endorsement node in the block chain network, by each endorsement node to the encryption number According to carrying out endorsement verifying, wherein the encryption data can be decrypted in the endorsement node for holding the key;And
If endorsement is proved to be successful, the encryption data is sent to the block chain network, by the block chain network The encryption data is stored in block chain by each node.
2. according to the method described in claim 1, wherein, the generation key includes: a pair of with the endorsement node set one Generate the key with answering.
3. according to the method described in claim 1, wherein, it includes: the confirmation for receiving the first quantity that the endorsement, which is proved to be successful, Message, wherein first quantity and it is described endorsement node set in endorsement number of nodes ratio be more than first make a reservation for compare Example, after each endorsement node being sent to the encryption data in the block chain network, holds any back of the key Book node is based on encryption data described in the key pair and is decrypted, and the transaction data is obtained, by any endorsement node Simulation execution is carried out to the transaction data, if implementing result is correct, returns to the confirmation to one endorsement node Message.
4. according to the method described in claim 1, wherein, the multiple node further includes ordering joint;
It is described that the encryption data is sent to the block chain network includes: that the encryption data is sent to sequence section Point is ranked up the encryption data by the ordering joint, and based on sorting position at the appointed time by the encryption number According to other nodes being sent in the block chain network in addition to ordering joint, so that other described nodes are by the encryption number According in the corresponding block chain of deposit.
5. according to the method described in claim 1, wherein, the encryption data is sent in the block chain network described Each endorsement node after, the method also includes:
In response to the key request of any node;And
If any node is the endorsement node in the endorsement node set, the key is sent to any section Point.
6. described that the encryption data is sent to the block chain network packet according to the method described in claim 1, wherein It includes:
If the transaction data belongs to specified classification, the encryption data is sent to the block chain network.
7. according to the method described in claim 6, further include:
If the transaction data is not belonging to the specified classification, the transaction data is sent to the block chain network, by Each node in the block chain network carries out common recognition verifying to the transaction data, and by the number of deals after being verified According to deposit block chain.
8. described that the encryption data is sent in the block chain network according to the method described in claim 1, wherein Each endorsement node includes: that each endorsement that the encryption data is sent in the block chain network based on epidemic situation propagation protocol is saved Point.
9. a kind of data processing equipment, applied to an endorsement node in block chain network, the block chain network includes more A node, the multiple node include one or more endorsement nodes, and described device includes:
Module is obtained, for obtaining the endorsement node set specified by client;
Generation module, each endorsement node for generating key and being distributed in the endorsement node set, wherein the endorsement Endorsement number of nodes in node set is less than or equal to the endorsement number of nodes in the block chain network;
Encrypting module obtains encryption number for being encrypted based on the key pair from the transaction data that the client is sent According to;
Module of endorsing is saved for the encryption data to be sent to each endorsement node in the block chain network by each endorsement Point endorsement verifying is carried out to the encryption data, wherein hold the key endorsement node can to the encryption data into Row decryption;And
Cochain module, for the encryption data being sent to the block chain network, by the area when endorsement is proved to be successful The encryption data is stored in block chain by each node in block chain network.
10. a kind of computer system, applied to an endorsement node in block chain network, the block chain network includes multiple Node, the multiple node include one or more endorsement nodes, and the computer system includes: memory, processor and deposits Storage on a memory and the computer program that can run on a processor, when the processor execution described program for realizing:
Obtain the endorsement node set specified by client;
Each endorsement node for generating key and being distributed in the endorsement node set, wherein in the endorsement node set The endorsement number of nodes that number of nodes of endorsing is less than or equal in the block chain network;
It is encrypted based on the key pair from the transaction data of the client, obtains encryption data;
The encryption data is sent to each endorsement node in the block chain network, by each endorsement node to the encryption number According to carrying out endorsement verifying, wherein the encryption data can be decrypted in the endorsement node for holding the key;And
If endorsement is proved to be successful, the encryption data is sent to the block chain network, by the block chain network The encryption data is stored in block chain by each node.
CN201910475647.2A 2019-05-31 2019-05-31 Data processing method, data processing device and computer system Active CN110162992B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910475647.2A CN110162992B (en) 2019-05-31 2019-05-31 Data processing method, data processing device and computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910475647.2A CN110162992B (en) 2019-05-31 2019-05-31 Data processing method, data processing device and computer system

Publications (2)

Publication Number Publication Date
CN110162992A true CN110162992A (en) 2019-08-23
CN110162992B CN110162992B (en) 2022-06-28

Family

ID=67627103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910475647.2A Active CN110162992B (en) 2019-05-31 2019-05-31 Data processing method, data processing device and computer system

Country Status (1)

Country Link
CN (1) CN110162992B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110933108A (en) * 2019-09-26 2020-03-27 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network, electronic equipment and storage medium
CN111027099A (en) * 2019-12-09 2020-04-17 北京海益同展信息科技有限公司 Identity verification method, device, system and computer readable storage medium
CN111414633A (en) * 2020-03-18 2020-07-14 联想(北京)有限公司 Information processing method and device
CN111415153A (en) * 2020-03-17 2020-07-14 联想(北京)有限公司 Processing method, electronic equipment and transaction method based on block chain
CN111414634A (en) * 2020-03-18 2020-07-14 联想(北京)有限公司 Information processing method and device
CN111431880A (en) * 2020-03-18 2020-07-17 联想(北京)有限公司 Information processing method and device
CN111444272A (en) * 2020-03-18 2020-07-24 联想(北京)有限公司 Data processing method and device
CN111460525A (en) * 2020-03-31 2020-07-28 腾讯科技(深圳)有限公司 Data processing method and device based on block chain and storage medium
CN111464298A (en) * 2020-03-30 2020-07-28 北京金山云网络技术有限公司 Data processing method and device in block chain and block chain network
CN111553594A (en) * 2020-04-28 2020-08-18 腾讯科技(深圳)有限公司 Resource allocation method, device, computer equipment and computer readable storage medium
CN111614643A (en) * 2020-05-12 2020-09-01 傲林科技有限公司 Key management method and block chain system
CN112488592A (en) * 2020-12-23 2021-03-12 树根互联技术有限公司 Engineering equipment management method and device based on block chain and computer terminal
CN113407558A (en) * 2021-07-14 2021-09-17 广东粤信智能科技有限公司 Transaction data updating method, storage medium and system based on block chain world state
CN115033645A (en) * 2022-07-06 2022-09-09 贵州电网有限责任公司 Electric power data storage method and system based on block chain technology

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108376368A (en) * 2018-03-07 2018-08-07 物数(上海)信息科技有限公司 Endorsement strategy determines method, apparatus, electronic equipment, storage medium
US20180276661A1 (en) * 2017-03-21 2018-09-27 Tora Holdings, Inc. Systems and Methods to Securely Match Orders by Distributing Data and Processing Across Multiple Segregated Computation Nodes
CN108632284A (en) * 2018-05-10 2018-10-09 网易(杭州)网络有限公司 User data authorization method, medium, device and computing device based on block chain
CN109271805A (en) * 2018-08-10 2019-01-25 广东工业大学 A kind of storage of data subregion, querying method and system based on block chain
CN109493204A (en) * 2018-10-16 2019-03-19 平安科技(深圳)有限公司 Business bookkeeping methods and terminal device based on block chain
CN109684880A (en) * 2019-01-07 2019-04-26 江西金格科技股份有限公司 A kind of web data guard method based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180276661A1 (en) * 2017-03-21 2018-09-27 Tora Holdings, Inc. Systems and Methods to Securely Match Orders by Distributing Data and Processing Across Multiple Segregated Computation Nodes
CN108376368A (en) * 2018-03-07 2018-08-07 物数(上海)信息科技有限公司 Endorsement strategy determines method, apparatus, electronic equipment, storage medium
CN108632284A (en) * 2018-05-10 2018-10-09 网易(杭州)网络有限公司 User data authorization method, medium, device and computing device based on block chain
CN109271805A (en) * 2018-08-10 2019-01-25 广东工业大学 A kind of storage of data subregion, querying method and system based on block chain
CN109493204A (en) * 2018-10-16 2019-03-19 平安科技(深圳)有限公司 Business bookkeeping methods and terminal device based on block chain
CN109684880A (en) * 2019-01-07 2019-04-26 江西金格科技股份有限公司 A kind of web data guard method based on block chain

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110933108A (en) * 2019-09-26 2020-03-27 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network, electronic equipment and storage medium
CN111027099A (en) * 2019-12-09 2020-04-17 北京海益同展信息科技有限公司 Identity verification method, device, system and computer readable storage medium
CN111415153A (en) * 2020-03-17 2020-07-14 联想(北京)有限公司 Processing method, electronic equipment and transaction method based on block chain
CN111444272A (en) * 2020-03-18 2020-07-24 联想(北京)有限公司 Data processing method and device
CN111414634A (en) * 2020-03-18 2020-07-14 联想(北京)有限公司 Information processing method and device
CN111431880A (en) * 2020-03-18 2020-07-17 联想(北京)有限公司 Information processing method and device
CN111414633A (en) * 2020-03-18 2020-07-14 联想(北京)有限公司 Information processing method and device
CN111414634B (en) * 2020-03-18 2023-09-19 联想(北京)有限公司 Information processing method and device
CN111431880B (en) * 2020-03-18 2022-03-25 联想(北京)有限公司 Information processing method and device
CN111464298A (en) * 2020-03-30 2020-07-28 北京金山云网络技术有限公司 Data processing method and device in block chain and block chain network
CN111460525A (en) * 2020-03-31 2020-07-28 腾讯科技(深圳)有限公司 Data processing method and device based on block chain and storage medium
CN111460525B (en) * 2020-03-31 2024-06-18 腾讯科技(深圳)有限公司 Block chain-based data processing method, device and storage medium
CN111553594B (en) * 2020-04-28 2023-04-14 腾讯科技(深圳)有限公司 Resource allocation method, device, computer equipment and computer readable storage medium
CN111553594A (en) * 2020-04-28 2020-08-18 腾讯科技(深圳)有限公司 Resource allocation method, device, computer equipment and computer readable storage medium
CN111614643A (en) * 2020-05-12 2020-09-01 傲林科技有限公司 Key management method and block chain system
CN111614643B (en) * 2020-05-12 2022-11-25 傲林科技有限公司 Key management method and block chain system
CN112488592A (en) * 2020-12-23 2021-03-12 树根互联技术有限公司 Engineering equipment management method and device based on block chain and computer terminal
CN113407558A (en) * 2021-07-14 2021-09-17 广东粤信智能科技有限公司 Transaction data updating method, storage medium and system based on block chain world state
CN115033645A (en) * 2022-07-06 2022-09-09 贵州电网有限责任公司 Electric power data storage method and system based on block chain technology
CN115033645B (en) * 2022-07-06 2023-11-21 贵州电网有限责任公司 Power data storage method and system based on block chain technology

Also Published As

Publication number Publication date
CN110162992B (en) 2022-06-28

Similar Documents

Publication Publication Date Title
CN110162992A (en) Data processing method, data processing equipment and computer system
US10846416B2 (en) Method for managing document on basis of blockchain by using UTXO-based protocol, and document management server using same
CN108009917B (en) Transaction verification and registration method and system for digital currency
CN110197082A (en) Data processing method, data processing equipment and computer system
US20200313858A1 (en) Managing sensitive data elements in a blockchain network
CN102170440B (en) Method suitable for safely migrating data between storage clouds
CN103229450B (en) The system and method stored for safe multi-tenant data
CN103609059B (en) The system and method shared for secure data
CN103636160B (en) secure file sharing method and system
CN103270516B (en) System and method for securing virtual machine computing environments
CN109377198A (en) A kind of signing system known together in many ways based on alliance's chain
CN105989295A (en) Data system and method
CN105516110A (en) Mobile equipment secure data transmission method
CN102428686A (en) Systems and methods for securing data in the cloud
CN103563325A (en) Systems and methods for securing data
CN103238305A (en) Accelerator system for use with secure data storage
CN110932859B (en) User information processing method, device and equipment and readable storage medium
CN109286490A (en) Support close state data deduplication and integrity verification method and system
CN109600366A (en) The method and device of protection user data privacy based on block chain
CN106487506A (en) A kind of many mechanisms KP ABE method supporting pre-encrypt and outsourcing deciphering
CN105450750A (en) Secure interaction method for intelligent terminal
CN113315745A (en) Data processing method, device, equipment and medium
Chen et al. Data Access & Sharing Approach for Trade Documentations Based on Blockchain Technology
Vinodhini et al. A patient-centric doctor referral model based on hyperledger chaincode
CN114331437A (en) Block chain-based digital seal using method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant