[go: up one dir, main page]

CN111475826A - Private data yielding method and device based on block chain technology - Google Patents

Private data yielding method and device based on block chain technology Download PDF

Info

Publication number
CN111475826A
CN111475826A CN202010376380.4A CN202010376380A CN111475826A CN 111475826 A CN111475826 A CN 111475826A CN 202010376380 A CN202010376380 A CN 202010376380A CN 111475826 A CN111475826 A CN 111475826A
Authority
CN
China
Prior art keywords
data
private data
area
request
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010376380.4A
Other languages
Chinese (zh)
Other versions
CN111475826B (en
Inventor
吴烽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fengshun Science And Technology Information Service Co ltd
Original Assignee
Hangzhou Fengshun Science And Technology Information Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fengshun Science And Technology Information Service Co ltd filed Critical Hangzhou Fengshun Science And Technology Information Service Co ltd
Priority to CN202010376380.4A priority Critical patent/CN111475826B/en
Publication of CN111475826A publication Critical patent/CN111475826A/en
Application granted granted Critical
Publication of CN111475826B publication Critical patent/CN111475826B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a privacy data giving method and a device based on a block chain technology, which are applied among a member A, a member B and other members in a block chain organization, and the method comprises the following steps: the member B sends a yielding request of the private data to the member A through the block chain public area; the member B receives reply information of the yielding request from the member A; the member B verifies the reply information and takes out the encrypted private data from the temporary data area; the member B stores the acquired encrypted private data to a block chain data isolation area of the member B and decrypts the encrypted private data; corresponding apparatus is also disclosed. According to the invention, under a block chain data security mechanism, a whole-process yielding process of private data among block chain members is completed; the operation flow of giving away the private data is not additionally increased, but credible and reliable private data transfer based on the block chain is realized, and the transaction safety and convenience are greatly improved.

Description

Private data yielding method and device based on block chain technology
Technical Field
The invention relates to the technical field of block chains, in particular to a private data yielding method and device based on a block chain technology.
Background
With the popularization of blockchain technology, in a private chain or a federation chain of a plurality of organizations in a blockchain, more and more attention is paid to the protection of member organization private data. Different mechanisms are adopted for protecting the privacy data by different blockchain platforms, wherein the channel isolation technology is universal and can be used for protecting the privacy technology, and the privacy zone mechanism of the super ledger provides privacy protection for the members more conveniently.
How to transfer private data paid or unpaid security to other organization members in a alliance chain, there are two common practices in the application field at present:
the first method is that a data owner acquires private data from a block chain isolation area through an upper application platform and then the private data is transferred to other organization members by the upper application platform. Although the scheme can send the private data to the designated member in a single point, the private data is separated from the block chain data security protection, so that the private data is easily attacked by a public network, and the risk of data leakage caused by misoperation of a central database operator is introduced. If private data is unicast through a dedicated network, the protection of the block chain for the data is lost, and a high maintenance cost of the dedicated network is also incurred.
The second is to put the private data into the ledger public area of the blockchain, but set the threshold for reading or writing by the smart contract. According to the scheme, the intelligent contract is used as a 'pipeline' for reading the private data, the read-write permission of the private data in the public ledger area is protected, and the read-write permission can be broken through by purposeful attacks. Because the private data is already in the public area of the account book, each organization member already has a storage backup of the private data, and although the 'pipeline' for reading the private data is blocked, the 'pipeline' can be repaired by deploying a new targeted intelligent contract, so that the private data can be read.
Disclosure of Invention
The invention provides a private data yielding method and device based on a block chain technology to solve the technical problem.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
according to a first aspect of the embodiments of the present invention, there is provided a private data exporting method based on a blockchain technology, applied between a member a and a member B in a blockchain organization and in a public area, including the following steps:
101, a member B sends a yielding request of private data to a member A through a public area of a block chain, wherein the private data are stored in a block chain data isolation area of the member A;
102, receiving reply information of a request for giving a permission from a member A by a member B, wherein the reply information comprises address information of a temporary data area, the temporary data area is created in a public area of a block chain by the member A through an intelligent contract to store encrypted private data, the encrypted private data is generated by encrypting the private data after the member A receives the request for giving the permission, and a unique readable member in the temporary data area is set as the member B;
step 103, the member B verifies the reply information and takes out the encrypted private data from the temporary data area;
and 104, storing the obtained encrypted private data to the blockchain data isolation area of the member B by the member B, and decrypting the encrypted private data.
Preferably, the member a is provided with an a mailbox for receiving the private data giving request, the member B is provided with a B mailbox for receiving reply information to the private data giving request, and the a mailbox and the B mailbox are respectively provided with at least one mailbox.
Preferably, in step 101, the privacy data request sent by the member B to the member a contains a public key of the member B; in step 102, the member A encrypts the private data by using the public key of the member B to generate encrypted private data; in step 104, the member B decrypts the encrypted private data with the private key corresponding to the public key in the request by using the private data.
Preferably, the encryption method of the private data by the member A is asymmetric encryption.
Preferably, the member B destroys the temporary data area after taking out the encrypted private data from the temporary data area.
According to a second aspect of the embodiments of the present invention, there is provided a private data exporting apparatus based on a blockchain technique, applied between a member a and a member B in a blockchain organization and in a public area, including:
the system comprises a yielding request unit, a block chain public area and a block chain data isolation area, wherein the yielding request unit is used for sending a yielding request of private data to a member A by a member B through the block chain public area, and the private data are stored in the block chain data isolation area of the member A;
the reply receiving unit is used for receiving reply information of the member A to the yielding request by the member B, the reply information comprises address information of a temporary data area, the temporary data area is created in a block chain public area by the member A through an intelligent contract to store encrypted privacy data, the encrypted privacy data is generated by encrypting the privacy data after the member A receives the yielding request, and a unique readable member in the temporary data area is set as the member B;
a data retrieving unit for the member B to verify the reply information, retrieving the encrypted private data from the temporary data area;
and the data decryption unit is used for storing the acquired encrypted private data into the blockchain data isolation area of the member B by the member B and decrypting the encrypted private data.
Preferably, in the yielding request unit, the private data yielding request sent by the member B to the member a contains a public key of the member B; in the reply receiving unit, the member A encrypts the private data by using the public key of the member B to generate encrypted private data; in the data decryption unit, the member B uses the private key corresponding to the public key in the private data issuing request to decrypt the encrypted private data.
Preferably, in the data retrieving unit, the temporary data area is destroyed after the member B retrieves the encrypted private data from the temporary data area.
Preferably, in the reply receiving unit, the encryption method of the private data by the member a is asymmetric encryption.
Preferably, the member a is provided with an a mailbox for receiving the private data giving request, the member B is provided with a B mailbox for receiving reply information to the private data giving request, and the a mailbox and the B mailbox are respectively provided with at least one mailbox.
Compared with the prior art, the method and the system complete the whole yielding process of the private data among the members of the block chain under the block chain data security mechanism; under the block chain isolation storage technology, the plain text storage, encryption and decryption of private data are realized; the 'survival timeliness' is strictly controlled corresponding to the encrypted private data, and a strategy of destroying the private data after use is adopted, so that the data security is further improved; the operation flow of giving away the private data is not additionally increased, but credible and reliable private data transfer based on the block chain is realized, and the transaction safety and convenience are greatly improved.
Drawings
FIG. 1 is a flow chart of a method for deriving and giving private data based on blockchain technology according to the present invention;
fig. 2 is a block diagram of a private data exporting apparatus based on the blockchain technique according to the present invention.
In the figure, 201-a yielding request unit, 202-a reply receiving unit, 203-a data fetching unit, 204-a data decryption unit.
Detailed Description
The present invention will be described in detail below with reference to specific embodiments shown in the drawings. These embodiments are not intended to limit the present invention, and structural, methodological, or functional changes made by those skilled in the art according to these embodiments are included in the scope of the present invention.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
The privacy data yielding method based on the blockchain technology is applied among a data yielding party member A, a data requesting party member B and other members in a blockchain organization, and is mainly used for transferring data from the blockchain organization member A to the organization member B. The corresponding blockchain data structure will be briefly described below.
Data privacy zone for member a: the member A has a block chain storage channel independently, and is used for storing the privacy data of the member A, and the block chain storage channel can be realized through a channel isolation technology commonly used by each block chain platform, and also can be other storage isolation technologies supported by the platform, such as a privacy area of a super account book, and the privacy area represents a storage unit of an isolation mechanism.
Data privacy zone for member B: and the member B independently has a block chain storage channel for storing the privacy data of the member B. In the invention, the member B is a data request party, and the privacy data obtained after the request is stored in the data privacy area of the member B.
The creation and application of the above two data privacy zones is not dependent on a specific blockchain isolation technique.
A public area: and the member A, the member B and other members have equal data reading permission. The member A is provided with a mail box A for receiving the privacy data giving request, the member B is provided with a mail box B for receiving reply information of the privacy data giving request, and the mail box A and the mail box B are respectively provided with at least one mail cabinet. The public mailbox is a storage unit with public address opened in a public account book area by members through intelligent contracts. The intelligent contract supports that each member opens a mailbox in a public area, and after the mailbox is opened, other members are informed that private data access requests or access reply responses can be generated to the members by using the mailbox. Each member of the blockchain can send a request letter to the mailbox, but the intelligent dating controls the reading authority, namely, the content of the mailbox can be read only by carrying the mailbox to open an access authenticated by a member certificate. The mailbox address opened by each member is represented by a block chain identifier + mailbox identifier + member identifier, such as blc003. box.a. The mailbox can be attacked in a targeted mode, but the mailbox only loads the data access request and does not load the privacy data, so that the attack value does not exist in a use case scene, and even if the mailbox is attacked in a targeted mode, the tamperproof function of the block chain can leave enough evidence for an attacker.
The public mailbox is provided with a plurality of usable letter cabinets, the number of the letter cabinets is set when the members are opened, and the letter cabinets are arranged in sequence according to the numbers. The cabinet has two states, empty or loaded. The vacant letter cabinet is used for receiving a request for acquiring appointed privacy data sent by the coalition members, and the letter cabinet is set to be in a loading state after receiving the request; the "loaded" letter cabinet waits for the "master" to read, and once the letter cabinet "letter" (request) is read, the letter cabinet is set to the "empty" state by the intelligent contract. The mailbox implementation mechanism can be a design mode based on K-V storage, and can also adopt a queue or other methods.
The A mailbox (Box.A) is the public mailbox of member A and the B mailbox (Box.B) is the public mailbox of member B. The letter cabinet serial numbers can be set in sequence as follows: box.a.1, namely the letter cabinet with the letter box serial number of 1 of the member a. The mailbox access work adopts a block K-V key value mode, data is released to the mailbox, namely request data is released to an address of K = blc003.box.a through an intelligent contract interface, the mailbox is automatically managed through intelligent contract, an empty mailbox is selected to store a request, the status of the mailbox is replaced, and a member waits to read the request. The member can obtain all unread letters in the mailbox at one time through the intelligent contract interface.
As shown in fig. 1, a private data export method based on the blockchain technology is applied between a member a and a member B in a blockchain organization and in a public area, and specifically includes the following steps:
step 101, a member B sends a yielding request of private data to a member a through a blockchain public area, and the private data is stored in a blockchain data isolation area of the member a.
And the member A stores the valuable privacy data dataA into the block chain data isolation area of the member A, so that privacy protection is realized. For private data willing to give a give-off, a will inform other members through the blockchain application platform.
And the member B sends a data transfer request to the mailbox disclosed by the member A to obtain the privacy data of the member A. The privacy data giving-out request sent by the member B to the member A contains a public key of the member B.
The private data yielding request may be made through the following request protocol: { "mem _ id": ORG.B "," id _ info ": unit: blockchain science, contacts: zhang three, telephone: 12345678 "," event ": dataApply", "for _ data": dataA "," pubkey ": MIGFMA0GCSqGSI …".
Wherein, mem _ id is the member id of the applicant in the block chain, i.e. the id of the member B; id _ info is a detailed description of the applicant member; event is event type, and the example is the request of private data; the for _ data is a unique identifier of the requested private data; pubkey is a public key provided by the requestor for encrypting data.
102, receiving reply information of the member A to the yielding request by the member B, wherein the reply information comprises address information of a temporary data area, the temporary data area is created in a public area of a block chain by the member A through an intelligent contract to store encrypted private data, the encrypted private data is generated by the member A receiving the yielding request and encrypting the private data, and a unique readable member in the temporary data area is set as the member B.
The member A acquires a yielding request for the private data, which is sent to the A mailbox by the member B, through the intelligent contract. The intelligent contract carries the signature of the member A and the necessary transfer parameters, finds the requested privacy data in the data privacy area of the member A, and encrypts the privacy data dataA by using the public key of the member B to generate encrypted privacy data encrypt. The encryption process is performed within the privacy zone. Here, the encryption method of the member a on the private data may be asymmetric encryption.
Encrypted privacy data encrypt.
The temporary data area (tmp.a) is a temporary data storage area created for member a, and the read authority of the temporary data area may be set to member B. The data temporary storage area stores the privacy data encrypted by the public key of the data transfer request member (the public key of the requester carried by the data request command). And controlled by an intelligent contract, waiting for the data to be sent out and leading the requesting member to read the encrypted private data. The data temporary storage area has 'survival timeliness' and 'takeout'. The longest life cycle is specified during establishment of the 'survival timeliness', namely, the life time intercept point is reached, the intelligent contract destroys the temporary region data, and the function prevents the encrypted private data from being exposed in the public ledger region for a long time. "retrievability" means that the data is destroyed by the intelligent contract once it is read by the requesting member.
After the intelligent contract carries the member A to sign and create a temporary data area and stores encrypted private data encrypt.
The reply information may be in the format of { "mem _ id" "ORG.A", "id _ info" "Unit: blockchain service, contact: Liqu, Phone: 9876544", "event" "answerDataApply", "for _ data" "encrypt.DataA", "data _ path" "," UODJFDSK93JF L FDS L "," encrypt _ type "", "ECSDA", "encrypt _ pubkey" "MIGFMA 0GCSqGSI …", "cut _ off _ time" "2020/4/8/12: 56" }.
Wherein, mem _ id is the member id of the responder; the event is an event type, and the example is a request for answering the private data giving permission; id _ info is details of the members of the application party; the for _ data is a unique identifier of the target data of the transfer; the data _ path is a path of the target data; encrypting _ type is an encryption mode of target data; encrypting _ pubkey is a target data encryption public key; cut _ off _ time is the expiration time of the target data validity period.
And after the reply message reaches the B mailbox, the member B takes out the reply message from the B mailbox.
In step 103, the member B verifies the reply message and retrieves the encrypted private data from the temporary data area.
And after verifying the reply information, the member B takes the encrypted privacy data encrypt. And after the member B takes out the encrypted private data from the temporary data area, destroying the temporary data area.
And 104, storing the obtained encrypted private data to the blockchain data isolation area of the member B by the member B, and decrypting the encrypted private data.
Here, the member B decrypts the encrypted private data with the private key corresponding to the public key in the request using the private data.
Corresponding to the embodiment of the private data export method based on the blockchain technology, the invention also provides an embodiment of a private data export device based on the blockchain technology.
As shown in fig. 2, a privacy data exporting apparatus based on the blockchain technique, applied between a member a, a member B and other members in a blockchain organization, includes:
a yielding request unit 201, configured to send a yielding request of private data to the member a through a blockchain public area, where the private data is stored in a blockchain data isolation area of the member a;
a reply receiving unit 202, configured to receive reply information from the member a to the logout request by the member B, where the reply information includes address information of a temporary data area, the temporary data area is created in a block chain public area by the member a through an intelligent contract to store encrypted private data, the encrypted private data is generated by encrypting the private data after the member a receives the logout request, and a unique readable member in the temporary data area is set as the member B;
a data retrieving unit 203 for the member B to verify the reply information, retrieving the encrypted private data from the temporary data area;
and the data decryption unit 204 is configured to store the acquired encrypted private data in the blockchain data isolation area of the member B by the member B, and decrypt the encrypted private data.
In the yielding request unit 201, the private data yielding request sent by the member B to the member a contains a public key of the member B; in the reply receiving unit 202, the member a encrypts the private data by using the public key of the member B to generate encrypted private data, wherein the encryption method of the member a on the private data is asymmetric encryption; in the data extraction unit 203, after the member B extracts the encrypted private data from the temporary data area, the temporary data area is destroyed; in the data decryption unit 204, the member B uses the private data to make the private key corresponding to the public key in the request decrypt the encrypted private data.
Here, the member a is provided with an a mailbox for receiving a request for giving out privacy data, the member B is provided with a B mailbox for receiving reply information to the request for giving out privacy data, and the a mailbox and the B mailbox are respectively provided with at least one mailbox.
With regard to the apparatus in the above-described embodiment, the specific manner in which each unit performs the operation has been described in detail in the embodiment related to the method, and will not be described in detail here.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present disclosure. One of ordinary skill in the art can understand and implement it without inventive effort.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. A privacy data export method based on a block chain technology is applied among a member A, a member B and other members in a block chain organization, and comprises the following steps:
101, a member B sends a yielding request of private data to a member A through a public area of a block chain, wherein the private data are stored in a block chain data isolation area of the member A;
102, receiving reply information of a request for giving a permission from a member A by a member B, wherein the reply information comprises address information of a temporary data area, the temporary data area is created in a public area of a block chain by the member A through an intelligent contract to store encrypted private data, the encrypted private data is generated by encrypting the private data after the member A receives the request for giving the permission, and a unique readable member in the temporary data area is set as the member B;
step 103, the member B verifies the reply information and takes out the encrypted private data from the temporary data area;
and 104, storing the obtained encrypted private data to the blockchain data isolation area of the member B by the member B, and decrypting the encrypted private data.
2. The method as claimed in claim 1, wherein the member a is provided with an a mailbox for receiving the private data request, the member B is provided with a B mailbox for receiving a reply message to the private data request, and the a mailbox and the B mailbox are respectively provided with at least one mailbox.
3. The method according to claim 1, wherein in step 101, the privacy data yielding request sent by member B to member A contains member B public key; in step 102, the member A encrypts the private data by using the public key of the member B to generate encrypted private data; in step 104, the member B decrypts the encrypted private data with the private key corresponding to the public key in the request by using the private data.
4. The method of claim 1, wherein the member A's encryption of private data is asymmetric encryption.
5. The method according to any one of claims 1 to 4, wherein in step 103, after the member B takes the encrypted private data from the temporary data area, the temporary data area is destroyed.
6. A privacy data exporting device based on blockchain technology, which is applied among member A, member B and other members in a blockchain organization, comprises:
the system comprises a yielding request unit, a block chain public area and a block chain data isolation area, wherein the yielding request unit is used for sending a privacy data yielding request to a member A by a member B through the block chain public area, and the privacy data are stored in the block chain data isolation area of the member A;
the reply receiving unit is used for receiving reply information of the private data giving-out request from the member A by the member B, the reply information comprises address information of a temporary data area, the temporary data area is created in a block chain public area by the member A through an intelligent contract to store encrypted private data, the encrypted private data is generated by encrypting the private data after the member A receives the private data giving-out request, and a unique readable member in the temporary data area is set as the member B;
a data retrieving unit for the member B to verify the reply information, retrieving the encrypted private data from the temporary data area;
and the data decryption unit is used for storing the acquired encrypted private data into the blockchain data isolation area of the member B by the member B and decrypting the encrypted private data.
7. The apparatus according to claim 6, wherein in the yielding request unit, the private data yielding request sent by the member B to the member A contains a member B public key; in the reply receiving unit, the member A encrypts the private data by using the public key of the member B to generate encrypted private data; in the data decryption unit, the member B uses the private key corresponding to the public key in the private data issuing request to decrypt the encrypted private data.
8. The apparatus according to claim 6, wherein in the reply receiving unit, an encryption method of the private data by the member a is asymmetric encryption.
9. The apparatus according to claim 6, wherein the data retrieving unit destroys the temporary data area after the member B retrieves the encrypted private data from the temporary data area.
10. The apparatus according to any one of claims 6 to 9, wherein the member a is provided with an a mailbox for receiving the private data yielding request, the member B is provided with a B mailbox for receiving a reply message to the private data yielding request, and the a mailbox and the B mailbox are respectively provided with at least one mailbox.
CN202010376380.4A 2020-05-07 2020-05-07 Private data yielding method and device based on blockchain technology Active CN111475826B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010376380.4A CN111475826B (en) 2020-05-07 2020-05-07 Private data yielding method and device based on blockchain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010376380.4A CN111475826B (en) 2020-05-07 2020-05-07 Private data yielding method and device based on blockchain technology

Publications (2)

Publication Number Publication Date
CN111475826A true CN111475826A (en) 2020-07-31
CN111475826B CN111475826B (en) 2023-08-08

Family

ID=71757279

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010376380.4A Active CN111475826B (en) 2020-05-07 2020-05-07 Private data yielding method and device based on blockchain technology

Country Status (1)

Country Link
CN (1) CN111475826B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229203A (en) * 2017-12-29 2018-06-29 北京安云世纪科技有限公司 Document protection method and device in a kind of terminal
US20180343114A1 (en) * 2015-11-24 2018-11-29 Adi BEN-ARI A system and method for blockchain smart contract data privacy
CN109214197A (en) * 2018-08-14 2019-01-15 上海点融信息科技有限责任公司 The method, apparatus and storage medium of private data are handled based on block chain
CN109325870A (en) * 2018-10-10 2019-02-12 上海保险交易所股份有限公司 The method and system of shared private data
US20190058580A1 (en) * 2017-08-15 2019-02-21 Acronis International Gmbh System and method for publication of private data using a blockchain network
CN109377221A (en) * 2018-10-16 2019-02-22 杭州趣链科技有限公司 A method for privacy transaction protection based on consortium blockchain
CN109947723A (en) * 2018-11-30 2019-06-28 上海点融信息科技有限责任公司 For the block data sharing method of block chain network, storage medium, calculate equipment
US20190236559A1 (en) * 2018-01-31 2019-08-01 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing smart flow contracts using distributed ledger technologies in a cloud based computing environment
CN110147684A (en) * 2019-05-24 2019-08-20 众安信息技术服务有限公司 For realizing the method and apparatus of block chain data-privacy protection
CN110222052A (en) * 2019-05-20 2019-09-10 重庆金融资产交易所有限责任公司 Block chain data processing method, device, computer equipment and storage medium
US20200090795A1 (en) * 2018-09-14 2020-03-19 Htc Corporation Method and system for sharing privacy data based on smart contracts

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180343114A1 (en) * 2015-11-24 2018-11-29 Adi BEN-ARI A system and method for blockchain smart contract data privacy
US20190058580A1 (en) * 2017-08-15 2019-02-21 Acronis International Gmbh System and method for publication of private data using a blockchain network
CN108229203A (en) * 2017-12-29 2018-06-29 北京安云世纪科技有限公司 Document protection method and device in a kind of terminal
US20190236559A1 (en) * 2018-01-31 2019-08-01 Salesforce.Com, Inc. Systems, methods, and apparatuses for implementing smart flow contracts using distributed ledger technologies in a cloud based computing environment
CN109214197A (en) * 2018-08-14 2019-01-15 上海点融信息科技有限责任公司 The method, apparatus and storage medium of private data are handled based on block chain
US20200090795A1 (en) * 2018-09-14 2020-03-19 Htc Corporation Method and system for sharing privacy data based on smart contracts
CN109325870A (en) * 2018-10-10 2019-02-12 上海保险交易所股份有限公司 The method and system of shared private data
CN109377221A (en) * 2018-10-16 2019-02-22 杭州趣链科技有限公司 A method for privacy transaction protection based on consortium blockchain
CN109947723A (en) * 2018-11-30 2019-06-28 上海点融信息科技有限责任公司 For the block data sharing method of block chain network, storage medium, calculate equipment
CN110222052A (en) * 2019-05-20 2019-09-10 重庆金融资产交易所有限责任公司 Block chain data processing method, device, computer equipment and storage medium
CN110147684A (en) * 2019-05-24 2019-08-20 众安信息技术服务有限公司 For realizing the method and apparatus of block chain data-privacy protection

Also Published As

Publication number Publication date
CN111475826B (en) 2023-08-08

Similar Documents

Publication Publication Date Title
CN113610528B (en) Management system, method, equipment and storage medium based on block chain
CA2766491A1 (en) A method and system for securely and automatically downloading a master key in a bank card payment system
CN101593389A (en) A kind of key management method and system that is used for the POS terminal
CN105740725B (en) A kind of document protection method and system
CN112686668A (en) Alliance chain cross-chain system and method
EP3395004B1 (en) A method for encrypting data and a method for decrypting data
CN110768963B (en) Trusted security management platform with distributed architecture
CN103326999A (en) File safety management system based on cloud service
CN109981255A (en) The update method and system of pool of keys
CN102170424A (en) Mobile medium safety protection system based on three-level security architecture
CN106027473A (en) Identity card reading terminal and cloud authentication platform data transmission method and system
CN109446259A (en) Data processing method and device, processor and storage medium
CN104219077A (en) Information management system for middle and small-sized enterprises
CN112668018A (en) Block chain-based government data protocol authorization sharing method and device
CN110990863B (en) A method for realizing file access control through timestamp and encryption algorithm
CN105809043A (en) Data security protection method of computer
CN108737079B (en) Distributed quantum key management system and method
CN108737365A (en) A kind of network data information guard method and device
CN112016075A (en) Travel information verification method based on block chain, electronic device and medium
CN119691801A (en) A file management method to prevent leakage
CN112884446B (en) Mail receiving and sending system and method for document encryption
CN110378087A (en) Self-service terminal management method and system
CN106127066A (en) A kind of history data file security protection method and system based on cloud disk
CN111475826A (en) Private data yielding method and device based on block chain technology
CN106127083A (en) A kind of logistics data security protection method and system based on cloud disk

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant