CN113806793A - Hospital advice and data inheritance method and system based on block chain distributed storage system - Google Patents

Hospital advice and data inheritance method and system based on block chain distributed storage system Download PDF

Info

Publication number
CN113806793A
CN113806793A CN202110069970.7A CN202110069970A CN113806793A CN 113806793 A CN113806793 A CN 113806793A CN 202110069970 A CN202110069970 A CN 202110069970A CN 113806793 A CN113806793 A CN 113806793A
Authority
CN
China
Prior art keywords
data
inheritor
user
acquiring
encrypted data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110069970.7A
Other languages
Chinese (zh)
Inventor
黄国良
张翼
刘炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Kulian Technology Co ltd
Original Assignee
Shenzhen Kulian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Kulian Technology Co ltd filed Critical Shenzhen Kulian Technology Co ltd
Priority to CN202110069970.7A priority Critical patent/CN113806793A/en
Publication of CN113806793A publication Critical patent/CN113806793A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Automation & Control Theory (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for passing a testimony and data based on a block chain distributed storage system, which comprises the following steps: acquiring user registration information, creating a key pair and a user address for a user, and binding a user identity in the user registration information with the user address, wherein the user comprises a data inheritor and a inheritor; acquiring the legacy data of the data inheritor, encrypting the legacy data to generate encrypted data, and uploading the encrypted data to an intelligent contract on the block chain distributed storage system; acquiring a trigger condition of the intelligent contract, and sending the encrypted data to the transferee according to the trigger condition; and acquiring and decrypting the encrypted data by adopting a private key in a secret key pair of the inheritor to obtain the legacy data of the testimony, and completing data inheritance. The method can promote the testimony storage of the testimony advice more safely, effectively and at low cost, and ensure the authenticity of the testimony advice data.

Description

Hospital advice and data inheritance method and system based on block chain distributed storage system
Technical Field
The invention relates to the technical field of data security, in particular to a method and a system for passing a testimony and data based on a block chain distributed storage system.
Background
The reason why the mysterious events happen is that the deceased does not detail his own property allocation in the future at the time of birth. Since the law-seeking affairs office of the society deals with the heritage at present involves certain cost and time, many people do not want to spend the money, and the parties in the interests of the heritage are finally in the book hall due to the respective interests, and spend a lot of money for the heritage. Such behaviors are completely not conducive to economic development of society and result in a waste of legal resources.
Even if the departed person finds out the testimonial advice which is dealt with by the law firm, the situation that two different law firms claim that the testimonial advice of the departed person is held by the law firm but the content is greatly different can be avoided, so that the social prosperity of the luxurious offspring and the billions of the deceased can be avoided. The law firm manages files, and for the person who sets up the testimonial advice, the law firm cannot prevent whether the lawyer executes the testimonial advice after setting up the testimonial advice or whether the original intention is changed by modifying the testimonial advice.
The standing will not be conscious of the young people in east and west, and in case of unfortunate accidents, the family may not know the property information of the deceased. Especially in globalization today, many people store assets in different countries or buy financing products in different areas, and once the departed has not been handed over with the data, the property will not be appreciated finally, and the value of the asset is lost. In addition, properties such as digital assets and the like are stored in the cloud through various account passwords, and even if a successor knows the storage place of the assets, the successor cannot know the private key, namely, the properties become a string of numbers which can not be seen. The implication of key security is not resolved if the password inheritance is handled through conventional lawyer files or hard disk storage.
Therefore, a system for decentralized distributed, secure and confidential legacy data inheritance is lacking in society.
Disclosure of Invention
In order to overcome the above problems or at least partially solve the above problems, embodiments of the present invention provide a method and a system for legacy and data inheritance based on a block chain distributed storage system, which can enable a legacy system to perform evidence storage more safely, effectively, and at a low cost, and ensure authenticity of legacy data.
The embodiment of the invention is realized by the following steps:
in a first aspect, an embodiment of the present invention provides a method for inheriting a legacy instruction and data based on a block chain distributed storage system, including the following steps:
acquiring user registration information, creating a key pair and a user address for a user, and binding a user identity in the user registration information with the user address, wherein the user comprises a data inheritor and a inheritor;
acquiring the legacy data of the data inheritor, encrypting the legacy data to generate encrypted data, and uploading the encrypted data to an intelligent contract on the block chain distributed storage system;
acquiring a trigger condition of the intelligent contract, and sending the encrypted data to the transferee according to the trigger condition;
and acquiring and decrypting the encrypted data by adopting a private key in a secret key pair of the inheritor to obtain the legacy data of the testimony, and completing data inheritance.
When each user needs to inherit the testament data, firstly, registration is needed, and after the registration information of the user is obtained, a key pair and an address are created for the user. Before the key is stored, the system prompts the user to input a string of random characters (a total of 12 English mnemonics) as a password, and a private key is encrypted by combining a symmetric encryption algorithm AES. The mnemonic words are automatically generated in 2048 independent English words according to a one-time random algorithm by de-rearrangement combination. The encrypted private key is stored in a local front-end application program of the user, the user is reminded that the user cannot retrieve own account and content once the debit word is lost, the user identity is bound with the user address, so that the corresponding user can be directly found according to the user address in the following process, and each user has a unique user address. The user comprises two identities, namely a data inheritor and a inheritor. After a key pair and an address are created for a user, acquiring the legacy data of a data bearer, encrypting the legacy data, generating encrypted data and uploading the encrypted data to an intelligent contract on a block chain distributed storage system; the digital asset mnemonics and the structured data to be carried by the user are cached in the local client and the unstructured data are uploaded to the distributed storage/IPFS system, the CID parameter returned from the system is cached in the local client, and the target data can be directly inquired through the CID parameter. After the data are uploaded to the intelligent contract, the contract conditions are waited to be triggered, then the contract conditions are opened and read by the inheritor, the inheritor reads the files, then the encrypted data are decrypted by using the private key of the individual, then the read target legacy data of the legacy advice is checked, and the data inheritance is completed.
The method solves the verification of the testimony by a scientific and technological means based on a block chain distributed storage technology, does not need to rely on a third party organization or professional personnel to take witnesses for the testimony of the testimony, can be used for storing assets and debit words in a multimedia mode by an individual due to the fact that the verification does not need complex administrative processes and high professional personnel cost, and reduces the risk of storage, loss and tampering of the word data. The testimony can be stored more safely, effectively and with low cost, and once the real situation is certified by the technology in the future verification link, the authenticity of the testimony is not required to be determined by a handwriting expert and the like.
Based on the first aspect, in some embodiments of the present invention, the method for encrypting the legacy data, generating encrypted data, and uploading the encrypted data to the intelligent contract on the blockchain distributed storage system includes the following steps:
and acquiring and encrypting the legacy data by adopting a public key in a secret key pair of the legacy person, generating encrypted data and uploading the encrypted data to an intelligent contract on the block chain distributed storage system.
Based on the first aspect, in some embodiments of the present invention, the method for encrypting the legacy data, generating encrypted data, and uploading the encrypted data to the intelligent contract on the blockchain distributed storage system includes the following steps:
acquiring and encrypting the legacy data of the testimony by using a secret key of a data inheritor to generate encrypted data;
acquiring and encrypting the key pair of the data inheritor by adopting a public key in the key pair of the inheritor to obtain an encrypted key;
and uploading the encrypted data and the encrypted key to an intelligent contract on the blockchain distributed storage system.
Based on the first aspect, in some embodiments of the present invention, the method for acquiring the trigger condition of the intelligent contract and sending the encrypted data to the transferee according to the trigger condition includes the following steps:
the method comprises the steps of acquiring timing trigger time data of a data transferor, triggering an intelligent contract through a timer according to the timing trigger time data, opening the reading permission of encrypted data, and sending the encrypted data to the transferee.
Based on the first aspect, in some embodiments of the present invention, the method for obtaining the trigger condition of the intelligent contract and sending the encrypted data to the transferee according to the trigger condition further includes the following steps:
acquiring an address of a designated executor of a data inheritor or a public key in a key pair;
the method comprises the steps of obtaining signature information of a designated executor for carrying out digital signature on an intelligent contract, triggering the intelligent contract, opening the reading authority of encrypted data, and sending the encrypted data to a transferee.
In a second aspect, an embodiment of the present invention provides a legacy order and data inheritance system based on a block chain distributed storage system, including an identity authentication module, a data encryption module, a contract triggering module, and a data decryption module, where:
the identity authentication module is used for acquiring user registration information, creating a key pair and a user address for a user, and binding the user identity in the user registration information with the user address, wherein the user comprises a data inheritor and a inheritor;
the data encryption module is used for acquiring the legacy data of the testimony of the data inheritor, encrypting the legacy data of the testimony, generating encrypted data and uploading the encrypted data to the intelligent contract on the block chain distributed storage system;
the contract triggering module is used for acquiring the triggering condition of the intelligent contract and sending the encrypted data to the transferee according to the triggering condition;
and the data decryption module is used for acquiring and decrypting the encrypted data by adopting a private key in the secret key pair of the inheritor so as to obtain the legacy data and complete data inheritance.
When each user needs to inherit the testimony data, firstly, registration is needed, and after the identity authentication module obtains the registration information of the user, a key pair and an address are created for the user. Before the key is stored, the system prompts the user to input a string of random characters (a total of 12 English mnemonics) as a password, and a private key is encrypted by combining a symmetric encryption algorithm AES. The mnemonic words are automatically generated in 2048 independent English words according to a one-time random algorithm by de-rearrangement combination. The encrypted private key is stored in a local front-end application program of the user, the user is reminded that the user cannot retrieve own account and content once the debit word is lost, the user identity is bound with the user address, so that the corresponding user can be directly found according to the user address in the following process, and each user has a unique user address. The user comprises two identities, namely a data inheritor and a inheritor. After a key pair and an address are created for a user, acquiring the legacy data of the data bearer through a data encryption module, encrypting the legacy data, generating encrypted data and uploading the encrypted data to an intelligent contract on a block chain distributed storage system; the digital asset mnemonics and the structured data to be carried by the user are cached in the local client and the unstructured data are uploaded to the distributed storage/IPFS system, the CID parameter returned from the system is cached in the local client, and the target data can be directly inquired through the CID parameter. After the data are uploaded to the intelligent contract, the contract conditions are waited for triggering, then after the contract triggering module obtains triggering condition information, the contract triggering module is opened and read by the inheritor, after the inheritor reads a file, the encrypted data are decrypted by using a private key of an individual through the data decryption module, then the read target legacy data are checked, and the data inheritance is completed.
The system solves the verification of the testimony by a scientific and technological means based on a block chain distributed storage technology, does not need to depend on a third-party organization or professional personnel to take witnesses for the testimony of the person, can be stored in a multimedia mode for the person because the verification does not need complex administrative processes and high professional personnel cost, easily stores assets and debit words in all aspects of the person, and reduces the risk of storage, loss and tampering of the word data. The testimony can be stored more safely, effectively and with low cost, and once the real situation is certified by the technology in the future verification link, the authenticity of the testimony is not required to be determined by a handwriting expert and the like.
Based on the second aspect, in some embodiments of the present invention, the data encryption module includes a first encryption sub-module, configured to acquire and encrypt the legacy data using a public key in a key pair of the legacy person, generate encrypted data, and upload the encrypted data to the intelligent contract on the blockchain distributed storage system.
Based on the second aspect, in some embodiments of the present invention, the data encryption module includes a second encryption sub-module, a key encryption sub-module, and a data upload sub-module, where:
the second encryption submodule is used for acquiring and encrypting the legacy data by adopting a key of a data bearer to generate encrypted data;
the key encryption submodule is used for acquiring and encrypting the key pair of the data inheritor by adopting a public key in the key pair of the inheritor so as to obtain an encrypted key;
and the data uploading sub-module is used for uploading the encrypted data and the encrypted key to an intelligent contract on the blockchain distributed storage system.
Based on the second aspect, in some embodiments of the present invention, the contract triggering module includes a timing triggering sub-module, configured to acquire timing triggering time data of the data inheritor, trigger the intelligent contract through a timer according to the timing triggering time data, open a reading right of the encrypted data, and send the encrypted data to the inheritor.
Based on the second aspect, in some embodiments of the present invention, the contract trigger module further includes a designated inheritance submodule and a trigger submodule, where:
the appointed inheritance sub-module is used for acquiring the address of an appointed executor of the data inheritance person or a public key in a key pair;
and the triggering submodule is used for acquiring the signature information of the specified executor for carrying out digital signature on the intelligent contract, triggering the intelligent contract, opening the reading authority of the encrypted data and sending the encrypted data to the transferee.
The embodiment of the invention at least has the following advantages or beneficial effects:
the embodiment of the invention provides a method and a system for passing a wisdom and data based on a block chain distributed storage system. After a key pair and an address are created for a user, digital asset mnemonics and structured data to be subjected to data inheritance by the user are cached in a local client side, unstructured data are uploaded to a distributed storage/IPFS system, CID parameters returned in the system are cached in the local client side, and target data can be directly inquired through the CID parameters. After the data are uploaded to the intelligent contract, the contract conditions are waited to be triggered, then the contract conditions are opened and read by the inheritor, the inheritor reads the files, then the encrypted data are decrypted by using the private key of the individual, then the read target legacy data of the legacy advice is checked, and the data inheritance is completed. The method solves the verification of the testimony by a scientific and technological means based on a block chain distributed storage technology, does not need to rely on a third party organization or professional personnel to take witnesses for the testimony of the testimony, can be used for storing assets and debit words in a multimedia mode by an individual due to the fact that the verification does not need complex administrative processes and high professional personnel cost, and reduces the risk of storage, loss and tampering of the word data. The testimony can be stored more safely, effectively and with low cost, and once the real situation is certified by the technology in the future verification link, the authenticity of the testimony is not required to be determined by a handwriting expert and the like.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 is a flow chart of a method for heritage support and data inheritance based on a block chain distributed storage system according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a method for inheriting a data file in a block chain distributed storage system according to an embodiment of the present invention;
fig. 3 is a schematic block diagram of an order and data inheritance system based on a block chain distributed storage system according to an embodiment of the present invention.
Icon: 100. an identity authentication module; 200. a data encryption module; 210. a first encryption sub-module; 220. a second encryption sub-module; 230. a key encryption submodule; 240. a data uploading sub-module; 300. a contract triggering module; 310. a timing trigger submodule; 320. appointing a inheritance submodule; 330. triggering a submodule; 400. and a data decryption module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the same element.
Examples
As shown in fig. 1, in a first aspect, an embodiment of the present invention provides a method for heritage and data inheritance based on a block chain distributed storage system, including the following steps:
s1, acquiring user registration information, creating a key pair and a user address for a user, and binding the user identity in the user registration information with the user address, wherein the user comprises a data inheritor and a inheritor;
s2, acquiring the legacy data of the data bearer, encrypting the legacy data, generating encrypted data and uploading the encrypted data to the intelligent contract on the block chain distributed storage system;
s3, acquiring a trigger condition of the intelligent contract, and sending the encrypted data to the transferee according to the trigger condition;
and S4, acquiring and decrypting the encrypted data by using a private key in the key pair of the inheritor to obtain the legacy data, and completing data inheritance.
When each user needs to inherit the testimonial data or other inheritance data, firstly, the user needs to register, and after the registration information of the user is obtained, a key pair and an address are created for the user. Before the key is stored, the system prompts the user to input a string of random characters (a total of 12 English mnemonics) as a password, and a private key is encrypted by combining a symmetric encryption algorithm AES. The mnemonic words are automatically generated in 2048 independent English words according to a one-time random algorithm by de-rearrangement combination. The encrypted private key is stored in a local front-end application program of the user, the user is reminded that the user cannot retrieve own account and content once the debit word is lost, the user identity is bound with the user address, so that the corresponding user can be directly found according to the user address in the following process, and each user has a unique user address. The user comprises two identities, namely a data inheritor and a inheritor. After a key pair and an address are created for a user, acquiring the legacy data of a data bearer, and encrypting the legacy data, wherein the legacy data comprises the legacy data and other data needing to be borne; generating encrypted data and uploading the encrypted data to an intelligent contract on a block chain distributed storage system; the digital asset mnemonics and the structured data to be carried by the user are cached in the local client and the unstructured data are uploaded to the distributed storage/IPFS system, the CID parameter returned from the system is cached in the local client, and the target data can be directly inquired through the CID parameter. After the data are uploaded to the intelligent contract, the contract conditions are waited to be triggered, then the contract conditions are opened and read by the inheritor, the inheritor reads the files, then the encrypted data are decrypted by using the private key of the individual, then the read target legacy data of the legacy advice is checked, and the data inheritance is completed.
The method solves the verification of the testimony by a scientific and technological means based on a block chain distributed storage technology, does not need to rely on a third party organization or professional personnel to take witnesses for the testimony of the testimony, can be used for storing assets and debit words in a multimedia mode by an individual due to the fact that the verification does not need complex administrative processes and high professional personnel cost, and reduces the risk of storage, loss and tampering of the word data. The testimony can be stored more safely, effectively and with low cost, and once the real situation is certified by the technology in the future verification link, the authenticity of the testimony is not required to be determined by a handwriting expert and the like.
Based on the first aspect, in some embodiments of the present invention, the method for encrypting the legacy data, generating encrypted data, and uploading the encrypted data to the intelligent contract on the blockchain distributed storage system includes the following steps:
and acquiring and encrypting the legacy data by adopting a public key in a secret key pair of the legacy person, generating encrypted data and uploading the encrypted data to an intelligent contract on the block chain distributed storage system.
The user can select two modes to upload the testimonial data to the block chain distributed storage system, and one mode is as follows: and encrypting the legacy data by adopting a public key in a secret key pair of the legacy person to generate encrypted data and uploading the encrypted data to an intelligent contract on the block chain distributed storage system. If the user A wants to transmit data to the user B, the user A needs to encrypt the quasi uplink data by using the public key of the user B to form an encrypted file (BF), the BF is stored in an intelligent contract waiting condition to be triggered, and the encrypted file is opened and read by the user B.
Based on the first aspect, in some embodiments of the present invention, the method for encrypting the legacy data, generating encrypted data, and uploading the encrypted data to the intelligent contract on the blockchain distributed storage system includes the following steps:
acquiring and encrypting the legacy data of the testimony by using a secret key of a data inheritor to generate encrypted data;
acquiring and encrypting the key pair of the data inheritor by adopting a public key in the key pair of the inheritor to obtain an encrypted key;
and uploading the encrypted data and the encrypted key to an intelligent contract on the blockchain distributed storage system.
The user can also select another mode to upload the testimonial data to the blockchain distributed storage system, and the mode is as follows: encrypting the legacy data by using the key pair of the data inheritor, and encrypting the key pair of the data inheritor by using the public key in the key pair of the inheritor to obtain an encrypted key; the encrypted data and the encrypted key are then uploaded into a smart contract on the blockchain distributed storage system. If the user A wants to transmit data to the user C, the user A firstly creates a symmetric encryption key (S), encrypts a file to be transmitted to the user C to form encrypted data (F), the user A directly uploads the F to an intelligent contract on a chain and simultaneously encrypts and uploads the F to the intelligent contract by using a public key of the user C as the S, the F and the S are stored in the intelligent contract and triggered by a waiting condition, and the user C is opened to read the F. And the data is doubly encrypted, so that the safety of the data is further ensured.
Based on the first aspect, in some embodiments of the present invention, the method for acquiring the trigger condition of the intelligent contract and sending the encrypted data to the transferee according to the trigger condition includes the following steps:
the method comprises the steps of acquiring timing trigger time data of a data transferor, triggering an intelligent contract through a timer according to the timing trigger time data, opening the reading permission of encrypted data, and sending the encrypted data to the transferee.
The first one is a timer, the user A can set the countdown time and update the countdown time by himself, and the intelligent contract is opened to the handed user B or C to read the file automatically after the set time is reached. The file data is provided with a timer, so long as the will advice sets the delay time of the person, the timing is reached, the data of the will advice is automatically transmitted to the beneficiary, and the problem that the user cannot leave the data in time due to accidental personal affection is solved.
Based on the first aspect, in some embodiments of the present invention, the method for obtaining the trigger condition of the intelligent contract and sending the encrypted data to the transferee according to the trigger condition further includes the following steps:
acquiring an address of a designated executor of a data inheritor or a public key in a key pair;
the method comprises the steps of obtaining signature information of a designated executor for carrying out digital signature on an intelligent contract, triggering the intelligent contract, opening the reading authority of encrypted data, and sending the encrypted data to a transferee.
And on the basis of setting the trigger time, a designated executor can be set to trigger the intelligent contract, the executor carries out digital signature on the intelligent contract to trigger the intelligent contract, and corresponding testament data is opened to a inheritor to be read. The user A can specify the address or the public key of the executor, the executor needs to carry out digital signature on the intelligent contract of BF or F if the executor executes the data inheritance of the will, the intelligent contract reads that the executor carries out digital signature on the data BF or F, and the intelligent contract is opened to the inherited user B or C to automatically read the file BF or F.
The intelligent contract is triggered in two modes, the contract is triggered at fixed time or the contract is triggered by the appointed executor, and the testament data is transferred to the transferee.
As shown in fig. 3, in a second aspect, an embodiment of the present invention provides a system for heritage and data inheritance based on a block chain distributed storage system, including an identity authentication module 100, a data encryption module 200, a contract triggering module 300, and a data decryption module 400, where:
an identity authentication module 100, configured to acquire user registration information, create a key pair and a user address for a user, and bind a user identity and a user address in the user registration information, where the user includes a data inheritor and a inheritor;
the data encryption module 200 is used for acquiring the testimony inheritance data of the data inheritor, encrypting the testimony inheritance data, generating encrypted data and uploading the encrypted data to an intelligent contract on the block chain distributed storage system;
the contract triggering module 300 is used for acquiring the triggering condition of the intelligent contract and sending the encrypted data to the transferee according to the triggering condition;
and the data decryption module 400 is configured to acquire and decrypt the encrypted data by using a private key in the key pair of the inheritor to obtain the legacy data, thereby completing data inheritance.
When each user needs to inherit the wishlist data, registration is needed first, and after the identity authentication module 100 obtains the registration information of the user, a key pair and an address are created for the user. Before the key is stored, the system prompts the user to input a string of random characters (a total of 12 English mnemonics) as a password, and a private key is encrypted by combining a symmetric encryption algorithm AES. The mnemonic words are automatically generated in 2048 independent English words according to a one-time random algorithm by de-rearrangement combination. The encrypted private key is stored in a local front-end application program of the user, the user is reminded that the user cannot retrieve own account and content once the debit word is lost, the user identity is bound with the user address, so that the corresponding user can be directly found according to the user address in the following process, and each user has a unique user address. The user comprises two identities, namely a data inheritor and a inheritor. After a key pair and an address are created for a user, acquiring the legacy data of the data bearer through the data encryption module 200, encrypting the legacy data, generating encrypted data and uploading the encrypted data to an intelligent contract on the block chain distributed storage system; the digital asset mnemonics and the structured data to be carried by the user are cached in the local client and the unstructured data are uploaded to the distributed storage/IPFS system, the CID parameter returned from the system is cached in the local client, and the target data can be directly inquired through the CID parameter. After the data are uploaded to the intelligent contract, the contract conditions are waited for triggering, then the contract triggering module 300 obtains the triggering condition information, the contract triggering condition information is opened and read by the inheritor, after the inheritor reads the file, the encrypted data are decrypted by using a private key of an individual through the data decryption module 400, then the read target legacy data are checked, and the data inheritance is completed.
The system solves the verification of the testimony by a scientific and technological means based on a block chain distributed storage technology, does not need to depend on a third-party organization or professional personnel to take witnesses for the testimony of the person, can be stored in a multimedia mode for the person because the verification does not need complex administrative processes and high professional personnel cost, easily stores assets and debit words in all aspects of the person, and reduces the risk of storage, loss and tampering of the word data. The testimony can be stored more safely, effectively and with low cost, and once the real situation is certified by the technology in the future verification link, the authenticity of the testimony is not required to be determined by a handwriting expert and the like.
Based on the second aspect, as shown in fig. 3, in some embodiments of the present invention, the data encryption module 200 includes a first encryption sub-module 210, configured to acquire and encrypt the legacy data using a public key in a key pair of a legacy person, generate encrypted data, and upload the encrypted data to the smart contract on the blockchain distributed storage system.
The user can select two modes to upload the testimonial data to the block chain distributed storage system, and one mode is as follows: the public key in the key pair of the inheritor is obtained and adopted by the first encryption submodule 210 to encrypt the heritage data, encrypted data is generated, and the encrypted data is uploaded to the intelligent contract on the block chain distributed storage system. If the user A wants to transmit data to the user B, the user A needs to encrypt the quasi uplink data by using the public key of the user B to form an encrypted file (BF), the BF is stored in an intelligent contract waiting condition to be triggered, and the encrypted file is opened and read by the user B.
Based on the second aspect, as shown in fig. 3, in some embodiments of the present invention, the data encryption module 200 includes a second encryption sub-module 220, a key encryption sub-module 230, and a data uploading sub-module 240, where:
the second encryption submodule 220 is configured to acquire and encrypt the legacy data by using the key of the data bearer, and generate encrypted data;
a key encryption submodule 230, configured to obtain and encrypt the key pair of the data inheritor by using a public key in the key pair of the inheritor, so as to obtain an encrypted key;
and the data uploading sub-module 240 is configured to upload the encrypted data and the encrypted key to the smart contract on the blockchain distributed storage system.
The user can also select another mode to upload the testimonial data to the blockchain distributed storage system, and the mode is as follows: encrypting the heritage advice inheritance data by the second encryption submodule 220 by using the key pair of the data inheritor, and encrypting the key pair of the data inheritor by the second encryption submodule 220 by using the public key in the key pair of the inheritor to obtain an encrypted key; the data upload sub-module 240 then uploads the encrypted data and the encrypted key to the smart contract on the blockchain distributed storage system. If the user A wants to transmit data to the user C, the user A firstly creates a symmetric encryption key (S), encrypts a file to be transmitted to the user C to form encrypted data (F), the user A directly uploads the F to an intelligent contract on a chain and simultaneously encrypts and uploads the F to the intelligent contract by using a public key of the user C as the S, the F and the S are stored in the intelligent contract and triggered by a waiting condition, and the user C is opened to read the F. And the data is doubly encrypted, so that the safety of the data is further ensured.
Based on the second aspect, as shown in fig. 3, in some embodiments of the present invention, the contract triggering module 300 includes a timing triggering sub-module 310, configured to obtain timing triggering time data of the data inheritor, trigger the intelligent contract through a timer according to the timing triggering time data, open a reading right of the encrypted data, and send the encrypted data to the inheritor.
The first one is a timer, the user A can set the countdown time and update the countdown time by himself, and the intelligent contract is opened to the handed user B or C to read the file automatically after the set time is reached. The timing trigger time of the data inheritor is obtained through the timing trigger sub-module 310, then the intelligent contract is triggered at a point, and the reading authority is opened to the inheritor. The file data is provided with a timer, so long as the will advice sets the delay time of the person, the timing is reached, the data of the will advice is automatically transmitted to the beneficiary, and the problem that the user cannot leave the data in time due to accidental personal affection is solved.
Based on the second aspect, as shown in fig. 3, in some embodiments of the present invention, the contract trigger module 300 further includes a designation inheritance submodule 320 and a trigger submodule 330, wherein:
the appointed inheritance sub-module 320 is used for acquiring the address of the appointed executor of the data inheritance person or the public key in the key pair;
the trigger submodule 330 is configured to obtain signature information for a designated executor to digitally sign an intelligent contract, trigger the intelligent contract, open a read right of encrypted data, and send the encrypted data to a transferee.
And on the basis of setting the trigger time, a designated executor can be set to trigger the intelligent contract, the executor carries out digital signature on the intelligent contract to trigger the intelligent contract, and corresponding testament data is opened to a inheritor to be read. The appointed inheritance sub-module 320 obtains the address of the appointed executor of the data inheritance person or the public key in the key pair, the user A can specify the address or the public key of the executor, the executor needs to digitally sign the intelligent contract of BF or F such as executive general advice and data inheritance, the signature information of the digital signature of the appointed executor on the intelligent contract is obtained by the trigger sub-module 330, the intelligent contract is read and the executor carries out the digital signature on the data BF or F, and the intelligent contract is opened to the inherited user B or C to automatically read the file BF or F.
The intelligent contract is triggered in two modes, the contract is triggered at fixed time or the contract is triggered by the appointed executor, and the testament data is transferred to the transferee.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes will occur to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. A method for passing a testimonial and data based on a block chain distributed storage system is characterized by comprising the following steps:
acquiring user registration information, creating a key pair and a user address for a user, and binding a user identity in the user registration information with the user address, wherein the user comprises a data inheritor and a inheritor, and the user comprises the data inheritor and the inheritor;
acquiring the legacy data of the data inheritor, encrypting the legacy data to generate encrypted data, and uploading the encrypted data to an intelligent contract on the block chain distributed storage system;
acquiring a trigger condition of the intelligent contract, and sending the encrypted data to the transferee according to the trigger condition;
and acquiring and decrypting the encrypted data by adopting a private key in a secret key pair of the inheritor to obtain the legacy data of the testimony, and completing data inheritance.
2. The method for inheriting a testimonial order and data based on a blockchain distributed storage system according to claim 1, wherein the method for encrypting testimonial order data, generating encrypted data and uploading the encrypted data to an intelligent contract on the blockchain distributed storage system comprises the following steps:
and acquiring and encrypting the legacy data by adopting a public key in a secret key pair of the legacy person, generating encrypted data and uploading the encrypted data to an intelligent contract on the block chain distributed storage system.
3. The method for inheriting a testimonial order and data based on a blockchain distributed storage system according to claim 1, wherein the method for encrypting testimonial order data, generating encrypted data and uploading the encrypted data to an intelligent contract on the blockchain distributed storage system comprises the following steps:
acquiring and encrypting the legacy data of the testimony by using a secret key of a data inheritor to generate encrypted data;
acquiring and encrypting the key pair of the data inheritor by adopting a public key in the key pair of the inheritor to obtain an encrypted key;
and uploading the encrypted data and the encrypted key to an intelligent contract on the blockchain distributed storage system.
4. The method for inheriting a testimonial and data based on a block chain distributed storage system according to claim 1, wherein the method for acquiring the trigger condition of the intelligent contract and sending the encrypted data to the inheritor according to the trigger condition comprises the following steps:
the method comprises the steps of acquiring timing trigger time data of a data transferor, triggering an intelligent contract through a timer according to the timing trigger time data, opening the reading permission of encrypted data, and sending the encrypted data to the transferee.
5. The method for inheriting a legacy order and data based on a blockchain distributed storage system according to claim 4, wherein the method for acquiring the trigger condition of the intelligent contract and sending the encrypted data to the inheritor according to the trigger condition further comprises the following steps:
acquiring an address of a designated executor of a data inheritor or a public key in a key pair;
the method comprises the steps of obtaining signature information of a designated executor for carrying out digital signature on an intelligent contract, triggering the intelligent contract, opening the reading authority of encrypted data, and sending the encrypted data to a transferee.
6. The utility model provides a will advice and data inheritance system based on block chain distributed storage system which characterized in that, includes identity authentication module, data encryption module, contract trigger module and data decryption module, wherein:
the identity authentication module is used for acquiring user registration information, creating a key pair and a user address for a user, and binding the user identity in the user registration information with the user address, wherein the user comprises a data inheritor and a inheritor;
the data encryption module is used for acquiring the legacy data of the testimony of the data inheritor, encrypting the legacy data of the testimony, generating encrypted data and uploading the encrypted data to the intelligent contract on the block chain distributed storage system;
the contract triggering module is used for acquiring the triggering condition of the intelligent contract and sending the encrypted data to the transferee according to the triggering condition;
and the data decryption module is used for acquiring and decrypting the encrypted data by adopting a private key in the secret key pair of the inheritor so as to obtain the legacy data and complete data inheritance.
7. The system of claim 6, wherein the data encryption module comprises a first encryption sub-module, configured to obtain and encrypt the legacy data using a public key of the key pair of the inheritor, generate encrypted data, and upload the encrypted data to the intelligent contract on the blockchain distributed storage system.
8. The system of claim 6, wherein the data encryption module comprises a second encryption submodule, a key encryption submodule, and a data upload submodule, wherein:
the second encryption submodule is used for acquiring and encrypting the legacy data by adopting a key of a data bearer to generate encrypted data;
the key encryption submodule is used for acquiring and encrypting the key pair of the data inheritor by adopting a public key in the key pair of the inheritor so as to obtain an encrypted key;
and the data uploading sub-module is used for uploading the encrypted data and the encrypted key to an intelligent contract on the blockchain distributed storage system.
9. The legacy order and data inheritance system based on a blockchain distributed storage system according to claim 6, wherein the contract trigger module comprises a timing trigger submodule, configured to acquire timing trigger time data of a data inheritance person, trigger an intelligent contract through a timer according to the timing trigger time data, open a read permission of encrypted data, and send the encrypted data to the inheritance person.
10. The system of claim 9, wherein the contract trigger module further comprises a designation inheritance submodule and a trigger submodule, wherein:
the appointed inheritance sub-module is used for acquiring the address of an appointed executor of the data inheritance person or a public key in a key pair;
and the triggering submodule is used for acquiring the signature information of the specified executor for carrying out digital signature on the intelligent contract, triggering the intelligent contract, opening the reading authority of the encrypted data and sending the encrypted data to the transferee.
CN202110069970.7A 2021-01-19 2021-01-19 Hospital advice and data inheritance method and system based on block chain distributed storage system Pending CN113806793A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110069970.7A CN113806793A (en) 2021-01-19 2021-01-19 Hospital advice and data inheritance method and system based on block chain distributed storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110069970.7A CN113806793A (en) 2021-01-19 2021-01-19 Hospital advice and data inheritance method and system based on block chain distributed storage system

Publications (1)

Publication Number Publication Date
CN113806793A true CN113806793A (en) 2021-12-17

Family

ID=78892888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110069970.7A Pending CN113806793A (en) 2021-01-19 2021-01-19 Hospital advice and data inheritance method and system based on block chain distributed storage system

Country Status (1)

Country Link
CN (1) CN113806793A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115580412A (en) * 2022-11-24 2023-01-06 杭州蚂蚁酷爱科技有限公司 System, method and device for managing digital heritage based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115580412A (en) * 2022-11-24 2023-01-06 杭州蚂蚁酷爱科技有限公司 System, method and device for managing digital heritage based on block chain
CN115580412B (en) * 2022-11-24 2023-03-03 杭州蚂蚁酷爱科技有限公司 System, method and device for managing digital heritage based on block chain

Similar Documents

Publication Publication Date Title
EP3547202B1 (en) Method for access to anonymised data
US11153086B2 (en) Methods and systems for a digital trust architecture
CN113411384B (en) System and method for privacy protection in data security sharing process of Internet of things
US10706416B2 (en) System and method of generating and validating encapsulated cryptographic tokens based on multiple digital signatures
CN102932136B (en) Systems and methods for managing cryptographic keys
EP2513833B1 (en) Verifiable trust for data through wrapper composition
KR102255287B1 (en) Physical identity management system using One-time-password on Blockchain
EP3547203A1 (en) Method and system for managing access to personal data by means of an intelligent contract
US10523644B2 (en) System and method for secure digital sharing based on an inter-system exchange of a two-tier double encrypted digital information key
WO2011117486A1 (en) Non-hierarchical infrastructure for the management of paired security keys of physical persons
JP2007282295A (en) Cryptographic system and method with key escrow feature
WO2007010427A1 (en) Digital inheritance
KR20230040959A (en) Method, apparatus, and computer readable medium for authentication and authorization of networked data transactions
US11250423B2 (en) Encapsulated security tokens for electronic transactions
WO2017109052A1 (en) A method for encrypting data and a method for decrypting data
US20230206219A1 (en) Identification token, systems and methods for identification and identity verification.
CN113806793A (en) Hospital advice and data inheritance method and system based on block chain distributed storage system
Vignesh et al. Secured Data Access and Control Abilities Management over Cloud Environment using Novel Cryptographic Principles
Belurgikar et al. Identity solutions for verification using blockchain technology
Reddy et al. An Intelligent Tender Management System using Block Chain and IPFS
EP2689552B1 (en) Non-hierarchical infrastructure for managing twin-security keys of physical persons or of elements (igcp/pki).
Pericàs-Gornals et al. Rejectable soulbound tokens for credentials assignment and acceptance of terms
Vaish et al. The Role of Integrating Blockchain, Digital Signature, and Cloud Computing for Robust Smart Contract Structuring
JP2002312222A (en) Cryptic file managing device and method
Bodineni et al. Safeguarding user Data: Blockchain as an Enabler of Advanced Consent Management Systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination