CN111680013A - Data sharing method based on block chain, electronic equipment and device - Google Patents

Data sharing method based on block chain, electronic equipment and device Download PDF

Info

Publication number
CN111680013A
CN111680013A CN201910181157.1A CN201910181157A CN111680013A CN 111680013 A CN111680013 A CN 111680013A CN 201910181157 A CN201910181157 A CN 201910181157A CN 111680013 A CN111680013 A CN 111680013A
Authority
CN
China
Prior art keywords
data
verified
block
transaction
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910181157.1A
Other languages
Chinese (zh)
Inventor
蓝勇辉
夏利民
梁正平
戴友平
张祥
邹雄伟
王海峰
张海威
莫海涌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Shenzhentong E Commerce Co ltd
Original Assignee
Shenzhen Shenzhentong E Commerce Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Shenzhentong E Commerce Co ltd filed Critical Shenzhen Shenzhentong E Commerce Co ltd
Priority to CN201910181157.1A priority Critical patent/CN111680013A/en
Publication of CN111680013A publication Critical patent/CN111680013A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9024Graphs; Linked lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data sharing method based on a block chain, electronic equipment and a device, wherein the method comprises the following steps: the first block chain link point acquires transaction data added into a to-be-verified data pool together with a second block chain link point in a shared data chain, wherein the transaction data comprises a data abstract and encrypted core data; the first block link point verifies the data to be verified in the data pool to be verified; the first block link point generates the data to be verified which is verified successfully into the block to be added into the verified data block chain. By means of the method, authenticity and usability of shared data can be guaranteed, and safety of the data is guaranteed.

Description

Data sharing method based on block chain, electronic equipment and device
Technical Field
The present application relates to the field of data sharing technologies, and in particular, to a data sharing method, an electronic device, and an apparatus based on a block chain.
Background
With the rapid development of informatization, the internet and the mobile internet, a large number of users complete social contact, games and various transactions through the internet, so that massive data are accumulated, China rapidly enters a big data era, and the data become a high-value digital asset.
Data sharing is to enable users who use different computers and different software in different places to read data of others and perform various operations, operations and analyses. The data sharing is realized, more people can fully use the existing data resources, the repeated labor and corresponding cost of data collection, data acquisition and the like are reduced, and the attention is focused on developing new application programs and system integration.
Disclosure of Invention
The technical problem mainly solved by the application is to provide a data sharing method, electronic equipment and device based on a block chain, which can ensure the authenticity and usability of shared data and ensure the safety of the data.
In order to solve the technical problem, the application adopts a technical scheme that: a data sharing method based on a block chain is provided, which comprises the following steps:
the first block chain link point acquires transaction data added into a to-be-verified data pool together with a second block chain link point in a shared data chain, wherein the transaction data comprises a data abstract and encrypted core data;
the first block link point verifies the data to be verified in the data pool to be verified;
the first block link point generates the data to be verified which is verified successfully into the block to be added into the verified data block chain.
In order to solve the above technical problem, another technical solution adopted by the present application is: an electronic device is provided that includes a processor and a communication circuit, the processor coupled to the communication circuit; the processor is used for obtaining transaction data added into the data pool to be verified by the link point of the second block located in the shared data chain through the communication circuit, wherein the transaction data comprises a data abstract and encrypted core data; the processor is used for verifying the data to be verified in the data pool to be verified; the processor is used for generating the data to be verified which is verified successfully into the block so as to be added into the verified data block chain.
In order to solve the above technical problem, another technical solution adopted by the present application is: there is provided an apparatus having a storage function that stores program data that can be executed to implement the above block chain-based data sharing method.
Compared with the prior art, the beneficial effects of this application are: according to the method and the device, the first block chain link point acquires the transaction data added into the to-be-verified data pool by the second block chain link point, the core data of the transaction data are encrypted, so that the core data cannot be seen by the first block chain link point and other nodes, the safety of the core data is guaranteed, the data privacy is protected, the first block chain link point can verify the to-be-verified data through the verification data abstract, the authenticity of the data can be effectively guaranteed, the problem that the transaction data lose the utilization value due to encryption of the transaction data is avoided, the first block chain link point generates the verified data into the block, all block chain link points in the verified data block chain can acquire the data for analysis, and the usability of the data is guaranteed.
Drawings
FIG. 1 is a schematic diagram of data sharing of a data sharing system based on block chains according to the present application;
FIG. 2 is a flowchart illustrating a first embodiment of a block chain-based data sharing method according to the present application;
FIG. 3 is a flowchart illustrating a second embodiment of a block chain-based data sharing method according to the present application;
FIG. 4 is a schematic diagram illustrating verification of a second embodiment of the block chain-based data sharing method according to the present application;
FIG. 5 is a flowchart illustrating a third embodiment of a block chain-based data sharing method according to the present application;
FIG. 6 is a block diagram schematically illustrating the structure of a first embodiment of the electronic device of the present application;
FIG. 7 is a block diagram schematically illustrating the structure of a second embodiment of the electronic device of the present application;
fig. 8 is a schematic block diagram of an embodiment of an apparatus with storage function according to the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The inventor of the application discovers through long-term research that when data sharing is achieved, the space for exerting the value of the data is very limited only by data of one organization, and the data of multiple organizations can be guaranteed only by performing related mining and verification on the data of the large data needing mass data and multi-dimensional data, so that the value of the data is improved. When a multi-organization shared data platform carries out data sharing, privacy of a user is easily revealed, but if the data is encrypted, the value of the data is lost and the authenticity of the shared data cannot be guaranteed, which is a difficult problem that the shared data platform is difficult to overcome all the time. In order to solve the above technical problem, the present application proposes the following embodiments.
Referring to fig. 1, the data sharing system based on the blockchain according to the present application includes a shared data chain and a verified data blockchain, where the shared data chain may be regarded as a data sharing federation, and data sharing and data verification using shared data between member nodes may be performed in the sharing federation. The member nodes of the shared data chain may share data with each other and verify the authenticity of the data with each other. At least one of the member nodes of the shared data chain is a member node in the verified data block chain, and the nodes of the shared data chain and the verified data chain may be the same. The shared data chain and the verified data blockchain node can add the data which is successfully verified (i.e. the data whose authenticity is verified) into the verified data blockchain, so that all the nodes in the verified data blockchain can obtain the data which is successfully verified, thereby realizing the further analysis of the data.
Referring to fig. 2, a first embodiment of a block chain-based data sharing method according to the present application includes the following steps:
step S101: the first block chain link point obtains transaction data added into a to-be-verified data pool together with a second block chain link point in the shared data chain, wherein the transaction data comprises a data summary and encrypted core data.
In this embodiment, the first blockchain node and the second blockchain node are both in the shared data chain and are member nodes in the shared data chain. Of course, the number of member nodes sharing the data chain may be greater than 2, such as 100.
In this embodiment, the second blockchain generates transaction data. Transaction data is data generated at the time of a transaction, such as data generated by actions of network payment, online hotel reservation, online car reservation, and the like. In some embodiments, all member nodes located in the shared data chain may generate transaction data. In other embodiments, only a portion of the member nodes may generate transaction data. The member nodes generating the transaction data respectively add the transaction data into the data pool to be verified, and can also obtain the data to be verified from the data pool to be verified.
After the second block link point adds the transaction data into the data pool to be verified, the transaction data also becomes a group of data to be verified in the data pool to be verified. And synchronously updating the transaction data by other member nodes in the shared data chain, so that the other member nodes in the shared data chain can acquire the group of data to be verified. In this embodiment, the to-be-verified data pools of the member nodes are synchronized with each other, or the to-be-verified data pools are shared by the member nodes of the shared data chain.
The transaction data includes a data digest and encrypted core data. The core data, for example, includes user information, transaction details, and the like, and is encrypted by an encryption algorithm, that is, the core data cannot be seen by other member nodes when being added to the data pool to be verified for sharing. The data summary is some non-private data such as transaction time, transaction address, etc., which can be used to mutually authenticate transaction data and can be seen by other member nodes when joining the data pool to be authenticated for sharing. Furthermore, the transaction data seen by the member nodes in the shared data chain are the same, namely the data abstract can be seen, the core data cannot be seen, the data security is ensured, and the data sharing value can be realized.
And the first block chain link point acquires the data to be verified in the data pool to be verified. In this embodiment, the first blockchain may periodically obtain the data to be verified in the data pool to be verified, or may obtain the data to be verified for verification when new transaction data is added to the data pool to be verified. The acquired data to be verified may include the transaction data that has just been added to the data pool to be verified, or may not include the transaction data that has just been added to the data pool to be verified. For example, after the second block link node adds the transaction data to the to-be-verified data pool, each member node located in the shared data chain can obtain the transaction data in the to-be-verified data pool by synchronously updating the to-be-verified data.
Step S102: and the first block link point verifies the data to be verified in the data pool to be verified.
The verification of the data to be verified may be to verify the added transaction data by using the existing data in the data pool to be verified, or to verify the existing data to be verified in the data pool to be verified by using the added transaction data as the data to be verified, or to simultaneously verify the transaction data and the existing data to be verified in the data pool to be verified. The embodiment can perform mutual authentication by using the data to be authenticated, that is, by using the correlation existing between the data to be authenticated, the multiple groups of data to be authenticated mutually authenticate each other. For example, a first block link point verifies its own transaction data (which has also been synchronized to the data pool to be verified) by using the transaction data added to the data pool to be verified by a second block link point.
In this embodiment, for example, when a member node in the shared data chain obtains new transaction data, the transaction data is added into the to-be-verified data pool, and the transaction data and other existing to-be-verified data in the to-be-verified data pool (for example, the transaction data is logistics information, and the existing to-be-verified data is purchase records, payment information, travel information, and the like) can be verified mutually. The authenticity of the transaction data is verified, for example, by querying the pool of data to be verified for data to be verified that matches the transaction data, or the transaction data is used to verify other data to be verified.
Step S103: the first block link point generates the data to be verified which is verified successfully into the block to be added into the verified data block chain.
After the data to be verified in the data pool to be verified is successfully verified, the data to be verified is generated into the block to be added into the verified data block chain. In this embodiment, for example, the first block node verifies the transaction data with the to-be-verified data already in the to-be-verified data pool, the authenticity of the to-be-verified data already in the to-be-verified data pool is verified, that is, the verification is successful, and the first block node may generate the to-be-verified data already in the to-be-verified data pool into the block. In other embodiments, the first block node verifies the transaction data and the to-be-verified data already in the to-be-verified data pool, and since mutual verification is performed, the authenticity of the transaction data and the to-be-verified data already in the to-be-verified data pool are both verified, so that the first block node can generate both the transaction data and the to-be-verified data already in the to-be-verified data pool into a block. The data to be verified, which is already located in the data pool to be verified, may be generated by the first block chain node, or may be generated by other block chain nodes. In other embodiments, the first blockchain may only generate transaction data into the blocks that are verified successfully.
The data added into the verified data block chain is shared and synchronous for all block chain nodes in the verified data block chain, that is, all block chain nodes in the verified data block chain can obtain the data generated into the block after the verification is successful, so that the data sharing and further utilization of the verified authenticity can be realized. In this embodiment, the core data added to the data of the verified data blockchain is also encrypted. All blockchain nodes in the verified data blockchain can obtain the encrypted core data and the encrypted data abstract, but specific information of the core data in the verified data blockchain cannot be known, so that the utilization value of the data is guaranteed, and privacy disclosure is avoided.
In this embodiment, the first block link node and the second block link node are both member nodes in the shared data chain, and the first block link node is also a block link node in the verified data block chain. The second chunk link point may or may not be a chunk link point in the verified data pool. The shared data chain may include a plurality of member nodes, where the first block link point may be a plurality of and the second block link point may be a plurality of. If there are a plurality of second blockchain nodes, the plurality of second blockchain nodes may be part or all of the second blockchain nodes in the verified data pool, or all of the second blockchain nodes are not in the verified data blockchain.
The block comprises a block head and a block body, the block body stores detailed data of the block, and the block head stores structured data, such as a hash value of a parent block, a hash value and a time stamp of the block. In this embodiment, by adding the data digests of all the transaction data of the block to the block header, when performing big data analysis, the block containing the target data can be quickly located by retrieving the data digests in the block header. For example, the data summary of a certain transaction data includes a transaction time and a transaction address, and the transaction time and the transaction address are recorded in the block header, so that the node located in the verified data block chain can be located in the block where the transaction data is located by retrieving the time period where the transaction time is located and/or the area range where the transaction address is located, and thus the transaction data is acquired to perform data analysis and other operations.
In the embodiment, the first block chain node acquires the transaction data added by the second block chain node into the to-be-verified data pool, because the core data of the transaction data is encrypted, the first block chain node and other nodes cannot see the core data, the security of the core data is ensured, the data privacy is protected, the first block chain node can verify the to-be-verified data through the verification data abstract, so that the authenticity of the data can be effectively ensured, the problem that the transaction data loses the utilization value due to encryption of the transaction data is avoided, the first block chain node generates the verified data into the block, all block chain nodes in the verified data block chain can acquire the data for analysis, and the usability of the data is ensured.
In the above-described embodiment, the sequence of steps S101 to S103 is the description sequence in the present embodiment, and is not limited to the sequence of the method in the execution process of the present embodiment. Some steps may be permuted on the premise that the present solution can be implemented.
Referring to fig. 3, the second embodiment of the block chain based data sharing method is based on the first embodiment of the block chain based data sharing method, and therefore, the steps of this embodiment that are the same as those of the first embodiment are not described again, and reference may be made to the description in the first embodiment. The embodiment comprises the following steps:
step S201: and acquiring the transaction data by the second block link node, and encrypting the core data in the transaction data to generate a ciphertext.
In this embodiment, the second block link point encrypts the core data, thereby forming a ciphertext. For example, ciphertext is used for display, while core data is hidden and cannot be obtained by other member nodes in the shared data chain.
In some embodiments, the core data includes user information and transaction details. When the core data is encrypted, the user information and the transaction details may be encrypted separately.
Optionally, the user information is encrypted in a first encryption manner, and the transaction details are encrypted in a second encryption manner. The user information is, for example, name, contact telephone, age, gender, mail, etc., the first encryption mode is, for example, one-way encryption hash algorithm, and the user information is encrypted by the one-way encryption hash algorithm to form a ciphertext. In this embodiment, different user information is encrypted to form different ciphertexts, and the same user information is encrypted to form the same ciphertexts. Therefore, the ciphertext can be used for positioning corresponding user information, and can be further used for distinguishing other user information. And the data correlation among the same ciphertexts is utilized, namely, the data of the same user is correlated, so that the data to be verified is verified. In the embodiment, the core data is encrypted, so that the privacy of the user can be protected, and different data of the same user can be correlated by generating the ciphertext, so that the correlated data can be used for data verification and analysis.
The transaction details refer to detailed transaction information such as consumption type, consumption amount, number of people, merchant grade, merchant characteristics, and the like. In some embodiments, the transaction details do not include merchant information, such as the name of the merchant, the address and phone of the merchant, etc., and some detailed data, such as the type of consumption, amount of consumption, number of consumers, etc., described above, is provided to analyze user preferences and characteristics without revealing the merchant information. Such data is encrypted for all other member nodes in the shared data chain. In some embodiments, the second encryption scheme employed for the transaction details is, for example, a derivative subkey scheme. For example, the transaction details in each transaction datum may be individually encrypted to generate separate subkeys. The subkey typically decrypts only the transaction data that matches the subkey. By generating an independent sub-key for each piece of transaction data, the independence between each piece of transaction data can be ensured, and the safety of the data is enhanced.
In addition, the transaction data also includes a data summary, which is some non-private data such as transaction time, transaction address, etc., which can be used for retrieval and verification. In this embodiment, the data digests are disclosed in plain text in the shared data chain. In some embodiments, the data digest may also be encrypted, and a key corresponding to the encrypted data digest is disclosed to all member nodes in the shared data chain so as to be acquired by other member nodes for data verification, so that malicious acquisition of the data digest by nodes other than the shared data chain can be avoided, the security and the imperceptibility of data are ensured to a certain extent, and data leakage is avoided.
Step S202: and adding the transaction data into a to-be-verified data pool by the second block link point.
Step S203: and the first block chain node extracts the data to be verified matched with the ciphertext from the data pool to be verified to perform correlation verification.
Optionally, the data digests of the data to be verified, which are matched with the ciphertext, are approximately matched to perform association verification. In some embodiments, if the data digest is encrypted, the first blockchain node may also use the shared key to obtain the encrypted data digest in the transaction data.
Specifically, the first block chain node retrieves the ciphertext from the data pool to be verified to obtain the data to be verified, that is, retrieves the ciphertext formed by encrypting the user information, and extracts the data to be verified matched with the ciphertext from the data pool to be verified. And performing correlation verification on the acquired data to be verified.
In some embodiments, for example, a method of approximately matching a data digest of the data to be verified that matches the ciphertext is employed. For example, the data summary includes transaction time and transaction address, approximate matches such as whether the matching transaction times are close, whether the transaction addresses are close, and the like. Specifically, an approximate threshold range may be set, and the data digests of the data to be verified are subjected to calculation processing, and the difference between any two sets of data digests is within the approximate threshold range, so that the verified data to be verified is successfully verified.
Referring to fig. 4, the schematic diagram of performing association verification on data to be verified in the present embodiment. For example, a user A reserves a restaurant on the network, the data summary of the transaction data is, for example, the scheduled time and the merchant address, the user takes a special car to the vicinity of the restaurant through a car-taking software, the data summary of the transaction data is, for example, the car-taking time and the destination, payment fee payment in the restaurant in an online payment mode also generates transaction data, the data summary is, for example, the payment time and the merchant address of payment, and the three transaction data are mutually confirmed to be authentic through approximate matching of the time and the place among the three transaction data. Through the accumulation of data, more associated data are used for mutual verification among the data to be verified, so that the accuracy of the approximate matching method is improved.
Step S204: the first block link point generates the data to be verified which is verified successfully into the block to be added into the verified data block chain.
After the data to be verified in the data pool to be verified is successfully verified, a new block is generated and added into the verified data block chain, so that other data mining applications can analyze the block and provide the analysis result for an organization in need. In this embodiment, all the core data added to the to-be-verified data in the verified data block chain is encrypted by the encryption algorithm. Therefore, the data to be verified which is successfully verified is public, that is, all blockchain nodes in the blockchain of the verified data can obtain the data to be verified which is successfully verified, but the core data of the data which is successfully verified is encrypted and specific transaction details and user information cannot be disclosed, so that privacy disclosure is avoided.
In this embodiment, each block link point in the shared data chain may randomly extract data to be verified from the data pool to be verified at intervals to perform verification, and generate the data to be verified that is successfully verified into a block to construct a verified data block chain. Therefore, multiple transaction data of the same user may be distributed in multiple blocks. When the big data analysis is performed subsequently, multiple transactions of the same user need to be found for association analysis, so that the transaction data of a certain user needs to be found in each block. However, as the amount of shared data increases dramatically, the number of blocks grows rapidly, and the amount of computation required to find transaction data for a particular user also increases dramatically.
In this embodiment, by adding the ciphertext corresponding to all the user information of the block to the block header, when performing big data analysis, the corresponding user information can be located through the ciphertext. In some embodiments, in order to deal with the rapid increase of the calculation amount caused by the increase of data, a hash binary tree (Merkle number) is used for recording all the user information and the transaction time contained in the block, so that the increase of the search path is logarithmic increase of the transaction number, the increase speed is much slower, and the query efficiency of the transaction data can be greatly improved.
Step S205: the first block link node receives a sub-key for accessing the transaction details, wherein the sub-key is sent by the second block link node when the data interest value of the first block link node is judged to be larger than a preset value.
The data interest value is, for example, a data amount of the transaction data sent by the first blockchain node to the to-be-verified data pool, or a ratio of a data amount of the transaction data successfully verified in the transaction data sent by the first blockchain node to a data amount of the transaction data sent by the first blockchain node. The data interest value is used to characterize the size or value of the contribution of the first block link point to the amount of data in the shared data chain. In this embodiment, the shared data chain may set a preset value so as to match the data interest value of each member node, and further determine the contribution.
As described above, since the transaction details are encrypted by deriving the subkey, the subkey must be obtained if the transaction details are to be accessed. In this embodiment, the first blockchain link point may decrypt the transaction details by receiving the subkey sent by the second blockchain node, so as to obtain the transaction details corresponding to the subkey. In some embodiments, the second blockchain node further determines a data interest value of the first blockchain node, and when the second blockchain node determines that the data interest value is greater than a predetermined value, the second blockchain node sends the sub-key to the first blockchain node. In some embodiments, the first blockchain also sends a get request to the second blockchain node to request the acquisition of the subkey for accessing transaction details. Specifically, the second blockchain node further determines whether the data interest value is greater than a preset value, and if so, gives a sub-key for accessing transaction details.
In the above-described embodiment, the sequence of steps S201 to S205 is the description sequence in the present embodiment, and is not limited to the sequence of the method in the execution process of the present embodiment. Some steps may be permuted on the premise that the present solution can be implemented.
Referring to fig. 5, the third embodiment of the block chain based data sharing method is based on the first embodiment of the block chain based data sharing method, and therefore, the steps of this embodiment that are the same as those of the first embodiment are not described again, and reference may be made to the description in the first embodiment. The embodiment comprises the following steps:
step S301: the first block chain link point obtains transaction data added into a to-be-verified data pool together with a second block chain link point in the shared data chain, wherein the transaction data comprises a data summary and encrypted core data.
Step S302: and the first block link point verifies the data to be verified in the data pool to be verified.
Step S303: the first block link point generates the data to be verified which is verified successfully into the block to be added into the verified data block chain.
Step S304: and the first block link point judges whether the data to be verified which is not successfully verified within the preset time range exists in the data pool to be verified.
All member nodes in the shared data chain can add new data into the data pool to be verified. With the continuous addition of new data, the data to be verified is stored more and more in the data pool to be verified, which may cause an increase in the calculation amount of the first blockchain node to search for other data associated with certain transaction data when the transaction data is verified.
Therefore, a preset time range can be set to judge the data to be verified in the data pool to be verified. For example, the preset time is set to 24 hours, and when it is determined that some to-be-verified data in the to-be-verified data pool exists for more than 24 hours, the to-be-verified data still has not been verified or has failed to be verified, for example, the to-be-verified data in the to-be-verified data pool exceeds 24 hours. That is, if there is no other data to be verified associated with the data pool to be verified, or there is data to be verified that is contrary to the data to be verified, it can be preliminarily determined that the data to be verified is not real or has no use value.
This step may be performed in the implementation of all the steps described above in this embodiment. For example, the member nodes in the shared data chain monitor the data to be verified in the data pool to be verified in real time, or the member nodes check the data to be verified in the data pool to be verified at intervals, or each member node is responsible for checking the data to be verified in the data pool to be verified within a period of time. In addition, after the step of generating the successfully verified data into the block is executed, the data to be verified in the data pool to be verified can be judged.
Step S305: and if so, deleting the data to be verified which is not successfully verified by the first block link point.
In this embodiment, data in the to-be-verified data pool that is not successfully verified within the preset time range is also cleared. For example, if a certain block link point checks that data to be verified which is not successfully verified and exceeds a preset time range exists in the data pool to be verified, the data to be verified is deleted, and other member nodes in the shared data chain can delete the data to be verified which is not successfully verified by synchronously updating the data pool to be verified. By setting the clearing mechanism, some useless data in the data pool to be verified can be cleared, the storage capacity of the data pool to be verified is saved, the calculation amount of the member nodes in the process of verifying the data to be verified can be reduced, and the calculation efficiency is improved.
In the above-described embodiment, the sequence of steps S301 to S305 is the description sequence in the present embodiment, and is not limited to the sequence of the method in the execution process of the present embodiment. Some steps may be permuted on the premise that the present solution can be implemented. In some embodiments, steps S304 and S305 may be performed throughout the implementation of the method.
This embodiment may be combined with the first and second embodiments of the block chain-based data sharing method of the present application.
Referring to fig. 6, the electronic device according to the first embodiment of the present application includes an obtaining module 401, a verifying module 402, and a generating module 403.
The obtaining module 401 is configured to obtain transaction data added to the to-be-verified data pool at the block link point in the shared data chain, where the transaction data includes a data digest and encrypted core data. The verification module 402 is configured to verify data to be verified in the data pool to be verified. The generating module 403 is configured to generate the to-be-verified data that is successfully verified into the block to be added to the verified data block chain.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the embodiment.
In addition, each functional module in this embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
In this embodiment, for more functions of each function module of the server, reference may be made to the descriptions of the first to third embodiments of the block chain-based data sharing method in this application, and no further description is given here.
Referring to fig. 7, the electronic device according to the second embodiment of the present application includes a processor 501 and a communication circuit 502, wherein the processor 501 is coupled to the communication circuit 502.
The processor 501 is configured to obtain, through the communication circuit 502, transaction data added to the to-be-verified data pool at a link point of a second block in the shared data chain, where the transaction data includes a data digest and encrypted core data; the processor 501 is configured to verify data to be verified in the data pool to be verified; the processor 501 is configured to generate the data to be verified that is successfully verified into a block to be added to the verified data block chain.
In this embodiment, the processor 501 may also be referred to as a CPU (Central Processing Unit). The processor 501 may be an integrated circuit chip having signal processing capabilities. The processor 501 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor 501 may be any conventional processor or the like.
For further execution processes of the electronic device processor 501 in this embodiment, reference may be made to the first to third embodiments of the block chain-based data sharing method in this application, which are not described herein again.
Referring to fig. 8, the embodiment of the apparatus with storage function of the present application stores program data that can be executed to implement the steps of the first to third embodiments of the above-mentioned data sharing method based on blockchains. Please specifically refer to the first to third embodiments of the block chain-based data sharing method of the present application, which are not described herein again.
The device 601 with storage function may be: one of various media capable of storing program data, such as a usb disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the purpose of illustrating embodiments of the present application and is not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application or are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. A method for sharing data based on block chains is characterized by comprising the following steps:
the method comprises the steps that a first block chain link point obtains transaction data added into a to-be-verified data pool together with a second block chain link point in a shared data chain, wherein the transaction data comprises a data summary and encrypted core data;
the first block chain link point verifies the data to be verified in the data pool to be verified;
the first block link point generates the to-be-verified data which is verified successfully into a block to be added into a verified data block chain.
2. The data sharing method according to claim 1, wherein the step of verifying the data to be verified in the data to be verified pool by the first block link point comprises:
and extracting data to be verified matched with a ciphertext from the data pool to be verified to perform correlation verification, wherein the ciphertext is generated after the core data is encrypted.
3. The data sharing method according to claim 2, wherein the step of extracting the data to be verified matching the ciphertext from the data pool to be verified for associated verification comprises:
and carrying out approximate matching on the data abstract of the data to be verified matched with the ciphertext to carry out correlation verification.
4. The data sharing method according to any one of claims 2 or 3, wherein the core data includes user information and transaction details, wherein the user information is encrypted in a first encryption manner, and the transaction details are encrypted in a second encryption manner, and wherein the ciphertext is generated by encrypting the user information in the first encryption manner.
5. The data sharing method according to claim 4, wherein the first encryption scheme is a one-way cryptographic hash algorithm and the second encryption scheme is a derived subkey scheme.
6. The data sharing method of claim 5, wherein the method further comprises:
and the first block chain node receives a sub-key for accessing the transaction details, wherein the sub-key is sent by the second block chain node when the data right value of the first block chain node is judged to be larger than a preset value.
7. The data sharing method of claim 4, wherein the block comprises a block header, and the block header contains the ciphertext corresponding to all the user information of the block, so that the corresponding user information can be located through the ciphertext contained in the block header.
8. The data sharing method according to claim 1, wherein the method further comprises:
the first block chain node judges whether the data to be verified which is not successfully verified within a preset time range exists in the data pool to be verified;
and if so, deleting the data to be verified which is not successfully verified by the first block link point.
9. An electronic device comprising a processor and communication circuitry, the processor coupled to the communication circuitry;
the processor is used for obtaining transaction data added into a to-be-verified data pool by a second block link point located in a shared data chain through the communication circuit, wherein the transaction data comprises a data summary and encrypted core data;
the processor is used for verifying the data to be verified in the data pool to be verified;
the processor is used for generating the data to be verified which is verified successfully into a block to be added into a verified data block chain.
10. An apparatus having a storage function, characterized in that program data are stored, which can be executed to implement the method of any one of claims 1 to 8.
CN201910181157.1A 2019-03-11 2019-03-11 Data sharing method based on block chain, electronic equipment and device Pending CN111680013A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910181157.1A CN111680013A (en) 2019-03-11 2019-03-11 Data sharing method based on block chain, electronic equipment and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910181157.1A CN111680013A (en) 2019-03-11 2019-03-11 Data sharing method based on block chain, electronic equipment and device

Publications (1)

Publication Number Publication Date
CN111680013A true CN111680013A (en) 2020-09-18

Family

ID=72451263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910181157.1A Pending CN111680013A (en) 2019-03-11 2019-03-11 Data sharing method based on block chain, electronic equipment and device

Country Status (1)

Country Link
CN (1) CN111680013A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199649A (en) * 2020-09-28 2021-01-08 扬州大学 Anonymous identity verification method under moving edge calculation based on block chain
CN112333247A (en) * 2020-10-26 2021-02-05 成都商通时代数字科技有限公司 Method and system for sharing private data of block chain system
CN116401718A (en) * 2023-06-08 2023-07-07 科大讯飞股份有限公司 Block chain-based data protection method and device, electronic equipment and storage medium
CN117353893A (en) * 2023-10-12 2024-01-05 扬州宝科信息技术咨询有限公司 Network information security verification method and system based on blockchain technology

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682530A (en) * 2017-01-10 2017-05-17 杭州电子科技大学 Method and device for medical information sharing privacy protection based on blockchain technology
CN106778343A (en) * 2016-12-12 2017-05-31 武汉优聘科技有限公司 It is a kind of that the data sharing method of private data is related to based on block chain
CN108737422A (en) * 2018-05-23 2018-11-02 栾友祥 A kind of network security mobile-payment system based on block chain
CN108881262A (en) * 2018-07-02 2018-11-23 北京市天元网络技术股份有限公司 Restoring files methods, devices and systems based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778343A (en) * 2016-12-12 2017-05-31 武汉优聘科技有限公司 It is a kind of that the data sharing method of private data is related to based on block chain
CN106682530A (en) * 2017-01-10 2017-05-17 杭州电子科技大学 Method and device for medical information sharing privacy protection based on blockchain technology
CN108737422A (en) * 2018-05-23 2018-11-02 栾友祥 A kind of network security mobile-payment system based on block chain
CN108881262A (en) * 2018-07-02 2018-11-23 北京市天元网络技术股份有限公司 Restoring files methods, devices and systems based on block chain

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199649A (en) * 2020-09-28 2021-01-08 扬州大学 Anonymous identity verification method under moving edge calculation based on block chain
CN112199649B (en) * 2020-09-28 2021-06-18 扬州大学 Anonymous identity verification method under moving edge calculation based on block chain
CN112333247A (en) * 2020-10-26 2021-02-05 成都商通时代数字科技有限公司 Method and system for sharing private data of block chain system
CN116401718A (en) * 2023-06-08 2023-07-07 科大讯飞股份有限公司 Block chain-based data protection method and device, electronic equipment and storage medium
CN117353893A (en) * 2023-10-12 2024-01-05 扬州宝科信息技术咨询有限公司 Network information security verification method and system based on blockchain technology
CN117353893B (en) * 2023-10-12 2024-04-26 扬州宝科信息技术咨询有限公司 Network information security verification method and system based on blockchain technology

Similar Documents

Publication Publication Date Title
CN111680013A (en) Data sharing method based on block chain, electronic equipment and device
JP2022509105A (en) Systems and methods implemented by computers that enable access to data stored on the blockchain
CN109729041B (en) Method and device for issuing and acquiring encrypted content
CN116432247A (en) Infringement evidence method and device based on blockchain
CN111209591B (en) Storage structure sorted according to time and quick query method
CN111476573B (en) Account data processing method, device, equipment and storage medium
CN111460400B (en) Data processing method, device and computer readable storage medium
CN107040520B (en) Cloud computing data sharing system and method
CN107196840B (en) Data processing method, device and equipment
FR3006082A1 (en) METHOD FOR IMPLEMENTING A RIGHT TO CONTENT
EP3803670A1 (en) A software application and a computer server for authenticating the identity of a digital content creator and the integrity of the creator's published content
CN111339201B (en) Evaluation method and system based on block chain
CN109492424A (en) Data assets management method, data assets managing device and computer-readable medium
CN112131564A (en) Encrypted data communication method, apparatus, device, and medium
CN112784302A (en) File processing method and device, electronic equipment and readable storage medium
WO2023087760A1 (en) Data sharing method and apparatus, device, and storage medium
CN114629713B (en) Identity verification method, device and system
CN113726515B (en) UKEY-based key processing method, storage medium and electronic device
CN111199486A (en) Data processing method and device based on block chain network and storage medium
CN115514470B (en) Storage method and system for community correction data security
US8755521B2 (en) Security method and system for media playback devices
KR102357595B1 (en) Blockchain-based authentication system and method for preventing interception hacking attacks
CN115811412A (en) Communication method and device, SIM card, electronic equipment and terminal equipment
CN110830252B (en) Data encryption method, device, equipment and storage medium
CN113468549A (en) Retrieval method and system for encrypted information evidence based on block chain and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20240507