CN110535848A - A kind of information storage means and device - Google Patents
A kind of information storage means and device Download PDFInfo
- Publication number
- CN110535848A CN110535848A CN201910787330.2A CN201910787330A CN110535848A CN 110535848 A CN110535848 A CN 110535848A CN 201910787330 A CN201910787330 A CN 201910787330A CN 110535848 A CN110535848 A CN 110535848A
- Authority
- CN
- China
- Prior art keywords
- block chain
- public key
- sub
- block
- credit information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The embodiment of the invention discloses a kind of information storage means and devices, wherein information storage means include: that block chain managing device receives the personal credit information from block chain node apparatus;Block chain managing device is based on rivest, shamir, adelman and creates private key and root public key to personal credit information, and is handled using private key personal credit information, generates the digital signature of personal credit information;Block chain managing device is based on default public key generating algorithm and generates sub- public key to root public key, and to sub- first effective time of public key setting and the first setting time;Block chain managing device is based on personal credit information, digital signature, sub- public key, the first effective time and first the first block of setting time generation;First block is published to block chain network belonging to block chain node apparatus by block chain managing device.Using the embodiment of the present invention, personal credit information has been encrypted, it is made to be not easy to be tampered, its safety can be improved.
Description
Technical field
This application involves field of communication technology more particularly to a kind of information storage means and devices.
Background technique
With the rapid development of society, personal credit information is increasingly taken seriously, have become individual activity (such as:
The activities such as bank loan, airplane) deciding factor that can be normally carried out.Personal credit information is along with personal daily
Behavior in life and generate, it is ensured that it is that each personal credit information inquiry mechanism looks into that personal credit information, which safely and effectively stores,
The basic guarantee of inquiry.
Currently, personal credit information is all to be stored by some mechanisms with credit accreditation by credit investigation system
In the network platform.The personal credit information that this mode stores easily is distorted it by lawless people, is stolen, and it is hidden to there is safety
Suffer from.
Summary of the invention
The embodiment of the invention provides a kind of information storage means and device, this method can make the personal credit information of storage
It is not easy to be tampered, steal, its safety can be improved.
In a first aspect, the embodiment of the invention provides a kind of information storage means, this method comprises:
Block chain managing device receives the personal credit information from block chain node apparatus;Block chain managing device is based on
Rivest, shamir, adelman creates private key and root public key to personal credit information, and using private key to personal credit information at
Reason, generates the digital signature of personal credit information;Block chain managing device is based on default public key generating algorithm and generates to root public key
Sub- public key, and to sub- first effective time of public key setting and the first setting time;Block chain managing device is believed based on personal credit
Breath, digital signature, sub- public key, the first effective time and the first setting time generate the first block;Block chain managing device will
First block is published to block chain network belonging to block chain node apparatus.Using the embodiment of the present invention, block chain managing device
Personal credit information is packaged and generates the first block, so that personal credit information is carried out distributed data in a manner of block and deposited
Storage, makes it be not easy to be tampered, its safety can be improved.
In the technical scheme, block chain managing device is to personal credit information creation private key, root public key and root public key
Corresponding sub- public key, and to sub- first effective time of public key setting and the first setting time, private key is used for personal credit information
It is handled, generates the digital signature of personal credit information, so that block chain node apparatus could sign number using sub- public key
Name is decrypted.The creation of private key and root public key has encrypted personal credit information, so that personal credit information is safer.It is sub public
The creation of key protects the safety of root public key, and sub- public key is only effective within the first set effective time, so that even if son
Public key is stolen, caused by loss it is limited.Block chain managing device generates the first block according to the personal credit information, personal
Credit information carries out Distributed Storage in a manner of block chain, has the characteristics that distort, so that personal credit information
Storage have reliable safety.Meanwhile the first block is distributed to belonging to block chain node apparatus by block chain managing device
Block chain network can make so that each block chain node apparatus in block chain network stores the personal credit information
Obtaining personal credit information is shared for all block chain node apparatus in block chain network.
In one implementation, sub- public key is the first sub- public key, and the quantity of the first sub- public key is one.Block chain management
After device is to sub- first effective time of public key setting and the first setting time, block chain managing device can also be public from the first son
The first setting time of key begins to pass through the first effective time of the first sub- public key, determines the first sub- public key failure.Then, block
Chain managing device is based on default public key generating algorithm and generates the second sub- public key to root public key, and has to the second sub- public key setting second
Imitate time and the second setting time.And then block chain managing device is based on the block-identified of the first block, the second sub- public key, second
Effective time and the second setting time generate the second block.
In one implementation, sub- public key is the first sub- public key, and the quantity of the first sub- public key is multiple.Block chain management
Device may include: that block chain managing device is different to each first sub- public key setting to sub- first effective time of public key setting
First effective time section.
In one implementation, block chain managing device is to the different first effective time areas of each first sub- public key setting
Between after, block chain managing device can be according to present system time not in the first effective time area of each first sub- public key
The sub- public key of interior determination all first fails.Then, block chain managing device is based on default public key generating algorithm to root public key
The multiple second sub- public keys are generated, and to each second section of sub- second effective time of public key setting.And then block chain managing device
Block-identified, each second sub- public key and section of each second effective time based on the first block generate third block.
In one implementation, the first block is published to area belonging to block chain node apparatus by block chain managing device
After block chain network, the persistence notice for the first block can be sent to block chain node dress by block chain managing device
It sets, persistence is notified for notifying each block chain node apparatus in each block chain node apparatus local the firstth area of persistence
Block.
Second aspect, the embodiment of the invention provides a kind of information storage means, this method comprises:
Block chain node apparatus obtains personal credit information;Personal credit information is sent to block by block chain node apparatus
Block chain managing device where chain network, so that block chain managing device is when verifying successfully personal credit information, according to
Personal credit information generates the first block, and block chain management dress is all block chain node apparatus in block chain network according to being total to
Know the block chain node apparatus that algorithm elects, block chain network includes at least block chain managing device and block chain node fills
It sets;Block chain node apparatus receives the first block from block chain managing device.
In the technical scheme, personal credit information is sent block chain managing device by block chain node apparatus, by area
Block chain node apparatus is stored and is issued to personal credit information, and the confidence level of personal credit information is improved.Block chain link
Point device receives the first block from block chain managing device about personal credit information, so that block chain node apparatus passes through
The mode for receiving block obtains personal credit information, improves the safety of personal credit information.
In one implementation, the first block includes personal credit information, block chain managing device to personal credit letter
The digital signature of breath, the first sub- public key, the first sub- public key corresponding first effective time and the first setting time, the first son are public
The quantity of key is one.After block chain node apparatus receives the first block from block chain managing device, block chain node
Device can receive personal credit information acquisition request, and personal credit information acquisition request carries the block-identified of the first block.
Block chain node apparatus determines block-identified corresponding first block, effective when beginning to pass through first from the first setting time
Before time, block chain node apparatus determines that the first sub- public key is effective.Block chain block chain link point device uses the first sub- public key
Digital signature is decrypted, to export personal credit information.
In one implementation, the first block includes personal credit information, block chain managing device to personal credit letter
The digital signature of breath, the first sub- public key, the first sub- public key corresponding first effective time and the first setting time, the first son are public
The quantity of key is multiple.After block chain node apparatus receives the first block from block chain managing device, block chain node
Device can receive personal credit information acquisition request, and personal credit information acquisition request carries the block-identified of the first block.
Block chain node apparatus determines block-identified corresponding first block, when present system time is in effective time section,
Block chain node apparatus determines that the first sub- public key is effective.First block chain block chain link point device is using the first sub- public key to number
Signature is decrypted, to export personal credit information.
The third aspect, the present invention provides a kind of information-storing device, which, which has, realizes first aspect or second party
The function of information storage means described in face.The function can also be executed corresponding by hardware realization by hardware
Software realization.The hardware or software include one or more modules corresponding with above-mentioned function.
Fourth aspect, the embodiment of the invention provides a kind of block chain managing device, which includes memory, processing
Device, input equipment and output equipment, memory store batch processing code, and processor calls the program generation stored in memory
Code, for executing operation involved by first aspect.
5th aspect, the embodiment of the invention provides a kind of computer readable storage mediums, for being stored as block chain pipe
Computer program instructions used in device or block chain node apparatus are managed, it includes for executing above-mentioned first aspect or second party
Program involved in face.
By implementing example of the present invention, block chain managing device has carried out at encryption personal credit information using sub- public key
Reason, improves the safety of personal credit information.Meanwhile personal credit information being packaged and generates the first block, allow personal credit information
Distributed Storage is carried out in a manner of block, it is made to be not easy to be tampered reliable safety.Further, block chain management
Device constantly updates sub- public key according to the validity of every sub- public key, so that even if currently used sub- public key is let out
Dew, will not damaging property loss, the safety of personal credit information can be protected.
Detailed description of the invention
Technical solution in order to illustrate the embodiments of the present invention more clearly or in background technique below will be implemented the present invention
Attached drawing needed in example or background technique is illustrated.
Fig. 1 is a kind of structural schematic diagram of block chain provided in an embodiment of the present invention;
Fig. 2 is a kind of configuration diagram of block chain network provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram of information storage means provided in an embodiment of the present invention;
Fig. 4 is the flow diagram of another information storage means provided in an embodiment of the present invention;
Fig. 5 is the flow diagram of another information storage means provided in an embodiment of the present invention;
Fig. 6 is the flow diagram of another information storage means provided in an embodiment of the present invention;
Fig. 7 is a kind of structural schematic diagram of information-storing device provided in an embodiment of the present invention;
Fig. 8 is a kind of structural schematic diagram of block chain managing device provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described with reference to the attached drawing in the embodiment of the present invention.
In personal credit information storing process, more banks, governmental agency (such as Department of Communications) tool are related generally to
The mechanism and terminal device of creditable certification.Wherein, terminal device can be access terminal, user equipment (user
Equipment, UE), subscriber unit, subscriber station, movement station, mobile station, remote station, remote terminal, mobile terminal, user it is whole
End, terminal, wireless telecom equipment, user agent or user apparatus.Access terminal can be cellular phone, wireless phone, session
Initiation protocol (session initiation protocol, SIP) phone, wireless local loop (wireless local
Loop, WLL) it stands, personal digital assistant (personal digital assistant, PDA), the hand with wireless communication function
Holding equipment calculates equipment or is connected to other processing equipments, mobile unit, wearable device, the Internet of Things of radio modem
The public land of terminal device, virtual reality device in net, the terminal device in future 5G network or the following evolution is mobile
Terminal device etc. in network (public land mobile network, PLMN).
Existing information storage relies on some mechanisms (such as bank, governmental agency) with credit accreditation, by interior
Portion's credit investigation system stores it in the network platform.When needing to check these personal credit informations, there is credit accreditation
Mechanism from credit investigation system call.Personal credit information is subject to the infringement of virus etc. in storing process, be tampered it,
It steals, there are security risks.Meanwhile information recording part door (such as railway department, traffic management department, airport department) passes through use
Family carries out the acquisition of personal credit information in the agenda of the department, and then the mechanism with credit accreditation believes personal credit
Breath is verified, and after verifying successfully, is uploaded to internal credit investigation system, checked when needing for user or mechanism.The party
In formula, only the mechanism with credit accreditation just has verification and uploads the qualification of personal credit information, is not easy to personal credit
The management of information.
To solve the above problems, block chain technology is introduced and is applied to personal credit information storage by the embodiment of the present invention
In, propose a kind of information storage means and device.Personal credit information is packaged and generates block by this method, carries out distributed number
According to storage, it is made to be not easy to be tampered, its safety can be improved.This method by block chain managing device to personal credit information into
Row obtains, verification and publication, block chain managing device can be the either block chain node apparatus in block chain network, therefore area
Any block chain node apparatus in block chain network each may participate in the management of personal credit information, for example, to personal credit information into
Row is obtained, verifies and is issued, and facilitates the management of personal credit information.
Block chain (Block Chain) is that data block is combined by one kind in such a way that sequence is connected sequentially in time
A kind of linked data structure, and guarantee in a manner of cryptography the distributed account book that data can not be distorted and can not be forged.It is multiple
Independent distributed node (i.e. block chain node apparatus) saves identical record.Block chain technology realizes decentralization, at
For the foundation stone of the storage of believable digital asset, transfer and transaction.By taking the structural schematic diagram of block chain shown in FIG. 1 as an example, area
Block chain is made of block 1, block 2, is stored with data in block 1, block 2.When there is new data to need to be written the block chain,
New data can be aggregated into block 3, and be added after the end block 2 of block chain, and block chain is guaranteed by common recognition algorithm
Each newly added block of node is identical.Wherein, block 1 includes the cryptographic Hash of itself, and block 2 includes itself
Cryptographic Hash and previous block (i.e. block 1) cryptographic Hash, cryptographic Hash that block 3 includes itself and previous block are (i.e.
Block 2) cryptographic Hash.It is determined in block 1 by the cryptographic Hash of itself in the cryptographic Hash and block 1 of block 1 in verifying block 2
Content whether be tampered, if in block 2 cryptographic Hash of block 1 in block 1 itself cryptographic Hash it is identical, in block 1
Information is not tampered with.It is determined in block 2 by the cryptographic Hash of itself in the cryptographic Hash and block 2 of block 2 in verifying block 3
Whether content is tampered, if in block 3 cryptographic Hash of block 2 in block 2 itself cryptographic Hash it is identical, letter in block 2
Breath is not tampered with.It is by the cryptographic Hash of the cryptographic Hash and previous block itself of previous block in verifying current block in block chain
It is no identical, it may be determined that whether the content in previous block is tampered.
The storage of personal credit information belongs to believable digital asset storage, introduces block chain technology, personal credit is believed
Breath storage and publication are on block chain, it can be ensured that the safety of personal credit information.
A kind of information storage means and device disclosed in embodiment in order to better understand the present invention, first below to this hair
The framework of the applicable block chain network of bright embodiment is described.
Fig. 2 is referred to, Fig. 2 is a kind of configuration diagram of block chain network disclosed by the embodiments of the present invention.Such as Fig. 2 institute
Show, which includes 201, two block chain node apparatus 202 of a block chain managing device.Wherein, block link network
Either block chain node apparatus 202 in network can be the mechanism (such as bank, governmental agency) with credit accreditation.It is above-mentioned
Either block chain node apparatus 202 is for storing personal credit information.Block chain network shown in Fig. 2 is by three block chain nodes
Device composition is given for example only, and does not constitute the restriction to the embodiment of the present invention.
Wherein, block chain managing device is that all block chain node apparatus in block chain network are elected according to common recognition algorithm
A block chain node apparatus out.Wherein, common recognition algorithm include but is not limited to proof of work (Proof of Work,
PoW) algorithm, equity prove that (Proof of Stake, PoS) algorithm, authorization equity prove (Delegated Proof of
Stake, DPoS) algorithm, practical Byzantine failure tolerance (Practical Byzantine Fault Tolerance, PBFT) algorithm
Deng.In one implementation, all block chain node apparatus in block chain network can be according to certain period congressional district
Block chain managing device.Block chain managing device can be used for carrying out the personal credit information currently generated in block chain network
It is packaged, generates block, and block is distributed to block chain network.Block chain managing device can be any in block chain network
One block chain node apparatus.
It is understood that the block chain network of description of the embodiment of the present invention is of the invention real in order to more clearly illustrate
The technical solution of example is applied, the restriction for technical solution provided in an embodiment of the present invention, ordinary skill people are not constituted
Member is it is found that technical solution provided in an embodiment of the present invention is for similar with the differentiation of system architecture and the appearance of new scene
Technical problem, it is equally applicable.
Based on foregoing description, the embodiment of the present invention proposes a kind of information storage means as shown in Figure 3, the information storage side
Method may comprise steps of S301-S306:
Step S301: block chain managing device receives the personal credit information from block chain node apparatus.
Specifically, personal credit information is that block chain node apparatus (mechanism of i.e. creditable certification) acquires.It is a
People's credit information can include but is not limited to the information content, information generation time, information and generate place, information producing cause etc..
Wherein the information content of personal credit information may include the account information of user, Capital Flow situation, traffic violations etc., information
Producing cause may include overdue loan, makes a dash across the red light, forcibly occupies high-speed rail seat etc..Personal credit information can be there are many data knot
Structure, such as table, file.
Step S302: block chain managing device verifies personal credit information.
In one implementation, personal credit information may include the identity information of block chain node apparatus, block chain
The process that managing device verifies personal credit information may include: to verify the identity of personal credit information sender, i.e.,
The identity of block chain link point device is verified, and then improves the confidence level for the personal credit information being published in block chain network.Example
Such as, personal credit information may include the digital signature of block chain node apparatus, wherein digital signature is block chain node apparatus
What signature was handled is carried out to personal credit information according to the private key of block chain node apparatus.Block chain managing device, which receives, to be come
From after the personal credit information of block chain node apparatus, can according to the public key of block chain node apparatus, to digital signature into
Row verification successfully shows that the sender of personal credit information is the block chain node for sending the personal credit information if verifying
Device, block chain managing device verify successfully personal credit information.In this way, be conducive to improve personal credit information
Confidence level.
In one implementation, the process that block chain managing device verifies personal credit information may include
Verification to personal credit information.For example, being covered after carrying credit accreditation agency qualification on each personal credit information to it
Zhang Yin, by verify its Zhang Yin true and false judgement personal credit information it is true and false, if the Zhang Yinwei on personal credit information is true,
Then block chain managing device verifies successfully personal credit information.Alternatively, carrying credit accreditation on each personal credit information
The unique number that mechanism adds after authenticating to it, by verification number, whether necessary being judges the true and false of personal credit information,
If the unique number necessary being on personal credit information, block chain managing device verifies successfully personal credit information.Area
Block chain managing device can ensure that the correctness of personal information by the verifying to personal credit information.
In one implementation, block chain managing device can verify the identity letter of personal credit information sender simultaneously
Breath and personal credit information.The sender of personal credit information is the block chain node apparatus for sending the personal credit information, a
Zhang Yinwei on people's credit information is true or unique number necessary being, then block chain managing device to personal credit information verify at
Function.
In one implementation, if block chain managing device verifies successfully personal credit information, by personal credit
Information is sent to all block chain node apparatus in block chain network.Personal credit information is verified in block chain managing device
In successful situation, personal credit information is just sent to each block chain node apparatus in block chain network, can be improved
The confidence level of personal credit information.Each block chain node apparatus in block chain network verifies personal credit information,
And block chain management dress will be sent in the form of personal credit information verification response for the check results of personal credit information
It sets.
Specifically, each block chain node apparatus in block chain network can be to the body of the sender of personal credit information
Part is verified.It should be noted that regardless of check results are to pass through or do not pass through, each block chain in block chain network
Node apparatus can send personal credit information verification response to block chain managing device.The reception of block chain managing device comes from
The personal credit information of each block chain node apparatus in block chain network verifies response.Wherein, in block chain network
Each block chain node apparatus personal credit information verification response included the check results for personal credit information
Can be independent from each other, i.e., each block chain node apparatus for personal credit information carry out checking procedure can be not by
What other block chain node apparatus influenced.For example, the personal credit information verification response institute from a block chain node apparatus
The check results for personal credit information for including can be verification and pass through, the individual from another block chain node apparatus
The check results for personal credit information that credit information verification response is included can be verification and not pass through.
Block chain managing device is verified according to each personal credit information and is responded, and obtains personal credit information check results,
And then determining whether personal credit information passes through the verification of block chain network, i.e. personal credit information check results are according to block
What the personal credit information verification response that each block chain node apparatus in chain network returns determined jointly.Pass through this side
Formula can make each block chain node apparatus in block chain network both participate in the checking procedure for personal credit information,
Be conducive to improve the confidence level for the personal credit information for being distributed to block chain network.
In one implementation, block chain managing device can be verified according to preset rules and each personal credit information
Response, obtains personal credit information check results.For example, when preset rules are that the minority is subordinate to the majority, and block chain network is by 20
When a block chain node apparatus forms, if there is 14 block chain node apparatus for personal letter in this 20 block chain node apparatus
The check results that the personal credit information verification response returned with information includes are that verification passes through, then block chain managing device can be with
Determine that personal credit information passes through the verification of block chain network.It should be noted that the example above is merely to illustrate block chain pipe
Manage device and based on the principle that the minority is subordinate to the majority determine whether personal credit information passes through the verification of block chain network, other can
In capable implementation, block chain managing device is also based on whether most principles for obeying minority determine personal credit information
By the verification of block chain network, it is not limited in the embodiment of the present invention.
In one implementation, if the check results verification that the verification response of each personal credit information includes passes through
Quantity is more than the first preset threshold, then block chain managing device can determine that personal credit information passes through the school of block chain network
It tests.In one implementation, if the check results that the verification response of each personal credit information includes are the unsanctioned number of verification
Amount is more than the second preset threshold, then block chain managing device can determine that personal credit information does not pass through the school of block chain network
It tests.Wherein, the first preset threshold and the second preset threshold can be equal, can also be unequal.
Step S303: raw based on personal credit information if block chain managing device verifies successfully personal credit information
At the first block.
If block chain managing device verifies successfully personal credit information, personal credit information is packaged, generates first
Block.
Step S304: the first block is distributed to block chain network belonging to block chain node apparatus by block chain managing device
In.
Specifically, corresponding first block of personal credit information can be sent to block chain network by block chain managing device
In each block chain node apparatus, each block chain node apparatus in block chain network stores the personal credit information,
Can make personal credit information is shared for all block chain node apparatus in block chain network.
Step S305: the local persistence notice for the first block is sent to block chain node by block chain managing device
Device.
After first block is distributed to block chain network belonging to block chain node apparatus by block chain managing device, it will be directed to
The persistence notice of first block is sent to block chain node apparatus, so that block chain node apparatus, which receives, comes from the management of block chain
Device is notified for the local persistence of the first block.
Step S306: local persistence first block of the block chain node apparatus in block chain node apparatus.
Block chain node apparatus receives the first block from block chain managing device and for the lasting of the first block
After changing notice, the first block can be permanently stored in area in the first block of local persistence of block chain node apparatus
In block chain node apparatus.It is corresponding that the personal credit information is stored in each block chain node apparatus in block chain network
In the case where first block, show that personal credit information is successfully distributed to the block chain node apparatus for obtaining personal credit information
Affiliated block chain network.In this way, the publication of personal credit information can be made for each in block chain network
A block chain node apparatus is Fairshare.Meanwhile personal credit information is stored in a manner of block, current block is deposited
The cryptographic Hash of itself and the cryptographic Hash of previous block are stored up, through the cryptographic Hash of the previous block stored in verifying current block with before
Whether the cryptographic Hash of itself is identical in one block, can determine whether the personal credit information in current block is modified, this
Mode makes the personal credit information in block be difficult to be tampered.
The embodiment passes through block chain node apparatus when receiving persistence notice, just in local the firstth area of persistence
The mode of block, can be to avoid block chain node apparatus when not receiving persistence notice, in local the first block of persistence
Situation (i.e. all information received of block chain node apparatus persistence), the storage for being conducive to improve block chain node apparatus are empty
Between utilization rate.
As it can be seen that personal credit information can be made to carry out distribution in a manner of block by implementing the embodiment of the present invention
Data storage, can not be tampered.Meanwhile so that personal credit information for each block chain node apparatus in block chain network
It is Fairshare.
Fig. 4 is referred to, Fig. 4 is the flow diagram of another information storage means provided in an embodiment of the present invention, the party
Method includes but is not limited to step S401-S407.
Step S401: block chain managing device receives the personal credit information from block chain node apparatus.
Step S402: block chain managing device verifies personal credit information.
For details, reference can be made to step S301-S302 in above-described embodiment to hold by step S401-S402 in the embodiment of the present application
Row process, the embodiment of the present invention repeat no more.
Step S403: if block chain managing device verifies successfully personal credit information, it is based on rivest, shamir, adelman
Key pair is created to personal credit information.
Specifically, block chain managing device, which is based on rivest, shamir, adelman, creates key pair, key to personal credit information
To including public key and private key.
In one implementation, private key is digitally signed personal credit information for block chain managing device, public
Key is for decryption of all block chain node apparatus to digital signature in block chain network, to obtain personal credit information.Hereafter
It is illustrated by the way of private key encryption, public key decryptions, does not constitute the limitation to the embodiment of the present application, such as can be with
By the way of public key encryption, private key decryption.
Block chain managing device creates key pair to personal credit information, is encrypted and is generated to personal credit information by private key
Digital signature, could be decrypted digital signature using public key, carry out encryption to personal credit information, can be again
Enhance the safety of personal credit information.
Step S404: block chain managing device is based on personal credit information and generates the first block.
Specifically, block chain managing device is based on personal credit information and public key generates the first block, so that personal credit
Information and public key for decryption are collectively stored in the first block.
Step S405: the first block is distributed to block chain network belonging to block chain node apparatus by block chain managing device
In.
Step S406: the local persistence notice for the first block is sent to block chain node by block chain managing device
Device.
Step S407: local persistence first block of the block chain node apparatus in block chain node apparatus.
For details, reference can be made to step S304-S306 in above-described embodiment to hold by step S405-S407 in the embodiment of the present application
Row process, the embodiment of the present invention repeat no more.
Fig. 5 is referred to, Fig. 5 is the flow diagram of another information storage means provided in an embodiment of the present invention, the party
Method includes but is not limited to step S501-S516.
Step S501: block chain managing device receives the personal credit information from block chain node apparatus.
Step S502: block chain managing device verifies personal credit information.
For details, reference can be made to step S301-S302 in above-described embodiment to hold by step S501-S502 in the embodiment of the present application
Row process, the embodiment of the present invention repeat no more.
Step S503: it if if block chain managing device verifies successfully personal credit information, is calculated based on asymmetric encryption
Method creates private key, root public key to personal credit information.
In one implementation, private key is digitally signed personal credit information for block chain managing device, root
Public key is for decryption of all block chain node apparatus to digital signature in block chain network, to obtain personal credit information.Under
Literary grace private key encryption, the mode of root public key decryption are illustrated, and do not constitute the limitation to the embodiment of the present application, such as
It can be encrypted using root public key, by the way of private key decryption.
Step S504: block chain managing device is based on public key generating algorithm and generates a first sub- public key to root public key, and
The first effective time and the first setting time of first sub- public key are set.
Specifically, block chain managing device, which is based on public key generating algorithm, generates a first sub- public key to root public key, and right
The setting time of first sub- public key setting corresponding first effective time and the first effective time, public key generating algorithm may include
But be not limited to SHA256 algorithm, SHA224 algorithm, SHA384 algorithm etc..First effective time of the first sub- public key refers to the first son
Public key only comes into force within the first effective time, spends for the first effective time, and corresponding first sub- public key cannot be used, so that
First sub- public key has unique timeliness.The first setting time of first effective time refers to system when generating the first sub- public key
Time, the first effective time timing since the first setting time of the first sub- public key.
Illustratively, system time when block chain managing device generates the first sub- public key is No. 6 mornings 10 of in August, 2019
The first setting time of point, i.e., the first sub- public key is at 10 points in the morning of August 6 in 2019.First sub- first effective time of public key was 5
A hour, then the first effective time of the first sub- public key timing since at 10 points in the morning of August 6 in 2019, from August 6 in 2019
Numbers 10 points of the morning by 5 hours of the first effective time, the first sub- public key be all it is effective, block chain node apparatus can be with
The digital signature of personal credit information is decrypted using the first sub- public key.In August 6 at 3 in the afternoon in 2019 first
5 hours of effective time arrive, and first sub- public key failure, block chain node apparatus cannot make No. 63 points of in August, 2019 later
Digital signature is decrypted with the first sub- public key.
The first effective time and corresponding first setting time of the first sub- public key is arranged in block chain managing device, so that the
One sub- public key is only effective within certain time limit, so that block chain node apparatus only can just make within the validity period of the first sub- public key
Digital signature is decrypted with the first sub- public key.This mode to the first sub- first effective time of public key setting make even if
First sub- public key is leaked, and root public key is still protected, caused by loss it is limited.
Step S505: block chain managing device is based on personal credit information and generates the first block.
Specifically, block chain managing device is based on personal credit information, digital signature, the first sub- public key, the first sub- public key
The first effective time and first setting the time generate the first block so that digital signature, the first sub- public key, the first sub- public key
The first effective time and first setting the time be all stored in personal credit information in the first block so that block chain network
In use when the first block is decrypted of all block chain node apparatus.
Step S506: the first block is distributed to block chain network belonging to block chain node apparatus by block chain managing device
In.
For details, reference can be made to the implementation procedure of step S304 in above-described embodiment, this hairs by step S506 in the embodiment of the present application
Bright embodiment repeats no more.
Step S507: block chain node apparatus receives personal credit information acquisition request.
Block chain node apparatus can receive personal credit information acquisition request from the user.Personal credit information obtains
Request carries the block-identified of the first block, and the block-identified of the first block may include but be not limited only to digital number, special
Letter, name etc..The first block of block-identified direction of first block obtains block chain node apparatus according to individual
Request targetedly obtains the personal credit information for wanting to obtain.
Currently, needing when user or mechanism want to check personal credit information to the machine with credit accreditation
Application is checked in structure submission, after the mechanism with credit accreditation audits this application, could be checked to personal credit information, should
Mode complex steps.And block chain managing device issues the first block in the block chain network where block chain node apparatus
In, all block chain nodes after block chain node apparatus receives personal credit information acquisition request, in block chain network
Device can be used directly the effective first sub- public key and the first block be decrypted, to check personal credit information.Which
It is directly simple, so that more convenient to checking for personal credit information.
Step S508: block chain node apparatus determines the first block based on personal credit information acquisition request.
Block chain node apparatus to be obtained based on the block-identified determination of the first block in personal credit information acquisition request
The first block taken, it is ensured that the personal credit information to be obtained is present in the first block.
Step S509: block chain node apparatus is determined based on the first effective time of the first sub- public key and the first setting time
First sub- public key is effective.
Specifically, block chain node apparatus is since the first of the first sub- public key the setting time, by the first effective time
It is interior, determine that the first sub- public key is effective.Illustratively, the first effective time of the first sub- public key, the first setting time are respectively as walked
Described in rapid S504, then the first sub- public key from first setting 2019 time August 6 at 10 points in the morning begin to pass through first it is effective when
Between in 5 hours, i.e. before August 6 at 3 points in afternoon in 2019, block chain node apparatus determines that the first sub- public key is effective.
Step S510: block chain node apparatus is decrypted the first block using the first sub- public key.
The first sub- public key can be used to the number of the first block after determining that the first sub- public key is effective in block chain node apparatus
Word signature is decrypted, and obtains personal credit information.
Step S511: block chain managing device is determined based on the first effective time of the first sub- public key and the first setting time
First sub- public key failure.
Block chain managing device can begin to pass through the of the first sub- public key from the first of the first sub- public key the setting time
One effective time determined the first sub- public key failure.
Illustratively, the time is arranged as described in step S504 in the first effective time of the first sub- public key and first, and first
After sub- public key has begun to pass through 5 hours of the first effective time from first setting 2019 time August 6 at 10 points in the morning, i.e.,
After August 6 at 3 points in afternoons in 2019, block chain managing device determines first sub- public key failure.
It should be noted that the execution sequence of step S511 and step S508 are in no particular order, if block chain node apparatus connects
After receiving acquisition request, step S508 can be first carried out, it is rear to execute step S511;Step S511 can also be first carried out, executes step afterwards
Rapid S508;It may also be performed simultaneously step S508 and step S511, the embodiment of the present invention is not construed as limiting this.
Step S512: block chain managing device is based on public key generating algorithm and generates a second sub- public key to root public key, and
The second effective time and the second setting time of second sub- public key are set
After block chain managing device determines first sub- public key failure, one the is generated based on above-mentioned public key generating algorithm
Two sub- public keys, it is effective that the second sub- public key is begun to pass through in the second effective time from the second setting time.
Illustratively, system time when block chain managing device generates the second sub- public key is No. 6 afternoons 3 of in August, 2019
Point, i.e., the second setting time of the second sub- public key are August 6 at 3 points in afternoon in 2019, and the second sub- second effective time of public key was 4
A hour, then the second effective time of the second sub- public key timing since August 6 at 3 points in afternoon in 2019, from 2019 August 6
At 3 points in afternoon is by 4 hours of the second effective time, which is all effectively that block chain node apparatus can make
Digital signature of the block chain managing device to personal credit information is decrypted with the second sub- public key.2019 August 6
4 hours of the second effective time arrive when at 7 in afternoon, second sub- public key failure after August 6 at 7 points in afternoons in 2019, block
Chain node apparatus cannot use the second sub- public key that digital signature is decrypted.
Block chain managing device determines that the first sub- public key failure is the precondition that sub- public key is updated.Second sub- public key
Creation so that block chain node apparatus the second sub- public key can be used to solve digital signature after the first sub- public key failure
It is close, it ensure that block chain node apparatus has corresponding sub- public key available at any one time.
Step S513: block chain managing device is based on the block-identified of the first block, the second sub- public key, the second effective time
And second setting the time generate the second block.
The block-identified of first block obtains before the generation of the second block for block chain managing device, may include but not
It is only limitted to digital number, special letter, name etc., the first block of block-identified direction of the first block.It is still wrapped in first block
When containing personal credit information, digital signature, the first sub- public key, the first effective time of the first sub- public key and the first setting
Between, but only personal credit information and digital signature are effective in the first block at this time, the first sub- public key in the first block, first
Effective time, the first setting time have failed, and can not be used by block chain node apparatus.
Step S514: the second block is distributed to block chain network belonging to block chain node apparatus by block chain managing device
In.
Specifically, corresponding second block of personal credit information can be sent to block chain network by block chain managing device
In each block chain node apparatus, each block chain node apparatus in block chain network stores the personal credit information,
Can make personal credit information is shared for all block chain node apparatus in block chain network.
Step S515: block chain node apparatus is determined based on the second effective time of the second sub- public key and the second setting time
Second sub- public key is effective.
Block chain node apparatus is since the second setting time of the second sub- public key, by determining in the second effective time
Second sub- public key is effective.Illustratively, the second effective time of the second sub- public key, the second setting time are respectively as in step S512
Described, then the second sub- public key begins to pass through 4 hours of the second effective time from the second setting 2019 time August 6 at 3 points in afternoon
Interior, i.e. before August 6 at 7 points in afternoon in 2019, block chain node apparatus determines that the second sub- public key is effective.
Step S516: block chain node apparatus is decrypted the second block using the second sub- public key.
Specifically, block chain node apparatus is after determining that the second sub- public key is effective, using the second sub- public key to the second block
Digital signature be decrypted, to obtain personal credit information.
As it can be seen that the second sub- public key is generated after block chain managing device determines the first sub- public key failure in the embodiment of the present invention,
Block chain node apparatus confirms that the second sub- public key is effectively afterwards decrypted the second block using the second sub- public key.Which makes
Sub- public key is constantly updated, and the safety of personal credit information storage within a block can be improved.
Fig. 6 is referred to, Fig. 6 is the flow diagram of another information storage means provided in an embodiment of the present invention, the party
Method includes but is not limited to step S601-S616.
Step S601: block chain managing device receives the personal credit information from block chain node apparatus.
Step S602: block chain managing device verifies personal credit information.
Step S603: if block chain managing device verifies successfully personal credit information, it is based on rivest, shamir, adelman
Private key, root public key are created to personal credit information.
For details, reference can be made to step S501-S503 in above-described embodiment to hold by step S601-S603 in the embodiment of the present application
Row process, the embodiment of the present invention repeat no more.
Step S604: block chain managing device is based on public key generating algorithm and generates multiple first sub- public keys to root public key, and
First effective time section of each first sub- public key is set.
Block chain managing device is based on public key generating algorithm and generates multiple first sub- public keys to root public key, and public key, which generates, to be calculated
Method includes and is not limited only to the method in step 504.First effective time section of the first sub- public key refers to that the first sub- public key can
The time interval used, the lower boundary in section of current first effective time are the coboundary in the first effective time of target section, are protected
Demonstrate,prove section of each first effective time has continuity in time.Only when the corresponding system time of the first sub- public key is first
In effective time section, the first sub- public key is just effective.
Illustratively, the first effective time section of first the first sub- public key is the morning 9. -2019 on July 2nd, 2019
12 points of the morning of on July 2, of, the first effective time section of second the first sub- public key are at 12 points in the morning on July 2nd, 2019-
2 pm on July 4th, 2019, the first effective time section of the first sub- public key of third are 2 pm-on July 4th, 2019
3 points of the morning of July 5 in 2019.12 points of the morning of lower boundary on July 2nd, 2019 in first the first effective time section is second
The coboundary in section of a first effective time, the lower boundary 2 pm on July 4th, 2019 in second the first effective time section
For the coboundary in third the first effective time section so that first first effective time section, second first it is effective when
Between section, third the first effective time section it is continuous in time.Meanwhile first the first effective time section corresponding
One first sub- public key is only on first first section 9. -2019 on July 2, of the morning on July 2nd, 2019 effective time
In 12 points of noon effectively, corresponding second the first sub- public key in second the first effective time section only second first it is effective when
Between in section 2 pm July 4 in the 12. -2019 year morning of on July 2nd, 2019 effectively, third effective time section is corresponding
The first sub- public key of third is only on the July 5-2019 years 2 pms on July 4th, 2019 of third the first effective time section
In 3 points of noon effectively.
Step S605: block chain managing device is based on personal credit information and generates the first block.
Specifically, block chain managing device is based on personal credit information, digital signature, all first sub- public keys and each
First sub- public key section of corresponding first effective time generates the first block.So that digital signature, all first sub- public keys and
Section of each first effective time is all stored in the first block with personal credit information, for all blocks in block chain network
Chain node apparatus uses when decrypting to block.
Step S606: the first block is distributed to block chain network belonging to block chain node apparatus by block chain managing device
In.
Step S607: block chain node apparatus receives personal credit information acquisition request.
Step S608: block chain node apparatus determines the first block based on personal credit information acquisition request.
For details, reference can be made to step S506-S508 in above-described embodiment to hold by step S606-S608 in the embodiment of the present application
Row process, the embodiment of the present invention repeat no more.
Step S609: block chain node apparatus determines all based on the first effective time section of all first sub- public keys
A first sub- public key in one sub- public key is effective.
Block chain node apparatus is by judge that present system time is corresponding all first effective in all first sub- public keys
In first effective time in time interval, determine that a first sub- public key in all first sub- public keys is effective.
Illustratively, the first of first the first sub- public key, second the first sub- public key, third the first sub- public key is effective
Time interval is respectively described in step S604, if current system time is at 10 points in the morning on July 3rd, 2,019 25 minutes, at this time
Current system time is in second the first section of sub- first effective time of public key, then block chain node apparatus determines second
First sub- public key is effective, and in this system time, second the first sub- public key is for the use of block chain node apparatus.If again currently
System time is 40 minutes at 8 points in afternoons on July 4th, 2019, and system time current at this time has in the first sub- public key first of third
It imitates in time interval, then block chain node apparatus determines that the first sub- public key of third is effective, in this system time, third first
Sub- public key is for the use of block chain node apparatus.
Step S610: block chain node apparatus is using effective first sub- public key in all first sub- public keys to the first block
It is decrypted.
Block chain node apparatus signs the number in the first block using the effective first sub- public key determined in above-mentioned steps
Name is decrypted, so as to obtain personal credit information.
Step S611: block chain managing device determines all based on the first effective time section of each first sub- public key
One sub- public key fails.
Block chain managing device is by judging that present system time does not have in each first sub- public key corresponding all first
It imitates in time interval, determines that all first sub- public keys fail.
Illustratively, the first of first the first sub- public key, second the first sub- public key, third the first sub- public key is effective
Time interval is respectively described in step 604, if current system time is at 3 points in the morning on July 5th, 2,019 5 minutes, currently at this time
System time not first the first sub- public key, second the first sub- public key, third the first sub- public key first effectively
Within time interval, then block chain managing device determines first the first sub- public key, second the first sub- public key, third a first
Sub- public key fails.Block chain node apparatus cannot be using any one first sub- public key in all first sub- public keys to next
It is decrypted from digital signature of the block chain managing device to personal credit information.
It should be noted that the execution sequence of step S611 and step S608 are in no particular order, if block chain node apparatus connects
After receiving acquisition request, step S608 can be first carried out, it is rear to execute step S611;Step S611 can also be first carried out, executes step afterwards
Rapid S608;It may also be performed simultaneously step S608 and step S611, the embodiment of the present invention is not construed as limiting this.
Step S612: block chain managing device is based on public key generating algorithm and generates multiple second sub- public keys, and is arranged each
Second effective time section of the second sub- public key.
After block chain managing device determines all first sub- public key failures according to above-mentioned steps, based on shown in step 604
Public key generating algorithm generates multiple second sub- public keys, and the second effective time section of each second sub- public key, Suo You is arranged
Two sub- public keys are only effective in the second corresponding effective time section.
Illustratively, the second effective time section of first the second sub- public key is the morning 3. -2019 on July 5th, 2019
On July 6,8 a.m., the second effective time section of second the second sub- public key is on the July 6th, 2019 of 8 a.m. -2019
6 pm on July 6, the second effective time section of the second sub- public key of third are 6 pm -2019 on July 6th, 2019
9 points of the morning of on July 8, of.The lower boundary 8 a.m. on July 6 in 2019 in first the second effective time section is second second
The coboundary in effective time section, lower boundary 6 pm July 6 in 2019 in second the second effective time section are third
The coboundary in section of a second effective time so that first second effective time section, second second effective time section,
The second effective time section of third is continuous in time.Meanwhile first the second effective time section is first corresponding
Two sub- public keys are on July 6 in the 3. -2019 year morning of on July 5th, 2019 only in first the second effective time section 8 a.m.
Effectively, corresponding second the second sub- public key in second the second effective time section is only in second the second effective time section
In 8 a.m. 6 pm on July 6th, 1 on July 6th, 2019 effectively, the corresponding third in third effective time section
Second sub- public key is only within second section at 9 points in morning July 8-2019 years 6 pms on July 6th, 2019 effective time of third
Effectively.
Which makes after all first sub- public key failures, and block chain node apparatus still has phase in future time section
Corresponding second sub- public key is available.
Step S613: block-identified, each second sub- public key of the block chain managing device based on the first block and each
Second effective time section generates the second block.
The block-identified of first block obtains before the generation of the second block for block chain managing device, may include but not
It is only limitted to digital number, special letter, name etc..The first block of block-identified direction of first block still wraps in the first block
Containing personal credit information, digital signature, each first sub- public key and section of each first effective time, but the firstth area at this time
Only personal credit information and digital signature are effective in block, each first sub- public key in the first block and it is each first it is effective when
Between section failed, can not be used by block chain node apparatus.
Step S614: the second block is distributed to block chain network belonging to block chain node apparatus by block chain managing device
In.
For details, reference can be made to the implementation procedure of step S514 in above-described embodiment, this hairs by step S614 in the embodiment of the present application
Bright embodiment repeats no more.
Step S615: block chain node apparatus determines all based on the second effective time section of all second sub- public keys
A second sub- public key in two sub- public keys is effective.
Block chain node apparatus is by judge that present system time is corresponding all second effective in all second sub- public keys
In second effective time in time interval, determine that a second sub- public key in all second sub- public keys is effective.Example
Property, the second effective time section difference of first the second sub- public key, second the second sub- public key, third the second sub- public key
For described in step S612, if current system time is 45 minutes at 3 points in afternoons on July 5th, 2019, system time current at this time
In first the second section of sub- second effective time of public key, then block chain node apparatus determines that second the second sub- public key has
Effect, in this system time, second the second sub- public key is for the use of block chain node apparatus.If current system time is again
In at 10 points in the morning 20 minutes on July 7th, 2019, system time current at this time is in the second section of sub- second effective time of public key of third
Interior, then block chain node apparatus determines that third the second sub- public key is effective, in this system time, the second sub- public key of third for
Block chain node apparatus uses.
Step S616: block chain node apparatus is using the effective second sub- public key in all second sub- public keys to the second block
It is decrypted.
Specifically, block chain node apparatus makes after determining that a second sub- public key in all second sub- public keys is effective
The digital signature of the first block is decrypted with the effective second sub- public key in all second sub- public keys, to obtain personal credit
Information.
As it can be seen that in the embodiment of the present invention block chain managing device be based on root public key once generate the multiple first sub- public keys, mention
The formation efficiency of high first sub- public key.After block chain managing device determines that all first sub- public keys fail simultaneously, generate multiple
Second sub- public key, block chain node apparatus determine a second sub- public key in all second sub- public keys effectively afterwards using effective
The second block is decrypted in second sub- public key.But also sub- public key is constantly updated during being somebody's turn to do, personal credit information can be improved
The safety of storage within a block.
Fig. 7 is referred to, Fig. 7 is a kind of structural schematic diagram of information-storing device provided in an embodiment of the present invention, the letter
Breath storage device can be used for step performed by block chain managing device in Fig. 3-embodiment illustrated in fig. 6, the information storage
Device 70 at least may include:
Receiving module 701, for receiving the personal credit information from block chain node apparatus;
Processing module 702, for creating private key and root public key to personal credit information;It is also used for believing individual using private key
It is handled with information, generates the digital signature of personal credit information;It is also used for based on personal credit information, digital signature, son
Public key, the first effective time and the first setting time generate the first block;It is also used for sub- first effective time of public key setting
With the first setting time;
Sending module 703, for the first block to be published to block chain network belonging to block chain node apparatus.
In one implementation, sub- public key is the first sub- public key, and the quantity of the first sub- public key is one, processing module
702, it is also used to begin to pass through the first effective time of the first sub- public key from the first setting time of the first sub- public key, determines first
Sub- public key failure;It is then based on the default public key generating algorithm and the second sub- public key is generated to the root public key, and to described the
Two sub- second effective times of public key setting and the second setting time;Block-identified, described second again based on first block
Sub- public key, second effective time and the second setting time generate the second block.
In one implementation, sub- public key is the first sub- public key, and the quantity of the first sub- public key is multiple, processing mould
Block 703 is also used to the different first effective time sections of each first sub- public key setting.
In one implementation, processing module 703 are also used to according to present system time not each described first
Determine that all first sub- public keys fail in first effective time section of sub- public key;Then multiple second sons are generated to root public key
Public key, and to each second section of sub- second effective time of public key setting;Block-identified, each second based on the first block again
Sub- public key and section of each second effective time generate third block.
In one implementation, sending module 703 are also used to the persistence notice for the first block being sent to area
Block chain node apparatus, the persistence notice is for notifying each block chain node apparatus in each block chain node
First block described in the persistence of device local.
Fig. 8 is referred to, Fig. 8 is a kind of structural schematic diagram of block chain managing device provided in an embodiment of the present invention, the area
Block chain managing device 80 includes processor 801, memory 802, communication interface 803, the processor 801, the memory
802, the communication interface 803 is connected by one or more communication bus.
Processor 801 is configured as that block chain managing device is supported to execute block chain management in Fig. 3-embodiment illustrated in fig. 6
The corresponding function of device.The processor 801 can be central processing unit (central processing unit, CPU), network
Processor (network processor, NP), hardware chip or any combination thereof.
Memory 802 is for storing program code etc..Memory 802 may include volatile memory (volatile
), such as random access memory (random access memory, RAM) memory;Memory 802 also may include non-easy
The property lost memory (non-volatile memory), such as read-only memory (read-only memory, ROM), flash
Device (flash memory), hard disk (hard disk drive, HDD) or solid state hard disk (solid-state drive, SSD);
Memory 802 can also include the combination of the memory of mentioned kind.
Communication interface 803 is for sending and receiving data, for example, communication interface 803 comes from block chain node for receiving
The personal credit information of device, alternatively, communication interface 803 is distributed to each block chain in block chain network for the first block
Node apparatus etc..
In embodiments of the present invention, which includes multiple communication interfaces, wherein for sending data
Communication interface and communication interface for receiving data can not be the same communication interface.
Processor 801 can call the program code stored in memory 802 to execute following operation:
Communication interface 803 receives the personal credit information from block chain node apparatus;
Processor 801 is based on rivest, shamir, adelman and creates private key and root public key to personal credit information, and uses private key
Personal credit information is handled, the digital signature of personal credit information is generated;
Processor 801 is based on default public key generating algorithm and generates sub- public key to root public key, and has to sub- public key setting first
Time and the first setting time are imitated, sub- public key is used for decryption of the block chain node apparatus to digital signature;
Processor 801 is set based on personal credit information, digital signature, sub- public key, the first effective time and described first
Set the first block of time generation;
First block is distributed to block link network described in block chain node apparatus by communication interface 803 by processor 801
In network.
In one implementation, the sub- public key that processor 801 creates is the first sub- public key, and the quantity of the first sub- public key is
One;After 801 pairs of processor first effective times of public key setting and the first setting time, following operation can also be performed:
Processor 801 can be begun to pass through from the first of the first sub- public key the setting time the first sub- public key first it is effective when
Between, determine the first sub- public key failure;
Processor 801 is based on default public key generating algorithm and generates the second sub- public key to root public key, and sets to the second sub- public key
Set the second effective time and the second setting time;
When processor 801 is based on the block-identified of the first block, the second sub- public key, the second effective time and the second setting
Between generate the second block.
In one implementation, the sub- public key that processor 801 creates is the first sub- public key, and the quantity of the first sub- public key is
One;801 pairs of processor first effective times of public key setting, may include: the sub- public key setting of processor 801 each first not
With the first effective time section.
In one implementation, processor 801 to each first sub- public key setting difference the first effective times section it
Afterwards, following operation can also be performed:
Processor 801 can be according to present system time not in the first effective time section of each first sub- public key
Determine that all first sub- public keys fail;
Processor 801 is based on default public key generating algorithm and generates multiple second sub- public keys to root public key, and to each second
Section of sub- second effective time of public key setting;
Processor 801 is based on block-identified, each second sub- public key of the first block and area of each second effective time
Between generate third block.
In one implementation, the first block is published to block chain belonging to block chain node apparatus by processor 801
After network, following operation can also be performed:
Persistence notice for the first block can be sent to block chain node apparatus by processor 801, and persistence is logical
Know for notifying each block chain node apparatus in each block chain node apparatus local the first block of persistence.
The embodiment of the present invention also provides a kind of computer readable storage medium, can be used for storing and implement shown in Fig. 3~Fig. 6
Computer software instructions used in block chain managing device in example, it includes for executing in above-described embodiment as block chain node
Program designed by device.
Above-mentioned computer readable storage medium includes but is not limited to flash memory, hard disk, solid state hard disk.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
Claims (10)
1. a kind of information storage means characterized by comprising
Block chain managing device receives the personal credit information from block chain node apparatus;
The block chain managing device is based on rivest, shamir, adelman and creates private key and root public key to the personal credit information, and
Personal credit information is handled using private key, generates the digital signature of the personal credit information;
The block chain managing device is based on default public key generating algorithm and generates sub- public key to the root public key, and public to the son
The first effective time and the first setting time is arranged in key, and the sub- public key signs the number for the block chain node apparatus
Name is decrypted;
The block chain managing device is had based on the personal credit information, the digital signature, the sub- public key, described first
It imitates the time and the first setting time generates the first block;
First block is published to block chain network belonging to the block chain node apparatus by the block chain managing device,
The block chain network includes at least the block chain managing device and the block chain node apparatus.
2. first son is public the method according to claim 1, wherein the sub- public key is the first sub- public key
The quantity of key is one;
After the block chain managing device is to the first effective time described in the sub- public key setting and the first setting time,
The method also includes:
The block chain managing device begins to pass through the described first sub- public key from the first setting time of the described first sub- public key
First effective time determined the described first sub- public key failure;
The block chain managing device is based on the default public key generating algorithm and generates the second sub- public key to the root public key, and right
Second sub- second effective time of public key setting and the second setting time;
Block-identified, described second sub- public key of the block chain managing device based on first block, described second are effectively
Time and the second setting time generate the second block.
3. first son is public the method according to claim 1, wherein the sub- public key is the first sub- public key
The quantity of key is multiple;
The block chain managing device is to sub- first effective time of public key setting, comprising:
The block chain managing device is to the first effective time section of each first sub- public key setting difference.
4. according to the method described in claim 3, it is characterized in that, the block chain managing device is public to each first son
Key is arranged after different first effective time sections, the method also includes:
The block chain managing device according to present system time not each first sub- public key described first effectively
Determine that all first sub- public keys fail in time interval;
The block chain managing device is based on the default public key generating algorithm and generates multiple second sub- public keys to the root public key,
And to each second sub- second effective time of public key setting section;
The block chain managing device is based on block-identified, each second sub- public key of first block and each institute
It states the second effective time section and generates third block.
5. the method according to claim 1, wherein the block chain managing device issues first block
To after block chain network belonging to the block chain node apparatus, the method also includes:
Persistence notice for first block is sent to the block chain node apparatus by the block chain managing device,
The persistence notice is for notifying that each block chain node apparatus is locally lasting in each block chain node apparatus
Change first block.
6. a kind of information storage means characterized by comprising
The block chain node apparatus obtains personal credit information;
The personal credit information is sent to the block chain managing device where block chain network by the block chain node apparatus,
The block chain management dress is that all block chain node apparatus in the block chain network are elected according to common recognition algorithm
Block chain node apparatus, the block chain network include at least the block chain managing device and the block chain node apparatus;
The block chain node apparatus receives the first block from the block chain managing device.
7. according to the method described in claim 6, it is characterized in that, first block includes the personal credit information, institute
Block chain managing device is stated to the digital signature of the personal credit information, the first sub- public key, the first sub- public key pair
The first effective time answered and the first setting time, the quantity of the first sub- public key are one;
The block chain node apparatus receives after the first block from the block chain managing device, further includes:
The block chain node apparatus receives personal credit information acquisition request, and the personal credit information acquisition request carries institute
State the block-identified of the first block;
The block chain node apparatus determines block-identified corresponding first block;
Before beginning to pass through first effective time from the first setting time, described in the block chain node apparatus determination
First sub- public key is effective;
The block chain node apparatus is decrypted the digital signature using the described first sub- public key, to export the individual
Credit information.
8. according to the method described in claim 6, it is characterized in that, first block includes the personal credit information, institute
Block chain managing device is stated to the digital signature of the personal credit information, the first sub- public key, the first sub- public key pair
The the first effective time section answered, the quantity of the first sub- public key are multiple;
The block chain node apparatus receives after the first block from the block chain managing device, further includes:
The block chain node apparatus receives personal credit information acquisition request, and the personal credit information acquisition request carries institute
State the block-identified of the first block;
The block chain node apparatus determines block-identified corresponding first block of first block;
When present system time is in a first effective time section in each first effective time section, the block
Chain node apparatus determines that the corresponding first sub- public key in first effective time section is effective;
The block chain node apparatus is decrypted the digital signature using the effective first sub- public key, to export
State personal credit information.
9. a kind of block chain managing device, which is characterized in that including memory, processor, input equipment and output equipment, institute
State memory storage batch processing code, the processor calls the program code stored in the memory, for execute 1~
Any one of any one of 5 or 6~8 operations.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence, the computer program include program instruction, and described program instruction executes the processor such as
Any one of Claims 1 to 5 or 6~8 described in any item methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910787330.2A CN110535848B (en) | 2019-08-22 | 2019-08-22 | Information storage method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910787330.2A CN110535848B (en) | 2019-08-22 | 2019-08-22 | Information storage method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110535848A true CN110535848A (en) | 2019-12-03 |
CN110535848B CN110535848B (en) | 2022-07-26 |
Family
ID=68662761
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910787330.2A Active CN110535848B (en) | 2019-08-22 | 2019-08-22 | Information storage method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110535848B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160358165A1 (en) * | 2015-06-08 | 2016-12-08 | Blockstream Corporation | Cryptographically concealing amounts transacted on a ledger while preserving a network's ability to verify the transaction |
CN107769922A (en) * | 2017-10-31 | 2018-03-06 | 捷德(中国)信息科技有限公司 | Block chain safety management system and method |
CN108737430A (en) * | 2018-05-25 | 2018-11-02 | 全链通有限公司 | The encryption communication method and system of block chain node |
CN109274496A (en) * | 2018-08-01 | 2019-01-25 | 何世容 | A kind of electronic passenger ticket storage system and electronic passenger ticket storage method based on block chain |
CN109543456A (en) * | 2018-11-06 | 2019-03-29 | 北京新唐思创教育科技有限公司 | Block generation method and computer storage medium |
CN109962777A (en) * | 2017-12-26 | 2019-07-02 | 航天信息股份有限公司 | The key in block catenary system is permitted to generate, obtain the method and apparatus of key |
-
2019
- 2019-08-22 CN CN201910787330.2A patent/CN110535848B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160358165A1 (en) * | 2015-06-08 | 2016-12-08 | Blockstream Corporation | Cryptographically concealing amounts transacted on a ledger while preserving a network's ability to verify the transaction |
CN107769922A (en) * | 2017-10-31 | 2018-03-06 | 捷德(中国)信息科技有限公司 | Block chain safety management system and method |
CN109962777A (en) * | 2017-12-26 | 2019-07-02 | 航天信息股份有限公司 | The key in block catenary system is permitted to generate, obtain the method and apparatus of key |
CN108737430A (en) * | 2018-05-25 | 2018-11-02 | 全链通有限公司 | The encryption communication method and system of block chain node |
CN109274496A (en) * | 2018-08-01 | 2019-01-25 | 何世容 | A kind of electronic passenger ticket storage system and electronic passenger ticket storage method based on block chain |
CN109543456A (en) * | 2018-11-06 | 2019-03-29 | 北京新唐思创教育科技有限公司 | Block generation method and computer storage medium |
Non-Patent Citations (1)
Title |
---|
姚英英等: "基于区块链的去中心化身份认证及密钥管理方案", 《网络空间安全》 * |
Also Published As
Publication number | Publication date |
---|---|
CN110535848B (en) | 2022-07-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107911373B (en) | A kind of block chain right management method and system | |
CN108270571B (en) | Internet of Things identity authorization system and its method based on block chain | |
CN107222478B (en) | Software defined network control layer security mechanism construction method based on block chain | |
CN109040271B (en) | Network equipment integrity protection method under distributed environment | |
CN105308897B (en) | Method and apparatus for anonymity and authentic authentication in infiltration type social networking | |
CN112418860A (en) | Block chain efficient management framework based on cross-chain technology and working method | |
CN109255247A (en) | Secure calculation method and device, electronic equipment | |
CN110175840A (en) | Method, client, alliance's chain and the system of light wallet mechanism are realized in alliance's chain | |
CN104917807B (en) | Resource transfers methods, devices and systems | |
CN108881163A (en) | A kind of multicenter block catenary system with block issue mechanism | |
CN105610837B (en) | For identity authentication method and system between SCADA system main website and slave station | |
CN108510252A (en) | A kind of intelligent electric automobile power grid security payment system and method based on block chain | |
CN110120953A (en) | A kind of railway passenger identity authorization system towards smart phone client | |
CN110399735A (en) | Encryption data size relation method of proof, device, equipment and storage medium | |
CN108199845A (en) | A kind of light-weight authentication equipment and authentication method based on PUF | |
CN109409893A (en) | A kind of belief system and its construction method, equipment and storage medium | |
Huang et al. | DAPA: A decentralized, accountable, and privacy-preserving architecture for car sharing services | |
CN108696356A (en) | A kind of digital certificate delet method, apparatus and system based on block chain | |
CN112069550A (en) | Electronic contract deposit certificate system based on intelligent contract mode | |
CN109919614A (en) | A kind of method for protecting intelligent contract privacy using zero-knowledge proof in block chain | |
CN109858259A (en) | The data protection of community health service alliance and sharing method based on HyperLedger Fabric | |
CN110505227A (en) | Power telecom network access authentication method and device based on block chain | |
CN108900309A (en) | A kind of method for authenticating and right discriminating system | |
CN112035896B (en) | Electronic contract evidence-storing system based on transaction mode | |
CA3184856A1 (en) | Method, participatant unit, transaction register, and payment system for managing transaction data sets |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |