CN114844695B - Business data circulation method, system and related equipment based on block chain - Google Patents

Business data circulation method, system and related equipment based on block chain Download PDF

Info

Publication number
CN114844695B
CN114844695B CN202210460781.7A CN202210460781A CN114844695B CN 114844695 B CN114844695 B CN 114844695B CN 202210460781 A CN202210460781 A CN 202210460781A CN 114844695 B CN114844695 B CN 114844695B
Authority
CN
China
Prior art keywords
data
ciphertext
request
party
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210460781.7A
Other languages
Chinese (zh)
Other versions
CN114844695A (en
Inventor
赵东明
李印宽
周子岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaneng Tendering Co ltd
Original Assignee
Huaneng Tendering Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaneng Tendering Co ltd filed Critical Huaneng Tendering Co ltd
Priority to CN202210460781.7A priority Critical patent/CN114844695B/en
Publication of CN114844695A publication Critical patent/CN114844695A/en
Application granted granted Critical
Publication of CN114844695B publication Critical patent/CN114844695B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0471Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a business data circulation method, a system and related equipment based on a block chain, comprising the following steps: the data request party sends a service data circulation request to the data provider based on the blockchain platform, the data provider generates a conversion key based on a private key of the data request party after receiving the service data request and generates a first ciphertext based on request content, the data provider sends the conversion key and the first ciphertext to a third party agent, the third party agent receives the conversion key and the first ciphertext and approves service flow conversion authority corresponding to the service data circulation request, the third party agent re-encrypts the first ciphertext by adopting the conversion key under the condition that the approval passes to obtain a second ciphertext, the second ciphertext is sent to the data request party, the data request party receives the second ciphertext sent by the third party agent, and the second ciphertext is analyzed to obtain target data corresponding to the request content. The invention ensures the safety and improves the efficiency of data circulation.

Description

Business data circulation method, system and related equipment based on block chain
Technical Field
The present invention relates to the field of image processing, and in particular, to a method, a system, and related devices for traffic data stream based on blockchain.
Background
In the process of service data circulation, confidential files and data circulation are often involved. For these file data, how to guarantee the security in the data transmission and circulation process is an important factor.
In the existing mode, the traditional asymmetric encryption is adopted to transmit data, the data is transmitted to a third party to be encrypted for data circulation, but the mode has no trace of data transfer information, the data is authorized to an agent to have the risks of malicious damage and data leakage, and the intelligent contract is utilized to carry out service logic authorization, so that circulation trace can be reserved, and the identity of the agent can be checked, but the method only ensures the authorization of the agent at the service level, and the situation that a large amount of transactions are blocked due to insufficient performance in a scene of a large amount of data circulation information, so that the service data circulation is ensured, and meanwhile, the service data circulation efficiency is improved, so that a problem to be solved is urgent.
Disclosure of Invention
The embodiment of the invention provides a business data circulation method, a system, a device, computer equipment and a storage medium based on a block chain, so as to improve the efficiency of current business data circulation.
In order to solve the above technical problems, an embodiment of the present application provides a service data circulation method based on a blockchain, including:
The data request party sends a service data flow request to the data provider based on the block chain platform, wherein the service data request comprises a private key and request content of the data request party;
After receiving the service data request, the data provider generates a conversion key based on a private key of the data requester and generates a first ciphertext based on the request content;
The data provider sends the conversion key and the first ciphertext to a third party agent;
The third party agent receives the conversion key and the first ciphertext and examines and approves the service flow authority corresponding to the service data flow request;
The third party agent re-encrypts the first ciphertext by adopting the conversion key under the condition that the approval is confirmed to pass, so as to obtain a second ciphertext, and sends the second ciphertext to the data requesting party;
and the data request party receives the second ciphertext sent by the third party agent and analyzes the second ciphertext to obtain target data corresponding to the request content.
Optionally, the generating the first ciphertext based on the request content includes:
the data provider locally acquires data corresponding to the request content as the target data;
And the data provider encrypts the target data by adopting a public key of the data provider to obtain the first ciphertext.
Optionally, the data provider sends the conversion key and the first ciphertext to a third party agent, including:
the data provider sends the conversion key to a third party agent based on the blockchain platform, and sends the first ciphertext to the third party agent in an under-chain manner.
Optionally, when the third party agent confirms that the approval passes, the third party agent re-encrypts the first ciphertext by using the conversion key to obtain a second ciphertext, including:
the third party agent obtains the public key of the data provider under the condition that the approval is confirmed to pass;
And the third party agent Shang Ji performs a calculation transformation service on the first ciphertext in the public key of the data provider and the transformation key to obtain the second ciphertext, so that the second ciphertext can be decrypted by the private key of the data requester.
Optionally, the sending the second ciphertext to the data requester includes:
and the third party agent sends the second ciphertext to the data requesting party in a down-chain mode.
Optionally, the parsing the second ciphertext to obtain the target data corresponding to the request content includes:
and the data requester decrypts the second ciphertext by adopting a data decryption algorithm based on the private key of the data requester to obtain the target data.
In order to solve the above technical problems, the embodiment of the present application further provides a system for traffic data circulation based on a blockchain, which includes a data requester, a data receiver, a third party agent and a blockchain platform, wherein,
The data request party is used for sending a service data flow request to the data provider based on the blockchain platform, receiving a second ciphertext sent by the third party agent, and analyzing the second ciphertext to obtain target data corresponding to request content, wherein the service data request comprises a private key of the data request party and the request content;
the data provider is used for generating a conversion key based on a private key of the data requester after receiving the service data request, generating a first ciphertext based on the request content, and transmitting the conversion key and the first ciphertext to the third party agent;
And the third party agent is used for receiving the conversion key and the first ciphertext, approving the service flow authority corresponding to the service data flow request, re-encrypting the first ciphertext by adopting the conversion key under the condition of confirming approval passing, obtaining a second ciphertext, and transmitting the second ciphertext to the data requester.
In order to solve the above technical problem, an embodiment of the present application further provides a service data circulation device based on a blockchain, including:
The request module is used for sending a service data flow request to a data provider based on a block chain platform by a data requester, wherein the service data request comprises a private key and request content of the data requester;
The generation module is used for generating a conversion key based on a private key of the data requester after the data provider receives the service data request and generating a first ciphertext based on the request content;
The transmission module is used for transmitting the conversion key and the first ciphertext to a third party agency by the data provider;
the approval module is used for receiving the conversion key and the first ciphertext by a third party agent and approving the service flow authority corresponding to the service data flow request;
The re-encryption module is used for re-encrypting the first ciphertext by adopting the conversion key to obtain a second ciphertext and sending the second ciphertext to the data requesting party under the condition that the third party agent confirms that the approval passes;
And the decryption module is used for receiving the second ciphertext sent by the third party agent by the data request party and analyzing the second ciphertext to obtain target data corresponding to the request content.
Optionally, the generating module includes:
The data selecting unit is used for locally acquiring data corresponding to the request content from the data provider as the target data;
And the data encryption unit is used for encrypting the target data by the data provider by adopting the public key of the data provider to obtain the first ciphertext.
Optionally, the re-encryption module includes:
The public key acquisition unit is used for acquiring the public key of the data provider under the condition that the third party agent confirms that the approval passes;
And the ciphertext conversion unit is used for executing calculation conversion service on the first ciphertext by the third party agent Shang Ji on the public key of the data provider and the conversion key to obtain the second ciphertext, so that the second ciphertext can be decrypted by the private key of the data requester.
In order to solve the above technical problem, an embodiment of the present application further provides a computer device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements the steps of the above-mentioned blockchain-based service data flow method when executing the computer program.
To solve the above technical problem, an embodiment of the present application further provides a computer readable storage medium, where a computer program is stored, where the computer program implements the steps of the above-mentioned blockchain-based service data circulation method when executed by a processor.
The method, the device, the computer equipment and the storage medium for transferring the business data based on the blockchain send a business data transfer request to a data provider through a data requester based on a blockchain platform, the data provider generates a conversion key based on a private key of the data requester after receiving the business data request and generates a first ciphertext based on request content, the data provider sends the conversion key and the first ciphertext to a third party agent, the third party agent receives the conversion key and the first ciphertext and approves the business transfer authority corresponding to the business data transfer request, the third party agent re-encrypts the first ciphertext by the conversion key under the condition that the approval is confirmed to pass, so as to obtain a second ciphertext, the second ciphertext is sent to the data requester, the data requester receives the second ciphertext sent by the third party agent, and the second ciphertext is analyzed so as to obtain target data corresponding to the request content. The third party agent is adopted for approval, redundancy is slow due to the fact that intelligent contract approval storage is avoided, meanwhile, the whole circulation process is left by the block chain platform, tampering is prevented, safety is guaranteed, and meanwhile data circulation efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments of the present invention will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow chart of one embodiment of a blockchain-based business data streaming method of the present application;
FIG. 3 is a schematic block chain based traffic data flow system architecture diagram in accordance with one embodiment of the present application;
FIG. 4 is a schematic structural diagram of one embodiment of a computer device in accordance with the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the applications herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "comprising" and "having" and any variations thereof in the description of the application and the claims and the description of the drawings above are intended to cover a non-exclusive inclusion. The terms first, second and the like in the description and in the claims or in the above-described figures, are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, as shown in fig. 1, fig. 1 is a schematic diagram of an application environment of a data sharing method of a multi-bidding platform based on a blockchain in an embodiment of the present application, the data sharing method of the multi-bidding platform based on the blockchain provided by the present application may be applied in an application environment as shown in fig. 1, where the blockchain is composed of a plurality of nodes capable of communicating with each other, each node may be regarded as a block storage, each block storage is used for storing data, each data node includes all data, the block storage data has a complete history record, a fast recovery expansion can be performed, the local chain is divided into a public chain, a private chain and a alliance chain, any node is open, each organization/node may participate in the computation of the blockchain, any organization/node may download to obtain complete blockchain data, the private chain is a blockchain and does not wish that the system may participate in, and is not disclosed for the outside, and is applicable to internal data management and or open test of a specific organization, the alliance chain is a hash chain may participate in each node and may be completely and a hash chain may be used to complete with a hash chain to implement a full-size of the data, and a hash chain may be added to a full-of the public-key, and a full-size digital-of the hash-chain may be realized in a network, and a full-of the hash-based data can be stored by a network, and a full-of the hash-of the public-key may be realized, and a full-of the hash-of the data has a full-of a hash-of the data can be stored.
Referring to fig. 2, fig. 2 shows a block chain-based service data flow method according to an embodiment of the present invention, and the application environment of the method in fig. 1 is taken as an example for explanation, and the details are as follows:
S201: the data requester sends a service data flow request to the data provider based on the blockchain platform, wherein the service data request comprises a private key of the data requester and request content.
Specifically, when the data requester needs to acquire service data, a platform for providing the service data is taken as a data provider, and a service data flow request is sent to the data provider through a blockchain platform, wherein the request comprises a private key and request content of the data requester.
The data request party refers to a data demand party in the data flow process, and the specific form can be a data sharing platform node or a server and the like corresponding to the data demand party; the data provider refers to a provider of data in the data flow process, and the specific form can be a data sharing platform node or a server corresponding to the data provider.
The request content is demand data set in the data stream request of the data request Fang Zaiye, and the data can be structural data, unstructured data or a file.
S202: after receiving the service data request, the data provider generates a conversion key based on the private key of the data requester and generates a first ciphertext based on the request content.
Specifically, after receiving a service data request sent by a data requester based on a blockchain platform, a data provider acquires a private key of the data requester included in the request, generates a conversion key, acquires request content included in the request, and generates a first ciphertext.
The conversion key refers to a key which is generated by the data provider based on the private key of the data requester and is used for providing the third party agent with the calculation conversion service.
The first ciphertext is encrypted data obtained by encrypting local data corresponding to the request content.
Further, generating a first ciphertext based on the request content, comprising:
The data provider locally acquires data corresponding to the request content as target data;
The data provider encrypts the target data by adopting a public key of the data provider to obtain a first ciphertext.
S203: the data provider sends the conversion key and the first ciphertext to the third party agent.
Optionally, the data provider sends the conversion key and the first ciphertext to a third party agent, including:
The data provider sends the conversion key to the third party agent based on the blockchain platform and sends the first ciphertext to the third party agent in an under-chain manner.
It should be noted that, the transformation key is usually smaller, the transformation key is transferred through the blockchain platform, so that the trace of data stream transfer is facilitated, the transmitted data is prevented from being tampered, the safety in the data stream process is improved, meanwhile, the first ciphertext data volume is larger, the first ciphertext transmission is performed in a link-down mode, the transmission efficiency is improved, the transmission blockage caused by the large data volume is prevented, and the efficiency of the data stream is improved.
S204: and the third party agent receives the conversion key and the first ciphertext and approves the service flow permission corresponding to the service data flow request.
Specifically, after receiving the conversion key and the first ciphertext, the third party agent approves the permission related to the business circulation flow corresponding to the business data flow request, and obtains a corresponding approval result, wherein the approval result comprises confirmation of approval passing and approval failing.
It should be understood that in the conventional implementation manner, approval is mainly performed through rules set by the intelligent contracts in the blockchain, that is, authorization is performed through a business code layer, when more data is to be processed, performance deficiency is easily caused in a scene, so that a large number of transactions are blocked, the whole data circulation efficiency is extremely low, in this embodiment, the approval in the intelligent contracts is migrated to a third party agent for execution, so that the data processing cost in the intelligent contracts is greatly reduced, the efficiency of process data processing is improved, and meanwhile, the blockchain is adopted for marking, so that the data is ensured not to be tampered.
The third party agent refers to a node that can provide a computing transformation service, and for example, may be a server that provides cloud computing, and the like.
S205: and under the condition that the third party agent confirms that the approval passes, the first ciphertext is re-encrypted by adopting the conversion key to obtain a second ciphertext, and the second ciphertext is sent to the data requesting party.
Optionally, when the third party agent confirms that the approval passes, the third party agent re-encrypts the first ciphertext by using the conversion key to obtain a second ciphertext, including:
The third party agent obtains the public key of the data provider under the condition that the approval is confirmed to pass;
the third party agent Shang Ji performs a computational transformation service on the first ciphertext in the public key and the transformation key of the data provider to obtain a second ciphertext, so that the second ciphertext can be decrypted by the private key of the data requester.
Optionally, sending the second ciphertext to the data requestor includes:
The third party agent sends the second ciphertext to the data requestor in an under-chain manner.
S206: and the data request party receives the second ciphertext sent by the third party agent and analyzes the second ciphertext to obtain target data corresponding to the request content.
Specifically, in this embodiment, the first ciphertext is generated according to the private key of the data requester, and the second key is a public key and a conversion key of the third party agent Shang Ji in the data provider, so that the first ciphertext is obtained by performing calculation conversion service on the first ciphertext, so that after receiving the second ciphertext sent by the third party agent, the data requester can decrypt the second ciphertext based on the private key of the data requester, so that the data cannot be known or tampered by the third party agent in the process of transmission, and the security of the data circulation is ensured.
Optionally, the second ciphertext is parsed to obtain target data corresponding to the request content, including:
and the data requester decrypts the second ciphertext by adopting a data decryption algorithm based on the private key of the data requester to obtain the target data.
In this embodiment, the data requester sends a service data circulation request to the data provider based on the blockchain platform, the data provider generates a conversion key based on a private key of the data requester after receiving the service data request, and generates a first ciphertext based on the request content, the data provider sends the conversion key and the first ciphertext to the third party agent, the third party agent receives the conversion key and the first ciphertext and approves the service circulation authority corresponding to the service data circulation request, the third party agent re-encrypts the first ciphertext by using the conversion key under the condition that the approval is confirmed to pass, so as to obtain a second ciphertext, and sends the second ciphertext to the data requester, and the data requester receives the second ciphertext sent by the third party agent and parses the second ciphertext so as to obtain target data corresponding to the request content. The third party agent is adopted for approval, redundancy is slow due to the fact that intelligent contract approval storage is avoided, meanwhile, the whole circulation process is left by the block chain platform, tampering is prevented, safety is guaranteed, and meanwhile data circulation efficiency is improved.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present invention.
Fig. 3 is a schematic structural diagram of an embodiment of a blockchain-based service data transfer system corresponding to the blockchain-based service data transfer method of the above embodiment. As shown in fig. 3, the blockchain-based business data streaming system includes a data requestor 31, a data receiver 32, a third party agent 33, and a blockchain platform 34, wherein,
The data requester 31 is configured to send a service data flow request to the data provider 32 based on the blockchain platform 34, receive a second ciphertext sent by the third party agent 33, and parse the second ciphertext to obtain target data corresponding to the requested content, where the service data request includes a private key of the data requester and the requested content;
The data provider 32 is configured to generate, after receiving the service data request, a conversion key based on a private key of the data requester 32, generate a first ciphertext based on the request content, and send the conversion key and the first ciphertext to the third party agent 33;
The third party agent 33 is configured to receive the conversion key and the first ciphertext, and to examine and approve the service flow authority corresponding to the service data flow request, and in case that the examination and approval pass, re-encrypt the first ciphertext by using the conversion key to obtain a second ciphertext, and send the second ciphertext to the data requester 31.
In order to solve the technical problems, the embodiment of the application also provides a service data circulation device based on the block chain, which corresponds to the service data circulation method based on the block chain in the embodiment one by one and comprises a request module, a generation module, a transmission module, an approval module, a re-encryption module and a decryption module. The functional modules are described in detail as follows:
the request module is used for the data request party to send a service data flow request to the data provider based on the block chain platform, wherein the service data request comprises a private key and request content of the data request party;
The generation module is used for generating a conversion key based on a private key of the data requester after the data provider receives the service data request and generating a first ciphertext based on request content;
The transmission module is used for transmitting the conversion key and the first ciphertext to the third party agency by the data provider;
The approval module is used for receiving the conversion key and the first ciphertext by the third party agent and approving the service flow permission corresponding to the service data flow request;
The re-encryption module is used for re-encrypting the first ciphertext by adopting the conversion key to obtain a second ciphertext and sending the second ciphertext to the data requesting party under the condition that the third party agent confirms that the approval passes;
and the decryption module is used for receiving the second ciphertext sent by the third party agent by the data requesting party and analyzing the second ciphertext to obtain target data corresponding to the request content.
Optionally, the generating module includes:
the data selecting unit is used for locally acquiring data corresponding to the request content from the data provider as target data;
and the data encryption unit is used for encrypting the target data by the data provider by adopting the public key of the data provider to obtain a first ciphertext.
Optionally, the re-encryption module includes:
the public key acquisition unit is used for acquiring the public key of the data provider under the condition that the third party agent confirms that the approval passes;
And the ciphertext conversion unit is used for executing calculation conversion service on the first ciphertext by the third party agency Shang Ji on the public key and the conversion key of the data provider to obtain a second ciphertext so that the second ciphertext can be decrypted by the private key of the data requester.
For specific limitations on the blockchain-based service data flow device, reference may be made to the above limitation on the blockchain-based service data flow method, and the description thereof will not be repeated here. The various modules in the block chain based service data flow device can be implemented in whole or in part by software, hardware and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In order to solve the technical problems, the embodiment of the application also provides computer equipment. Referring specifically to fig. 4, fig. 4 is a basic structural block diagram of a computer device according to the present embodiment.
The computer device 4 comprises a memory 41, a processor 42, a network interface 43 communicatively connected to each other via a system bus. It is noted that only a computer device 4 having a component connection memory 41, a processor 42, a network interface 43 is shown in the figures, but it is understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be appreciated by those skilled in the art that the computer device herein is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and its hardware includes, but is not limited to, a microprocessor, an Application SPECIFIC INTEGRATED Circuit (ASIC), a Programmable gate array (Field-Programmable GATE ARRAY, FPGA), a digital Processor (DIGITAL SIGNAL Processor, DSP), an embedded device, and the like.
The computer equipment can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing equipment. The computer equipment can perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
The memory 41 includes at least one type of readable storage medium including flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or D interface display memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 41 may be an internal storage unit of the computer device 4, such as a hard disk or a memory of the computer device 4. In other embodiments, the memory 41 may also be an external storage device of the computer device 4, such as a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD) or the like, which are provided on the computer device 4. Of course, the memory 41 may also comprise both an internal memory unit of the computer device 4 and an external memory device. In this embodiment, the memory 41 is generally used to store an operating system and various application software installed on the computer device 4, such as program codes of service data flows, etc. Further, the memory 41 may be used to temporarily store various types of data that have been output or are to be output.
The processor 42 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 42 is typically used to control the overall operation of the computer device 4. In this embodiment, the processor 42 is configured to execute the program code stored in the memory 41 or process data, such as the program code of service data stream.
The network interface 43 may comprise a wireless network interface or a wired network interface, which network interface 43 is typically used for establishing a communication connection between the computer device 4 and other electronic devices.
The present application also provides another embodiment, namely, a computer readable storage medium storing an interface display program, where the interface display program is executable by at least one processor, so that the at least one processor performs the steps of the blockchain-based service data streaming method as described above.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
It is apparent that the above-described embodiments are only some embodiments of the present application, but not all embodiments, and the preferred embodiments of the present application are shown in the drawings, which do not limit the scope of the patent claims. This application may be embodied in many different forms, but rather, embodiments are provided in order to provide a thorough and complete understanding of the present disclosure. Although the application has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described in the foregoing description, or equivalents may be substituted for elements thereof. All equivalent structures made by the content of the specification and the drawings of the application are directly or indirectly applied to other related technical fields, and are also within the scope of the application.

Claims (8)

1. A method for traffic data streaming based on a blockchain, comprising:
The data request party sends a service data flow request to the data provider based on the block chain platform, wherein the service data flow request comprises a private key and request content of the data request party;
after receiving the service data flow request, the data provider generates a conversion key based on a private key of the data requester and generates a first ciphertext based on the request content;
The data provider sends the conversion key and the first ciphertext to a third party agent, wherein the conversion key is transmitted through a blockchain platform, and the first ciphertext is transmitted in a link-down mode;
The third party agent receives the conversion key and the first ciphertext and examines and approves the service flow authority corresponding to the service data flow request;
The third party agent re-encrypts the first ciphertext by adopting the conversion key under the condition that the approval is confirmed to pass, so as to obtain a second ciphertext, and sends the second ciphertext to the data requesting party;
The data request party receives a second ciphertext sent by the third party agent and analyzes the second ciphertext to obtain target data corresponding to the request content;
Wherein the generating a first ciphertext based on the request content includes:
the data provider locally acquires data corresponding to the request content as the target data;
The data provider encrypts the target data by adopting a public key of the data provider to obtain the first ciphertext;
The third party agent re-encrypts the first ciphertext by using the conversion key to obtain a second ciphertext under the condition that the approval is confirmed to pass, and the method comprises the following steps:
the third party agent obtains the public key of the data provider under the condition that the approval is confirmed to pass;
and the third party agent Shang Ji performs a calculation transformation service on the first ciphertext in the public key of the data provider and the transformation key to obtain the second ciphertext, so that the second ciphertext can be decrypted by the private key of the data requester.
2. The blockchain-based service data streaming method of claim 1, wherein the data provider sends the conversion key and the first ciphertext to a third party agent, comprising:
the data provider sends the conversion key to a third party agent based on the blockchain platform, and sends the first ciphertext to the third party agent in an under-chain manner.
3. The blockchain-based service data streaming method of claim 1 or 2, wherein the sending the second ciphertext to the data requestor comprises:
and the third party agent sends the second ciphertext to the data requesting party in a down-chain mode.
4. The blockchain-based service data streaming method according to claim 1 or 2, wherein the parsing the second ciphertext to obtain the target data corresponding to the request content includes:
and the data requester decrypts the second ciphertext by adopting a data decryption algorithm based on the private key of the data requester to obtain the target data.
5. A blockchain-based service data flow system operating based on the blockchain-based service data flow method of any of claims 1 to 4, the blockchain-based service data flow system comprising a data requestor, a data provider, a third party agent, and a blockchain platform, wherein,
The data request party is used for sending a service data circulation request to the data provider based on the blockchain platform, receiving a second ciphertext sent by the third party agent, and analyzing the second ciphertext to obtain target data corresponding to request content, wherein the service data circulation request comprises a private key of the data request party and the request content;
the data provider is used for generating a conversion key based on a private key of the data requester after receiving the service data flow request, generating a first ciphertext based on the request content, and transmitting the conversion key and the first ciphertext to the third party agent, wherein the conversion key is transmitted through a blockchain platform, and the first ciphertext is transmitted in a link-down mode;
And the third party agent is used for receiving the conversion key and the first ciphertext, approving the service flow authority corresponding to the service data flow request, re-encrypting the first ciphertext by adopting the conversion key under the condition of confirming approval passing, obtaining a second ciphertext, and transmitting the second ciphertext to the data requester.
6. A blockchain-based traffic data streaming device, comprising:
The request module is used for sending a service data flow request to the data provider based on the blockchain platform by the data requester, wherein the service data flow request comprises a private key and request content of the data requester;
The generation module is used for generating a conversion key based on a private key of the data request party after the data provider receives the service data flow request, and generating a first ciphertext based on the request content;
The transmission module is used for transmitting the conversion key and the first ciphertext to a third party agency by the data provider, wherein the conversion key is transmitted through a blockchain platform, and the first ciphertext is transmitted in a link-down mode;
the approval module is used for receiving the conversion key and the first ciphertext by a third party agent and approving the service flow authority corresponding to the service data flow request;
The re-encryption module is used for re-encrypting the first ciphertext by adopting the conversion key to obtain a second ciphertext and sending the second ciphertext to the data requesting party under the condition that the third party agent confirms that the approval passes;
The decryption module is used for receiving the second ciphertext sent by the third party agent by the data request party and analyzing the second ciphertext to obtain target data corresponding to the request content;
Wherein, the generating module includes:
The data selecting unit is used for locally acquiring data corresponding to the request content from the data provider as the target data;
The data encryption unit is used for encrypting the target data by the data provider by adopting a public key of the data provider to obtain the first ciphertext;
Wherein, the re-encryption module includes:
The public key acquisition unit is used for acquiring the public key of the data provider under the condition that the third party agent confirms that the approval passes;
And the ciphertext conversion unit is used for executing calculation conversion service on the first ciphertext by the third party agency Shang Ji according to the public key of the data provider and the conversion key to obtain the second ciphertext, so that the second ciphertext can be decrypted by the private key of the data requester.
7. A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the blockchain-based traffic data streaming method of any of claims 1 to 4 when the computer program is executed.
8. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the blockchain-based traffic data streaming method of any of claims 1 to 4.
CN202210460781.7A 2022-04-28 2022-04-28 Business data circulation method, system and related equipment based on block chain Active CN114844695B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210460781.7A CN114844695B (en) 2022-04-28 2022-04-28 Business data circulation method, system and related equipment based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210460781.7A CN114844695B (en) 2022-04-28 2022-04-28 Business data circulation method, system and related equipment based on block chain

Publications (2)

Publication Number Publication Date
CN114844695A CN114844695A (en) 2022-08-02
CN114844695B true CN114844695B (en) 2024-06-25

Family

ID=82566867

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210460781.7A Active CN114844695B (en) 2022-04-28 2022-04-28 Business data circulation method, system and related equipment based on block chain

Country Status (1)

Country Link
CN (1) CN114844695B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112532580A (en) * 2020-10-23 2021-03-19 暨南大学 Data transmission method and system based on block chain and proxy re-encryption
CN113225302A (en) * 2021-01-27 2021-08-06 暨南大学 Data sharing system and method based on proxy re-encryption

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990407B (en) * 2018-04-27 2020-11-10 腾讯科技(深圳)有限公司 Block chain based data storage method and device, server and storage medium
CN112581127B (en) * 2020-12-10 2024-07-02 深圳技术大学 Commodity transaction method and device, computer equipment, storage medium and system
CN114297593A (en) * 2021-12-28 2022-04-08 上海万向区块链股份公司 Data hosting and sharing method and system based on block chain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112532580A (en) * 2020-10-23 2021-03-19 暨南大学 Data transmission method and system based on block chain and proxy re-encryption
CN113225302A (en) * 2021-01-27 2021-08-06 暨南大学 Data sharing system and method based on proxy re-encryption

Also Published As

Publication number Publication date
CN114844695A (en) 2022-08-02

Similar Documents

Publication Publication Date Title
Zhang et al. Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing
US11336635B2 (en) Systems and methods for authenticating device through IoT cloud using hardware security module
CN110417750B (en) Block chain technology-based file reading and storing method, terminal device and storage medium
CN112131316B (en) Data processing method and device applied to block chain system
EP2095288B1 (en) Method for the secure storing of program state data in an electronic device
US20200213331A1 (en) Data service system
CN111294203A (en) Information transmission method
CN113486122A (en) Data sharing method and electronic equipment
Xu et al. An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption
WO2021098152A1 (en) Blockchain-based data processing method, device, and computer apparatus
CN112733180A (en) Data query method and device and electronic equipment
Gao et al. A new blockchain-based personal privacy protection scheme
Duan et al. BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations
CN115085934A (en) Contract management method based on block chain and combined key and related equipment
Gao et al. BFR‐SE: A Blockchain‐Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine‐Grained Access Control in Cloud Environment
CN109698839B (en) Desensitization data comparison method and device based on asymmetric algorithm
CN114844695B (en) Business data circulation method, system and related equipment based on block chain
CN113868713B (en) Data verification method and device, electronic equipment and storage medium
CN113434824B (en) Software service authorization management method, device, equipment and storage medium
CN115409511A (en) Personal information protection system based on block chain
Park et al. An efficient motion estimation method for QTBT structure in JVET future video coding
Liu et al. Video data integrity verification method based on full homomorphic encryption in cloud system
CN114710490A (en) Medical Internet of things data sharing method and system based on block chain
CN114584347A (en) Verification short message receiving and sending method, server, terminal and storage medium
Shafqat et al. Identity matrix: architecture framework for trusted cloud computing through cloud intellect

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant