CN110321732A - Data grant method, apparatus, storage medium and the electronic equipment of block catenary system - Google Patents
Data grant method, apparatus, storage medium and the electronic equipment of block catenary system Download PDFInfo
- Publication number
- CN110321732A CN110321732A CN201910434980.9A CN201910434980A CN110321732A CN 110321732 A CN110321732 A CN 110321732A CN 201910434980 A CN201910434980 A CN 201910434980A CN 110321732 A CN110321732 A CN 110321732A
- Authority
- CN
- China
- Prior art keywords
- data
- target data
- request
- grant
- default
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 238000013475 authorization Methods 0.000 claims abstract description 74
- 238000012856 packing Methods 0.000 claims abstract description 16
- 230000006870 function Effects 0.000 claims description 17
- 238000004321 preservation Methods 0.000 claims description 3
- 238000005303 weighing Methods 0.000 claims description 3
- 238000012545 processing Methods 0.000 description 11
- 230000005540 biological transmission Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000005291 magnetic effect Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 210000004027 cell Anatomy 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000003014 reinforcing effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 210000000352 storage cell Anatomy 0.000 description 1
- 238000002834 transmittance Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6272—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
The disclosure is directed to data grant method, apparatus, storage medium and the electronic equipments of a kind of block catenary system, belong to block chain applied technical field, this method comprises: obtaining the request code of the target data and the default publicity label of the target data from data grant request when the data grant for receiving target data is requested;Obtain the predetermined encryption key of the target data;By the request code of the target data, the predetermined encryption key and the default publicity label of the target data, authorization key is packaged as according to default packing algorithm;The authorization key is sent to the request of data side in data grant request institute source, so that decryption is stored in the target data that the data save node after the request of data side parses predetermined encryption key.The disclosure is by by encryption data cochain, effectively improving the convenience and high efficiency of data grant on block catenary system under the safety conditions for guaranteeing data grant by key authorization in advance.
Description
Technical field
This disclosure relates to block chain applied technical field, in particular to a kind of data grant side of block catenary system
Method, device, storage medium and electronic equipment.
Background technique
Block catenary system is made of multiple sub-networks, and each sub-network includes multiple nodes again, uploads to block chain
Data can be shared on each node on block chain, that is, there are data backups on each node.
When carrying out data sharing using block catenary system in the prior art, usually according to key pair mechanism, that is, public key
Data are carried out the block chain node uploaded after public key encryption in real time, then carry out being broadcast to data requirements node by private key mechanism
To be authorized.In the prior art, it needs every time to upload data to carry out the Authorized operation of data, Authorized operation is not square
Just.
It should be noted that information is only used for reinforcing the reason to the background of the disclosure disclosed in above-mentioned background technology part
Solution, therefore may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
A kind of data grant scheme for being designed to provide block catenary system of the disclosure, and then at least to a certain extent
Under the safety conditions for guaranteeing data grant, the convenience and high efficiency of data grant on block catenary system are effectively improved.
According to one aspect of the disclosure, a kind of data grant method of block catenary system, the block catenary system are provided
It saves node sub-network including data and saves the data that data save that node is connected in node sub-network with the data and award
Node is weighed, the data grant method is executed by the data grant node, and the data grant method includes:
When the data grant for receiving target data is requested, the target data is obtained from data grant request
Request code and the target data default publicity label;
Obtain the predetermined encryption key of the target data;
By the request code of the target data, the predetermined encryption key and the default publicity mark of the target data
Label, are packaged as authorization key according to default packing algorithm;
The authorization key is sent to the request of data side in data grant request institute source, so that the data
For requesting party after parsing the predetermined encryption key in the authorization key according to preset rules, decryption is stored in the data
Save the target data of node.
It is described when the data grant for receiving target data is requested in a kind of exemplary embodiment of the disclosure, institute
It states in data grant request and obtains the request code of the target data and the default publicity label of the target data, comprising:
It is requested using the data grant that the private key of authorizing information node decrypts the target data, obtains the target data
Request code and the target data default publicity label.
In a kind of exemplary embodiment of the disclosure, the predetermined encryption key for obtaining the target data, comprising:
From source database, the default publicity label of the target data is inquired;
When the default publicity label for inquiring the target data, obtains and closed with the default publicity label of the target data
Join the predetermined encryption key of storage.
It is described by the request code of the target data, the target data in a kind of exemplary embodiment of the disclosure
Predetermined encryption key and the default publicity label, be packaged as authorization key according to default packing algorithm, comprising:
Obtain the first block node code of the request of data side in data grant request institute source;
Obtain the second block node code of the data grant node;
By the first block node code, the second block node code, the request code of the target data, the target
The predetermined encryption key of data and the default publicity label carry out algorithm fitting, authorized key.
It is described by the first block node code, the second block section in a kind of exemplary embodiment of the disclosure
Point coding, the request code of the target data, the predetermined encryption key of the target data and the default publicity label carry out
Algorithm fitting, authorized key, comprising:
Function coefficients are set by the first block node code and the second block node code;
Function Solution is set by the request code of the target data and the default publicity label;
Functional value is set by the predetermined encryption key of the target data;
It carries out algorithm and is fitted authorized key.
In a kind of exemplary embodiment of the disclosure, described when the data grant for receiving target data is requested,
Before obtaining the request code of the target data and the default publicity label of the target data in data grant request,
The method also includes:
When detecting that target data uploads to the data and save node, default publicity mark is added for the target data
Label;
It is retrieved as target data predetermined encryption key set in advance;
The default publicity label and the predetermined encryption cipher key associated are stored.
In a kind of exemplary embodiment of the disclosure, described when the data grant for receiving target data is requested,
Before obtaining the request code of the target data and the default publicity label of the target data in data grant request,
The method also includes:
The request code of the target data and the default publicity label of the target data are utilized letter by request of data node
The public key encryption for ceasing authorization node obtains the data grant request of target data;
Data grant node is sent by the data grant request of the target data.
In a kind of exemplary embodiment of the disclosure, the data grant request is sent by the authorization key and is come
The request of data side in source, comprising:
After public key encryption of the authorization key using the request of data side in data grant request institute source,
It is sent to the request of data side in data grant request institute source.
In a kind of exemplary embodiment of the disclosure, the authorization key is being requested using the data grant
After the public key encryption of the request of data side in institute source, it is sent to after the request of data side in data grant request institute source,
Further include:
The authorization key of the public key encryption, authorized key are decrypted using request of data side's private key;
The predetermined encryption key is parsed according to preset rules from the authorization key.
In a kind of exemplary embodiment of the disclosure, the request of data side is from the authorization key according to default rule
Then parse the predetermined encryption key, comprising:
It triggers the parsing to the authorization key to operate, obtains analyzing the instruction input interface;
Input circle will be analyzed the instruction described in the request code of the target data and the default publicity label input
Face is simultaneously confirmed, the predetermined encryption key is obtained.
According to one aspect of the disclosure, a kind of data grant device of block catenary system is provided, which is characterized in that packet
It includes:
Receiving module, for being obtained from data grant request when the data grant for receiving target data is requested
Take the request code of the target data and the default publicity label of the target data;
Module is obtained, for obtaining the predetermined encryption key of the target data;
Packetization module, for by the predetermined encryption key of the request code of the target data, the target data and institute
Default publicity label is stated, is packaged as authorization key according to default packing algorithm;
Sending module, for sending the authorization key to the request of data side in data grant request institute source,
So that the request of data side after parsing the predetermined encryption key in the authorization key according to preset rules, is decrypted
It is stored in the target data that the data save node.
According to one aspect of the disclosure, a kind of computer readable storage medium is provided, block catenary system is stored thereon with
Data grant program, which is characterized in that the data grant program of the block catenary system is realized above-mentioned when being executed by processor
Described in any item methods.
According to one aspect of the disclosure, a kind of electronic equipment is provided characterized by comprising
Processor;And
Memory, the data grant program of the block catenary system for storing the processor;Wherein, the processor is matched
It is set to via the data grant program for executing the block catenary system and executes method described in any of the above embodiments.
A kind of data grant method and device of block catenary system of the disclosure.Firstly, when the data for receiving target data
When authorization requests, the request code of the target data and the default public affairs of the target data are obtained from data grant request
Indicating label;The default publicity label of the data issued in advance in data grant request by obtaining request of data side, can be with
Accurately find target data;And the request code of the unique target data as identifying code of request of data side's setting is obtained,
Data encryption can be carried out in the next steps.Then, the predetermined encryption key of the target data is obtained;By obtaining data
Authorized party carries out the predetermined encryption key of encryption setting to target data, may be implemented that encryption data is stored in block chain in advance
In, only to the convenient data grant of request of data side's transmission predetermined encryption key.Then, by the request code of the target data,
The predetermined encryption key of the target data and the default publicity label, are packaged as authorizing close according to default packing algorithm
Key;The safety to request of data side's transmission predetermined encryption key can be effectively ensured in this way, and then data grant is effectively ensured
Safety.Finally, the authorization key is sent to the request of data side in data grant request institute source, so that institute
Request of data side is stated after parsing the predetermined encryption key in the authorization key according to preset rules, decryption is stored in institute
State the target data that data save node;In this way can real enterprise encryption data is stored on block chain in advance, according to
Easily, safely transmission data key realizes data grant for user demand, effectively improves the efficiency of data grant.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and together with specification for explaining the principles of this disclosure.It should be evident that the accompanying drawings in the following description is only the disclosure
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.
Fig. 1 schematically shows the flow chart of a kind of data grant method of block catenary system.
Fig. 2 schematically shows the Application Scenarios-Example figure of a kind of data grant method of block catenary system.
Fig. 3 schematically shows a kind of packaging method flow chart of authorization key.
Fig. 4 schematically shows a kind of block diagram of the data grant device of block catenary system.
Fig. 5 schematically shows a kind of electronic equipment example frame of data grant method for realizing above-mentioned block catenary system
Figure.
Fig. 6 schematically shows a kind of computer-readable storage of data grant method for realizing above-mentioned block catenary system
Medium.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes
Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will more
Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.Described feature, knot
Structure or characteristic can be incorporated in any suitable manner in one or more embodiments.In the following description, it provides perhaps
More details fully understand embodiment of the present disclosure to provide.It will be appreciated, however, by one skilled in the art that can
It is omitted with technical solution of the disclosure one or more in the specific detail, or others side can be used
Method, constituent element, device, step etc..In other cases, be not shown in detail or describe known solution to avoid a presumptuous guest usurps the role of the host and
So that all aspects of this disclosure thicken.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Identical attached drawing mark in figure
Note indicates same or similar part, thus will omit repetition thereof.Some block diagrams shown in the drawings are function
Energy entity, not necessarily must be corresponding with physically or logically independent entity.These function can be realized using software form
Energy entity, or these functional entitys are realized in one or more hardware modules or integrated circuit, or at heterogeneous networks and/or place
These functional entitys are realized in reason device device and/or microcontroller device.
The data grant method of block catenary system is provided firstly in this example embodiment, wherein block catenary system packet
Data are included to save node sub-network and save the data grant section that data preservation node is connected in node sub-network with the data
Point, data grant method are executed by data grant node.The service that the data grant method of the block catenary system can be run on
Device can also run on server cluster or Cloud Server etc., and certainly, those skilled in the art can also be according to demand at other
Platform runs method of the invention, and particular determination is not done to this in the present exemplary embodiment.Refering to what is shown in Fig. 1, the block linkwork
The data grant method of system may comprise steps of:
Step S110 obtains institute from data grant request when the data grant for receiving target data is requested
State the request code of target data and the default publicity label of the target data;
Step S120 obtains the predetermined encryption key of the target data;
Step S130, by the request code of the target data, the predetermined encryption key of the target data and described pre-
If publicity label, authorization key is packaged as according to default packing algorithm;
Step S140 sends the authorization key to the request of data side in data grant request institute source, so that
The request of data side is obtained after parsing the predetermined encryption key in the authorization key according to preset rules, decryption saves
The target data of node is saved in the data.
In the data grant method of above-mentioned block catenary system.Firstly, firstly, when the data grant for receiving target data is asked
When asking, the request code of the target data and the default publicity mark of the target data are obtained from data grant request
Label;The default publicity label of the data issued in advance in data grant request by obtaining request of data side, can be accurate
Find target data;And the request code of the unique target data as identifying code of request of data side's setting is obtained, it can be with
Data encryption is carried out in the next steps.Then, the predetermined encryption key of the target data is obtained;By obtaining data grant
Side carries out the predetermined encryption key of encryption setting to target data, may be implemented that encryption data is stored in block chain in advance,
Only to the convenient data grant of request of data side's transmission predetermined encryption key.Then, by the request code of the target data, described
The predetermined encryption key of target data and the default publicity label, are packaged as authorization key according to default packing algorithm;This
The safety to request of data side's transmission predetermined encryption key can be effectively ensured in sample, and then the safety of data grant is effectively ensured
Property.Finally, the authorization key is sent to the request of data side in data grant request institute source, so that the data
For requesting party after parsing the predetermined encryption key in the authorization key according to preset rules, decryption is stored in the data
Save the target data of node;In this way can real enterprise encryption data is stored on block chain in advance, according to user's need
It asks and easily, safely transmits data key realization data grant, effectively improve the efficiency of data grant.
In the following, by conjunction with attached drawing to each step in the data grant method of block catenary system above-mentioned in this example embodiment
Suddenly detailed explanation and explanation are carried out.
In step s 110, it when the data grant for receiving target data is requested, is obtained from data grant request
Take the request code of the target data and the default publicity label of the target data.
In this exemplary embodiment, refering to what is shown in Fig. 2, the server 201 on block chain authorization node receives area
When the data grant request for the target data that the server 202 on the request of data node in block chain network is sent, awarded from data
Power request in obtain target data request code and target data default publicity label, then can in the next steps,
The predetermined encryption key for being stored in the target data that data save in node server 203 is obtained by server 201.Wherein, it takes
Business device 201, server 202 and server 203 can be any with execute program instructions, data storage function terminal, example
Such as mobile phone, computer, do not do particular determination herein.
Receive the data grant request for the target data that some request of data node on block catenary system is sent, the number
According to the default publicity label for the request code and target data for including at least target data in authorization requests.Wherein, target data is asked
Seeking code is unique request code of data requirements side's setting, and only request of data is known, can be used to add in the next steps
Close operation, target data request code can serve as unique password, guarantee that the request of request of data side only has data to ask to data
The side of asking is available, and the safety of request of data and the equity of data requesting party is effectively ensured.The default publicity mark of target data
The label for the effects of label are purport, the purposes for being used to characterize each data to the encryption data addition stored on block chain, can
To allow block Lian Shang related data party in request to carry out the inquiry of target data, the convenience of data query and accurate is effectively ensured
Property.In a kind of example, directly block chain network is written from application system by interface in target data, it is ensured that write-in block link network
The data of data and itself application system on network are consistent.
It is described when the data grant for receiving target data is requested in a kind of this exemplary embodiment, from described
The request code of the target data and the default publicity label of the target data are obtained in data grant request, comprising:
It is requested using the data grant that the private key of authorizing information node decrypts the target data, obtains the target data
Request code and the target data default publicity label.
The default publicity label of the request code of target data and target data is awarded using information by request of data node
The public key encryption for weighing node obtains the data grant request of target data, is subsequently sent to data grant node.Authorizing information section
The public key of point be it is well known on block chain, it is corresponding with the private key of authorizing information node.The public key of authorizing information node only has information
The private key of authorization node can be decrypted.It can guarantee the request privacy and safety of target data in this way.
In the step s 120, the predetermined encryption key of the target data is obtained.
In this exemplary embodiment, predetermined encryption key is pre-set close after being encrypted using data
Code can decrypt the application data of encryption with the predetermined encryption key.After various application data are encrypted in advance, from application system
Block chain network is written by interface, it is ensured that the data of data and itself application system in write-in block chain network keep one
It causes.And then the predetermined encryption key for only needing to obtain target data when carrying out data grant carries out password transmission, so that it may complete
At the authorization of data, the convenience of authorizing information is effectively ensured.
In a kind of originally exemplary embodiment, the predetermined encryption key for obtaining the target data, comprising:
From source database, the default publicity label of the target data is inquired;
When the default publicity label for inquiring the target data, obtains and closed with the default publicity label of the target data
Join the predetermined encryption key of storage.
Pass through the default publicity label of the inquiry target data, so that it may know whether is data that data requirements side needs
It is stored in data memory node, is recorded in data grant node.Then when the default publicity label for inquiring the target data,
The predetermined encryption key with the default publicity label associated storage of the target data is obtained, data requirements can be accurately obtained
The preset password of the target data just needed guarantees to obtain accuracy.
In step s 130, by the request code of the target data, the predetermined encryption key of the target data and institute
Default publicity label is stated, is packaged as authorization key according to default packing algorithm.
It is in this exemplary embodiment, the predetermined encryption of the request code of the target data, the target data is close
Key and the default publicity label are packaged as authorization key according to default packing algorithm, that is, utilize the target data
Request code, the target data predetermined encryption key and the default publicity label formed and only have data requirements side permissible
The authorization key of decryption obtains the predetermined encryption key of target data by decryption authorization key.The request code of target data is
The request code that request of data side is uniquely known, the predetermined encryption key of target data are for carrying out the close of target data decryption
Code, default publicity label accurately designation date requesting party can need the target data obtained.And then it can be according to default packing
Algorithm, such as take the request code for only having request of data to know as the algorithm packet of solution, that is, authorization key.Then, subsequent
In step, which is sent to request of data side, completes data by way of data encryptor decryption and authorization in this way
Orientation transmitting, guarantee the data-privacy of enterprise, while the safety of password transmission is effectively ensured, and then effectively improve data and award
The safety and convenience of power.
In a kind of this exemplary embodiment, refering to what is shown in Fig. 3, it is described by the request code of the target data, it is described
The predetermined encryption key of target data and the default publicity label, are packaged as authorization key according to default packing algorithm, packet
It includes:
Step S310 obtains the first block node code of the request of data side in data grant request institute source;
Step S320 obtains the second block node code of the data grant node;
Step S330, by the request of the first block node code, the second block node code, the target data
Code, the predetermined encryption key of the target data and the default publicity label carry out algorithm fitting, authorized key.
Block node code is exactly on block catenary system be the distribution of each node node code, such as Arabic numerals or
It should be code name etc..The the first block node code for requesting the request of data side in institute source by obtaining data grant;Data are obtained to award
The the second block node code for weighing node, can directly contact two nodes, because node code is unique;In this way when
When the data area that the application system of request of data side needs is very narrow, it is ensured that the direct transmitting of target data, in turn
Guarantee the safety stability of the application system of request of data side.Then by the first block node code, the second block node code, mesh
It marks the request code of data, the predetermined encryption key of target data and default publicity label and carries out algorithm fitting, available point
To the authorization key of point, only request of data side can be decrypted.
In a kind of this exemplary embodiment, it is described by the first block node code, the second block node code,
It is quasi- that the request code of the target data, the predetermined encryption key of the target data and the default publicity label carry out algorithm
It closes, authorized key, comprising:
Function coefficients are set by the first block node code and the second block node code;
Function Solution is set by the request code of the target data and the default publicity label;
Functional value is set by the predetermined encryption key of the target data;
It carries out algorithm and is fitted authorized key.
The rule that thus can use such as M=10X+100Y carries out algorithm fitting, wherein M is by the number of targets
According to predetermined encryption key be set as functional value;X is that the request code of target data is set as the solution of function first;Y is default publicity
Label is set as the solution of function second;Function coefficients 10 are the first block node code;Function coefficients 100 are the second block node code.
Only have the request code of input data requesting party setting and the label of the function of needs that can just be accurately obtained needs in this way
The predetermined encryption key of target data.The peace of cipher key delivery is effectively ensured in the point-to-point transmission that preset-key may be implemented in this way
Quan Xing, accuracy.
In step S140, it sends the authorization key to the request of data side in data grant request institute source,
So that the request of data side after parsing the predetermined encryption key in the authorization key according to preset rules, is decrypted
It is stored in the target data that the data save node.
In this exemplary embodiment, it sends authorization key to the request of data side in data grant request institute source,
Request of data side is receiving authorization key, so that it may which the encryption for parsing target data using preset rules on block chain is close
Key, then request of data side's application system can be called using relevant interface from the data storage node of block chain and obtain block
Data in chain network decrypt target data according to preset rules, the safely, conveniently authorization of data are realized, so that data is defeated
Side can reduce a large amount of manual operation with input side out, and ensure that consistency of the data in transmittance process.Wherein,
It is to be sent directly to count by data grant node by the request of data side that authorization key is sent to data grant request institute source
According on the corresponding request of data node of requesting party;Preset rules are the resolution rules being adapted with above-mentioned default packing algorithm, are
Known rule on the block catenary system, such as regulation are which kind of information etc. inputted in parsing password.Further, show in one kind
In example, sends authorization key to the request of data side in data grant request institute source, be also possible to through data grant node
It is broadcasted on block chain, to realize the request of data side for sending authorization key in data grant request institute source.
In a kind of originally exemplary embodiment, data grant request institute source is sent by the authorization key
Request of data side, comprising:
After public key encryption of the authorization key using the request of data side in data grant request institute source,
It is sent to the request of data side in data grant request institute source.
The public key of request of data side be it is well known on block chain, it is corresponding with the private key of request of data side, request of data side
Public key only has the private key of request of data side that can decrypt;The authorization key is requested into institute using the data grant in this way
After the public key encryption of the request of data side in source, it is sent to the request of data side in data grant request institute source, Ke Yibao
Demonstrate,prove the safety of authorization key transmission.
In a kind of this exemplary embodiment, by the authorization key using data grant request come
After the public key encryption of the request of data side in source, it is sent to after the request of data side in data grant request institute source, also wraps
It includes:
The authorization key of the public key encryption, authorized key are decrypted using request of data side's private key;
The predetermined encryption key is parsed according to preset rules from the authorization key.
The public key of request of data side be it is well known on block chain, it is corresponding with the private key of request of data side, request of data side
Public key only has the private key of request of data side that can decrypt, and can guarantee that authorization key only has request of data side to utilize private key solution in this way
It is obtained after close encrypted public key, then, so that it may which it is close according to preset rules to parse predetermined encryption from the authorization key
Key.
In a kind of originally exemplary embodiment, the request of data side is from the authorization key according to preset rules solution
The predetermined encryption key is precipitated, comprising:
It triggers the parsing to the authorization key to operate, obtains analyzing the instruction input interface;
Input circle will be analyzed the instruction described in the request code of the target data and the default publicity label input
Face is simultaneously confirmed, the predetermined encryption key is obtained.
By the triggering to operations such as the clicks for receiving authorization key, authorization key is parsed, automatic spring is used
In the interface for analyzing the instruction input, then inputting the request code of target data and the default publicity label can directly be solved
Predetermined encryption key is precipitated.
In a kind of originally exemplary embodiment, described when the data grant for receiving target data is requested, from institute
It states before obtaining the request code of the target data and the default publicity label of the target data in data grant request, it is described
Method further include:
When detecting that target data uploads to the data and save node, default publicity mark is added for the target data
Label;
It is retrieved as target data predetermined encryption key set in advance;
The default publicity label and the predetermined encryption cipher key associated are stored.
The default publicity label and the predetermined encryption cipher key associated are stored, it can be accurately according to request of data side
The labels of number of targets data carry out the verifying that whether there is of target data, simultaneously accurately obtain the predetermined encryption of target data
Key.
In a kind of originally exemplary embodiment, described when the data grant for receiving target data is requested, from institute
It states before obtaining the request code of the target data and the default publicity label of the target data in data grant request, it is described
Method further include:
The request code of the target data and the default publicity label of the target data are utilized letter by request of data node
The public key encryption for ceasing authorization node obtains the data grant request of target data;
Data grant node is sent by the data grant request of the target data.
The public key of authorizing information node is well known on block chain, authorizing information corresponding with the private key of authorizing information node
The public key of node only has the private key of authorizing information node that can decrypt.By the request code of target data and the default public affairs of target data
Indicating label utilize the public key encryption of authorizing information node, so that it may request the data grant obtained after public key encryption, be sent to
Data grant node, the private key decryption of excellent data grant node can guarantee the request privacy and safety of target data in this way
Property.
The disclosure additionally provides a kind of data grant device of block catenary system.Refering to what is shown in Fig. 4, the block catenary system
Data grant device may include receiving module 410, obtain module 420, packetization module 430 and sending module 440.Wherein:
Receiving module 410 can be used for asking when the data grant for receiving target data is requested from the data grant
Seek the default publicity label of the middle request code for obtaining the target data and the target data;
Obtaining module 420 can be used for obtaining the predetermined encryption key of the target data;
Packetization module 430 can be used for the predetermined encryption key of the request code of the target data, the target data
And the default publicity label, authorization key is packaged as according to default packing algorithm;
The data that sending module 440 can be used for sending the authorization key to data grant request institute source are asked
The side of asking, so that the request of data side parses the predetermined encryption key according to preset rules from the authorization key
Afterwards, decryption is stored in the target data that the data save node.
The detail of each module is in corresponding block catenary system in the data grant device of above-mentioned block catenary system
Data grant method in be described in detail, therefore details are not described herein again.
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description
Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more
Module or the feature and function of unit can embody in a module or unit.Conversely, an above-described mould
The feature and function of block or unit can be to be embodied by multiple modules or unit with further division.
In addition, although describing each step of method in the disclosure in the accompanying drawings with particular order, this does not really want
These steps must be executed in this particular order by asking or implying, or having to carry out step shown in whole could realize
Desired result.Additional or alternative, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/
Or a step is decomposed into execution of multiple steps etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure
The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server, mobile terminal or network equipment etc.) is executed according to disclosure embodiment
Method.
In an exemplary embodiment of the disclosure, a kind of electronic equipment that can be realized the above method is additionally provided.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or
Program product.Therefore, various aspects of the invention can be embodied in the following forms, it may be assumed that complete hardware embodiment, complete
The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here
Referred to as circuit, " module " or " system ".
The electronic equipment 500 of this embodiment according to the present invention is described referring to Fig. 5.The electronics that Fig. 5 is shown
Equipment 500 is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in figure 5, electronic equipment 500 is showed in the form of universal computing device.The component of electronic equipment 500 can wrap
It includes but is not limited to: at least one above-mentioned processing unit 510, at least one above-mentioned storage unit 520, the different system components of connection
The bus 530 of (including storage unit 520 and processing unit 510).
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 510
Row, so that various according to the present invention described in the execution of the processing unit 510 above-mentioned " illustrative methods " part of this specification
The step of illustrative embodiments.For example, the processing unit 510 can execute step S110 as shown in fig. 1: working as reception
To in block chain network destination node send target data acquisition request when, obtained from the target data acquisition request
Target data information;S120: source data in enterprise resource planning is carried out according to the target data information and is adapted to, is obtained pre-
Data are written;Step S130: judge in the pre-write data with the presence or absence of predetermined right data;Step S140: when described pre-
It is written in data there is no when predetermined right data, the target in the block chain network is written into the pre-write data
Node.
Storage unit 520 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit
(RAM) 5201 and/or cache memory unit 5202, it can further include read-only memory unit (ROM) 5203.
Storage unit 520 can also include program/utility with one group of (at least one) program module 5205
5204, such program module 5205 includes but is not limited to: operating system, one or more application program, other program moulds
It may include the realization of network environment in block and program data, each of these examples or certain combination.
Bus 530 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage
Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures
Local bus.
Electronic equipment 500 can also be with one or more external equipments 700 (such as keyboard, sensing equipment, bluetooth equipment
Deng) communication, the equipment that also client can be enabled interact with the electronic equipment 500 with one or more communicates, and/or with make
Any equipment (such as the router, modulation /demodulation that the electronic equipment 500 can be communicated with one or more of the other calculating equipment
Device etc.) communication.This communication can be carried out by input/output (I/O) interface 550.Also, electronic equipment 500 can be with
By network adapter 560 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network,
Such as internet) communication.As shown, network adapter 560 is communicated by bus 530 with other modules of electronic equipment 500.
It should be understood that although not shown in the drawings, other hardware and/or software module can not used in conjunction with electronic equipment 500, including but not
Be limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and
Data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure
The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment
Method.
In an exemplary embodiment of the disclosure, a kind of computer readable storage medium is additionally provided, energy is stored thereon with
Enough realize the program product of this specification above method.In some possible embodiments, various aspects of the invention may be used also
In the form of being embodied as a kind of program product comprising program code, when described program product is run on the terminal device, institute
Program code is stated for executing the terminal device described in above-mentioned " illustrative methods " part of this specification according to this hair
The step of bright various illustrative embodiments.
Refering to what is shown in Fig. 6, describing the program product for realizing the above method of embodiment according to the present invention
600, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device,
Such as it is run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with
To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or
It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or
System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only
Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory
(CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal,
Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing
Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its
The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have
Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in client
It calculates and executes in equipment, partly executes on the client device, being executed as an independent software package, partially in client's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network
(WAN), it is connected to client computing device, or, it may be connected to external computing device (such as utilize ISP
To be connected by internet).
In addition, above-mentioned attached drawing is only the schematic theory of processing included by method according to an exemplary embodiment of the present invention
It is bright, rather than limit purpose.It can be readily appreciated that the time that above-mentioned processing shown in the drawings did not indicated or limited these processing is suitable
Sequence.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure
His embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Adaptive change follow the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure or
Conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by claim
It points out.
Claims (10)
1. a kind of data grant method of block catenary system, which is characterized in that the block catenary system includes that data save node
Sub-network and the data grant node being connected with data preservation node in data preservation node sub-network, the data are awarded
Power method is executed by the data grant node, and the data grant method includes:
When the data grant for receiving target data is requested, asking for the target data is obtained from data grant request
Seek the default publicity label of code and the target data;
Obtain the predetermined encryption key of the target data;
By the request code of the target data, the predetermined encryption key and the default publicity label of the target data, press
Authorization key is packaged as according to default packing algorithm;
The authorization key is sent to the request of data side in data grant request institute source, so that the request of data
After parsing the predetermined encryption key in the authorization key according to preset rules, decryption is stored in the data and saves for side
The target data of node.
2. the method according to claim 1, wherein the predetermined encryption key for obtaining the target data,
Include:
From source database, the default publicity label of the target data is inquired;
When the default publicity label for inquiring the target data, acquisition is associated with the default publicity label of the target data is deposited
The predetermined encryption key of storage.
3. the method according to claim 1, wherein described by the request code of the target data, the target
The predetermined encryption key of data and the default publicity label, are packaged as authorization key according to default packing algorithm, comprising:
Obtain the first block node code of the request of data side in data grant request institute source;
Obtain the second block node code of the data grant node;
By the first block node code, the second block node code, the request code of the target data, the target data
Predetermined encryption key and the default publicity label carry out algorithm fitting, authorized key.
4. according to the method described in claim 3, it is characterized in that, described by the first block node code, secondth area
Block node code, the request code of the target data, the target data predetermined encryption key and the default publicity label
Carry out algorithm fitting, authorized key, comprising:
Function coefficients are set by the first block node code and the second block node code;
Function Solution is set by the request code of the target data and the default publicity label;
Functional value is set by the predetermined encryption key of the target data;
It carries out algorithm and is fitted authorized key.
5. the method according to claim 1, wherein described when the data grant request for receiving target data
When, from the data grant request in obtain the target data request code and the target data default publicity label it
Before, the method also includes:
When detecting that target data uploads to the data and save node, default publicity label is added for the target data;
It is retrieved as target data predetermined encryption key set in advance;
The default publicity label and the predetermined encryption cipher key associated are stored.
6. the method according to claim 1, wherein described when the data grant request for receiving target data
When, from the data grant request in obtain the target data request code and the target data default publicity label it
Before, the method also includes:
Request of data node awards the default publicity label of the request code of the target data and the target data using information
The public key encryption for weighing node obtains the data grant request of target data;
Data grant node is sent by the data grant request of the target data.
7. the method according to claim 1, wherein the request of data side is from the authorization key according to pre-
If rule parsing goes out the predetermined encryption key, comprising:
It triggers the parsing to the authorization key to operate, obtains analyzing the instruction input interface;
Input interface will be analyzed the instruction simultaneously described in the request code of the target data and the default publicity label input
Confirmed, obtains the predetermined encryption key.
8. a kind of data grant device of block catenary system characterized by comprising
Receiving module, for obtaining institute from data grant request when the data grant for receiving target data is requested
State the request code of target data and the default publicity label of the target data;
Module is obtained, for obtaining the predetermined encryption key of the target data;
Packetization module, for by the predetermined encryption key of the request code of the target data, the target data and described pre-
If publicity label, authorization key is packaged as according to default packing algorithm;
Sending module, for sending the authorization key to the request of data side in data grant request institute source, so that
The request of data side is obtained after parsing the predetermined encryption key in the authorization key according to preset rules, decryption saves
The target data of node is saved in the data.
9. a kind of computer readable storage medium is stored thereon with the data grant program of block catenary system, which is characterized in that institute
It states and realizes claim 1-7 described in any item methods when the data grant program of block catenary system is executed by processor.
10. a kind of electronic equipment characterized by comprising
Processor;And
Memory, the data grant program of the block catenary system for storing the processor;Wherein, the processor is configured to
Carry out perform claim via the data grant program for executing the block catenary system and requires the described in any item methods of 1-7.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910434980.9A CN110321732A (en) | 2019-05-23 | 2019-05-23 | Data grant method, apparatus, storage medium and the electronic equipment of block catenary system |
PCT/CN2019/120665 WO2020233049A1 (en) | 2019-05-23 | 2019-11-25 | Data authorization method and apparatus of blockchain system, storage medium, and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910434980.9A CN110321732A (en) | 2019-05-23 | 2019-05-23 | Data grant method, apparatus, storage medium and the electronic equipment of block catenary system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110321732A true CN110321732A (en) | 2019-10-11 |
Family
ID=68118830
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910434980.9A Pending CN110321732A (en) | 2019-05-23 | 2019-05-23 | Data grant method, apparatus, storage medium and the electronic equipment of block catenary system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110321732A (en) |
WO (1) | WO2020233049A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020233049A1 (en) * | 2019-05-23 | 2020-11-26 | 深圳壹账通智能科技有限公司 | Data authorization method and apparatus of blockchain system, storage medium, and electronic device |
CN112651049A (en) * | 2021-01-04 | 2021-04-13 | 上海尚象信息科技有限公司 | Privacy data sharing method and system based on block chain |
CN112699391A (en) * | 2020-12-31 | 2021-04-23 | 青岛海尔科技有限公司 | Target data sending method and privacy computing platform |
CN112908442A (en) * | 2021-03-05 | 2021-06-04 | 京东数科海益信息科技有限公司 | Medical data sharing method, device, equipment and computer readable medium |
CN113468600A (en) * | 2021-06-30 | 2021-10-01 | 建信金融科技有限责任公司 | Data authorization method, device and equipment |
CN114500006A (en) * | 2022-01-05 | 2022-05-13 | 支付宝(杭州)信息技术有限公司 | Query request processing method and device |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114629901B (en) * | 2020-12-14 | 2024-08-20 | 北京金山云网络技术有限公司 | BaaS-based data sharing method, baaS-based device and BaaS-based equipment on blockchain |
CN112487469A (en) * | 2020-12-24 | 2021-03-12 | 杭州莱森科技有限责任公司 | Scientific research platform system with loss prevention function |
CN113742539B (en) * | 2021-08-18 | 2024-07-12 | 杭州网易云音乐科技有限公司 | Work authorization method, device, medium and computing equipment |
CN116910826B (en) * | 2023-09-13 | 2023-12-15 | 电能易购(北京)科技有限公司 | Purchasing data storage and sharing system for electric power equipment bidding |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108322451A (en) * | 2018-01-12 | 2018-07-24 | 深圳壹账通智能科技有限公司 | Data processing method, device, computer equipment and storage medium |
CN108632284A (en) * | 2018-05-10 | 2018-10-09 | 网易(杭州)网络有限公司 | User data authorization method, medium, device and computing device based on block chain |
KR20190000578A (en) * | 2017-06-23 | 2019-01-03 | 홍석현 | Method for keeping security of data in public distributed database based on blockchain, and server for managing blockchain using the same |
CN109214197A (en) * | 2018-08-14 | 2019-01-15 | 上海点融信息科技有限责任公司 | The method, apparatus and storage medium of private data are handled based on block chain |
US20190074968A1 (en) * | 2017-09-06 | 2019-03-07 | Alibaba Group Holding Limited | Method, apparatus and system for data encryption and decryption |
CN109660485A (en) * | 2017-10-10 | 2019-04-19 | 中兴通讯股份有限公司 | A kind of authority control method and system based on the transaction of block chain |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10050968B2 (en) * | 2014-12-31 | 2018-08-14 | Shenzhen University | Method, apparatus, and system for access control of shared data |
CN106919850B (en) * | 2015-12-25 | 2020-09-04 | 腾讯科技(深圳)有限公司 | File encryption and decryption method and device |
AU2018339067A1 (en) * | 2017-09-28 | 2020-04-09 | Algorand, Inc. | Message-credentialed blockchains |
CN110321732A (en) * | 2019-05-23 | 2019-10-11 | 深圳壹账通智能科技有限公司 | Data grant method, apparatus, storage medium and the electronic equipment of block catenary system |
-
2019
- 2019-05-23 CN CN201910434980.9A patent/CN110321732A/en active Pending
- 2019-11-25 WO PCT/CN2019/120665 patent/WO2020233049A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190000578A (en) * | 2017-06-23 | 2019-01-03 | 홍석현 | Method for keeping security of data in public distributed database based on blockchain, and server for managing blockchain using the same |
US20190074968A1 (en) * | 2017-09-06 | 2019-03-07 | Alibaba Group Holding Limited | Method, apparatus and system for data encryption and decryption |
CN109660485A (en) * | 2017-10-10 | 2019-04-19 | 中兴通讯股份有限公司 | A kind of authority control method and system based on the transaction of block chain |
CN108322451A (en) * | 2018-01-12 | 2018-07-24 | 深圳壹账通智能科技有限公司 | Data processing method, device, computer equipment and storage medium |
CN108632284A (en) * | 2018-05-10 | 2018-10-09 | 网易(杭州)网络有限公司 | User data authorization method, medium, device and computing device based on block chain |
CN109214197A (en) * | 2018-08-14 | 2019-01-15 | 上海点融信息科技有限责任公司 | The method, apparatus and storage medium of private data are handled based on block chain |
Non-Patent Citations (1)
Title |
---|
徐健;陈志德;龚平;王可可;: "基于区块链网络的医疗记录安全储存访问方案", 计算机应用, no. 05, 21 January 2019 (2019-01-21) * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020233049A1 (en) * | 2019-05-23 | 2020-11-26 | 深圳壹账通智能科技有限公司 | Data authorization method and apparatus of blockchain system, storage medium, and electronic device |
CN112699391A (en) * | 2020-12-31 | 2021-04-23 | 青岛海尔科技有限公司 | Target data sending method and privacy computing platform |
CN112699391B (en) * | 2020-12-31 | 2023-06-06 | 青岛海尔科技有限公司 | Target data sending method and privacy computing platform |
CN112651049A (en) * | 2021-01-04 | 2021-04-13 | 上海尚象信息科技有限公司 | Privacy data sharing method and system based on block chain |
CN112908442A (en) * | 2021-03-05 | 2021-06-04 | 京东数科海益信息科技有限公司 | Medical data sharing method, device, equipment and computer readable medium |
CN113468600A (en) * | 2021-06-30 | 2021-10-01 | 建信金融科技有限责任公司 | Data authorization method, device and equipment |
CN114500006A (en) * | 2022-01-05 | 2022-05-13 | 支付宝(杭州)信息技术有限公司 | Query request processing method and device |
CN114500006B (en) * | 2022-01-05 | 2023-08-04 | 支付宝(杭州)信息技术有限公司 | Query request processing method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2020233049A1 (en) | 2020-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110321732A (en) | Data grant method, apparatus, storage medium and the electronic equipment of block catenary system | |
US8484480B2 (en) | Transmitting information using virtual input layout | |
CN109194673A (en) | Authentication method, system, equipment and storage medium based on authorized user message | |
CN109891424A (en) | Establishing a link between identifiers without revealing specific identification information | |
CN109150499A (en) | Method, apparatus, computer equipment and the storage medium of dynamic encryption data | |
CN109670803A (en) | Method, apparatus, medium and the electronic equipment tested before online trading | |
CN110460563A (en) | Data encryption, decryption method and device, system, readable medium and electronic equipment | |
CN111199037B (en) | Login method, system and device | |
CN108923925B (en) | Data storage method and device applied to block chain | |
CN105635320A (en) | Method and equipment for calling configuration information | |
CN112749412A (en) | Method, system, equipment and storage medium for processing passenger identity information | |
CN110602085B (en) | Method and device for sharing and processing data on block chain, storage medium and electronic equipment | |
CN112329044A (en) | Information acquisition method and device, electronic equipment and computer readable medium | |
CN111865897A (en) | Cloud service management method and device | |
CN110022207A (en) | Key management and the method and apparatus for handling data | |
CN109325360B (en) | Information management method and device | |
KR102535322B1 (en) | System for providing privacy protection service and method thereof | |
CN113886870A (en) | Data processing method, device, equipment and storage medium | |
CN109951294A (en) | Information update management method and relevant device in electronic labelling system | |
CN109495468A (en) | Authentication method, device, electronic equipment and storage medium | |
CN113129008A (en) | Data processing method and device, computer readable medium and electronic equipment | |
CN116996408A (en) | Data transmission monitoring method and device, electronic equipment and storage medium | |
CN112579998B (en) | Webpage access method, management system and electronic equipment in information interaction platform | |
US20230052300A1 (en) | Methods and systems for data processing, and storage medium | |
CN109254965A (en) | Model treatment method and system, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
CB02 | Change of applicant information |
Address after: 201, room 518000, building A, No. 1, front Bay Road, Qianhai Shenzhen Guangdong Shenzhen Hong Kong cooperation zone (Qianhai business secretary) Applicant after: Shenzhen one ledger Intelligent Technology Co., Ltd. Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A Applicant before: Shenzhen one ledger Intelligent Technology Co., Ltd. |
|
CB02 | Change of applicant information | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |