[go: up one dir, main page]

WO2018032374A1 - Système de mémorisation chiffrée pour chaîne de blocs, et procédé utilisant ce système - Google Patents

Système de mémorisation chiffrée pour chaîne de blocs, et procédé utilisant ce système Download PDF

Info

Publication number
WO2018032374A1
WO2018032374A1 PCT/CN2016/095578 CN2016095578W WO2018032374A1 WO 2018032374 A1 WO2018032374 A1 WO 2018032374A1 CN 2016095578 W CN2016095578 W CN 2016095578W WO 2018032374 A1 WO2018032374 A1 WO 2018032374A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
key
storage system
user
encrypted storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2016/095578
Other languages
English (en)
Chinese (zh)
Inventor
张丛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Fanxi Eelectronics Co Ltd
Original Assignee
Shenzhen Fanxi Eelectronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Fanxi Eelectronics Co Ltd filed Critical Shenzhen Fanxi Eelectronics Co Ltd
Publication of WO2018032374A1 publication Critical patent/WO2018032374A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Definitions

  • the invention relates to the transaction data security problem of a blockchain, in particular to an encrypted storage system of a blockchain and a using method thereof.
  • blockchain is a secure account book database, composed of data blocks, users can constantly update and upgrade here.
  • the platform looks for data.
  • the blockchain can speed up transaction processing, reduce costs, reduce middlemen, improve market insight, and increase business transparency.
  • Computing and storage are the two basic tasks of computer systems. With the explosive growth of information, storage components will experience direct storage based on single-server, to cluster-based grid storage based on LAN, and finally to WAN-based data grids.
  • Blockchain technology is the most extreme development at present. The intrinsic characteristics of this data storage medium include intelligent storage. The quality of storage service can guarantee service differentiation and performance guarantee for user applications.
  • Storage is object-oriented mass storage, and Network storage must be confidential and complete.
  • the existing Internet does not have a good or convenient way to ensure the confidentiality, integrity, availability, and data of the data stored in the blockchain and the data stored on the storage device. Non-repudiation and the reliability of the entire network storage system, especially the generation of trusted computing technology in blockchain in recent years, puts higher demands on network storage security.
  • An object of the present invention is to provide an encrypted storage system for a blockchain, comprising: (1) a file group S, which is composed of files having the same access attribute and at different levels, for reducing key exchange between users. Volume, distinguish between file read and write, effectively handle the revocation of user access rights, let an untrusted server authorization file to write operations; (2) open file system, embedded in the blockchain encryption storage system prototype, including The right database, the authentication database of the open file system and the file group key of the encrypted storage system itself are formed in the same programming manner; (3) the lock box device includes multiple key distribution schemes, and the user uses more client-based One of the key distribution schemes to customize the security policy and authentication mechanism for its own files.
  • the number of key exchanges and the number of key exchanges between the file owner and the user is reduced by the key rotation management key, but at the same time the obligation of the file owner to initially distribute the key is not released.
  • the open file system defines the basic structure of the first level directory, so that the user can transparently access the file by using the same directory address anywhere.
  • the access process is to input the "login user name" command, input After the correct password, you can get the token verification code. You can use the check command to check whether the token verification code is correctly obtained. If you modify the personal access password, use the keyword + username to change the keyword and transaction. Relevant, including the transaction information digest, must be used when the user leaves the open file system.
  • the token verification code is time-sensitive and automatically expires after 24 hours from the login. If it is necessary to obtain a new token verification code, the login information needs to be entered again.
  • all data encryption in the file group S is encrypted by a disk, and key management is performed by the client.
  • the plurality of key distribution schemes are differentiated according to the ratio of security and performance ratio values, and the lock box device has multiple keys.
  • the blockchain encryption storage system uses the public key cryptography as the security key of the access right.
  • a file group contains several files belonging to the same file owner and belonging to the same group of lock boxes.
  • the owner of the file group immediately distributes the lock box key to the user after creating the lock box, and calculates a hash tree for each file, and signs and puts the root Enter the file header; (3) the encrypted storage system uses an asymmetric file verification key or uses the file signing key protocol to distinguish between read and write users, these keys are used to sign or verify the hash value of the file block content, thereby Provide proof of file integrity; (4) When requesting a file, the server will pass the encrypted lock box and the encrypted file block to the user, and then the user uses the lock box key to open the lock box and use the lock box The corresponding key decrypts the file block.
  • the method further includes the following steps: for the unified file group, the file owner generates a new key by using the original lock box key, and when the user accesses the file, if the new lock box key is not available, the new key is obtained from the owner. If the lockbox key is not the latest user, you must calculate the original key yourself.
  • the method further includes: the blockchain encryption storage system uses two types of keys, a file signature key and a file verification key, to distinguish between read and write permissions of the file, and when the user reads or writes the file, the file is used.
  • the signature key and the file verification key verify the digital signature and the hash value of the file. If the verification fails, the user believes that the file was illegally modified.
  • the encrypted storage system of the present invention and the method of using the same, the key management right is placed on the client rather than a trusted server, which prevents the problem of insufficient server-side capacity caused by expensive cryptographic operations, and at the same time, relies on the file group. Limiting the number of keys, files with the same access attribute are protected by the same key in the same file group, making it possible to access files when the file owner is offline, thus avoiding the need to access each file. The trouble of contacting the file owner.
  • FIG. 1 is a schematic structural diagram of a blockchain encryption storage system according to an embodiment of the present invention.
  • the essence of a transaction is a relational data structure that contains information about the value transfer of the trading participants. These transaction information is called the accounting ledger.
  • the transaction needs to go through three creation, verification, and writing blockchains. The transaction must be digitally signed to ensure the legality of the transaction.
  • Block All transaction information is stored in the block, and a transaction information is a record, which is stored as a separate record in the blockchain.
  • the block consists of a block header and a data part.
  • the block header field contains various characteristics of the block itself, such as the previous block information, the merkle value, and the timestamp.
  • the block header hash value and block height are the two most important indicators for identifying the block.
  • the block primary identifier is its cryptographic hash value, a digital fingerprint obtained by performing a second hash calculation on the block header by the SHA algorithm.
  • the resulting 32-byte hash value is called the block hash value, or the block header hash value, and only the block header is used for calculation.
  • the block hash value can uniquely and unambiguously identify a block, and any node can independently obtain the block hash value by simply hashing the block header.
  • Blockchain A data structure in which blocks are chained in an orderly fashion.
  • a blockchain is like a vertical stack, with the first block being the first block at the bottom of the stack, and each block is then placed on top of the other blocks.
  • a block When a block is written to a blockchain, it will never change and is backed up to another blockchain server.
  • an encrypted storage system for a blockchain does not affect the secure data sharing of a blockchain node even if it does not trust the server.
  • This embodiment uses cryptography to protect shared files. It is characterized by providing a single user with direct and extensible key management while maintaining direct control over the user accessing the data, and using the file group S in the encrypted storage system to reduce The amount of key exchange between users, distinguishes between file read and write, effectively handles the revocation of user access rights, and allows an untrusted server authorization file.
  • a file group is a strict collection of files with the same access attributes. Regardless of the hierarchy, managing keys by key rotation helps reduce the number and number of key exchanges between the file owner and the user, but At the same time, the obligation of the file owner to initially distribute the key is not removed.
  • the file system specifies the basic structure of the first-level directory, enabling users to transparently access their files using the same directory address from anywhere. The process of entering is to enter the "login user name" command, and after entering the correct password, The token verification code can be obtained.
  • the user can check again whether the token verification code is correctly obtained by using the check command. If the personal access password is modified, the command of "keyword + user name" must be used to change the keyword, including the transaction information. Abstract, when the user leaves the open file system The logout command must be used. In addition, for security reasons, the token verification code is time-sensitive. It automatically expires 24 hours after login. If you need to obtain a new token verification code, you need to type the login information again to prevent system phishing.
  • the primary goal of the lockbox approach is to provide highly scalable key management while giving file owners direct control over authorized access.
  • All data encryption uses disk encryption, and key management is performed by the client to alleviate server-side stress.
  • the user uses one of a plurality of client-based key distribution schemes to customize security policies and authentication mechanisms for their own files, where each allocation scheme is differentiated according to the ratio of security and performance ratios, and the lock box scheme has Multiple keys.
  • each allocation scheme is differentiated according to the ratio of security and performance ratios, and the lock box scheme has Multiple keys.
  • the file is divided into blocks and encrypted in blocks.
  • the block key is placed in the lock box.
  • a file group contains several files belonging to the same file owner.
  • the lock boxes belonging to the same group have the same lock box key and The signature key, the owner of the file group distributes the lock box key to the user once the lock box is created, and computes a hash tree for each file, signs the root and places it in the file header.
  • the blockchain encryption storage system uses asymmetric file verification keys or uses a file signing key protocol to distinguish between read and write users. These keys are used to sign Or verify the hash value of the contents of the file block to provide proof of the integrity of the file.
  • the server When requesting a file, the server passes the encrypted lock box and the encrypted file block to the user, who then uses the lock box key to open the lock box and decrypt the file block using the corresponding key in the lock box.
  • the blockchain encryption storage system of this embodiment uses the public key cryptography as the security key of the access right, and prevents the problem that the re-encryption box key management is overburdened.
  • the file owner uses the original lock box key to generate a new key.
  • the new lock box key is not available, the new key is obtained from the owner. If the lock box key is not up to date
  • the user needs to calculate the original key by himself. Of course, the user needs to know enough information to calculate the original key. Only the owner of the file can generate the new key in order, and the user can use the current key to generate the previous key. , only produces the immediate, can not produce all.
  • the blockchain encryption storage system of this embodiment does not trust the file server, and therefore does not rely on the server to distinguish the read and write permissions of the file, but uses two types of keys: a file signature key and a file verification key.
  • the read and write permissions of the file are differentiated. When the user reads or writes the file, these keys are used to verify the digital signature and the hash value of the file. If the verification fails, the user believes that the file has been illegally modified.
  • the measurement results using the embodiment show that the security and scalability of the encrypted storage system are strong compared with the blockchain of all network communication systems, and the time-to-case ratio of the cryptographic operation is tested for reading and writing of a single file.
  • Ordinary encrypted storage systems are 40% faster.
  • Putting key management rights on the client instead of a trusted server prevents the problem of insufficient server-side capacity caused by expensive cryptographic operations. It mainly relies on file groups to limit the number of keys. Files with the same access attribute are protected by the same key in the same file group, which makes it possible to access files when the file owner is offline, thus avoiding access. Each file needs to be contacted by the owner of the file.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un système de mémorisation chiffrée pour une chaîne de blocs, comprenant : (1) un groupe de fichiers (S) servant à réduire les quantités d'échanges de clés entre des utilisateurs, différencier la lecture et l'écriture de fichiers, traiter et retirer efficacement des droits d'accès des utilisateurs, et permettre à un serveur non sécurisé d'autoriser une opération d'écriture pour un fichier; (2) un système de fichiers ouvert, utilisé pour incorporer un prototype de système de mémorisation chiffrée de la chaîne de blocs et incluant une base de données d'authentification; et (3) un dispositif de verrouillage de boîte comportant une pluralité de systèmes de distribution de clés. Un utilisateur personnalise des stratégies de sécurité et des mécanismes d'authentification pour des fichiers qui lui appartiennent, au moyen d'un système d'une pluralité de systèmes de distribution de clés basés sur un client. L'invention concerne également un procédé d'utilisation du système de mémorisation chiffrée pour une chaîne de blocs. Selon la présente invention, le problème de l'éventuelle insuffisance de la capacité de serveurs dû à un calcul de chiffrement onéreux peut être résolu, il est possible d'accéder à des fichiers lorsque des détenteurs de fichiers sont hors ligne, et, en conséquence, quand l'accès à chaque fichier est nécessaire, il n'est pas utile de se donner la peine d'entrer en contact avec le détenteur de fichier correspondant.
PCT/CN2016/095578 2016-08-13 2016-08-16 Système de mémorisation chiffrée pour chaîne de blocs, et procédé utilisant ce système Ceased WO2018032374A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610670777.8 2016-08-13
CN201610670777.8A CN106055993A (zh) 2016-08-13 2016-08-13 一种用于区块链的加密存储系统及其使用方法

Publications (1)

Publication Number Publication Date
WO2018032374A1 true WO2018032374A1 (fr) 2018-02-22

Family

ID=57480691

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/095578 Ceased WO2018032374A1 (fr) 2016-08-13 2016-08-16 Système de mémorisation chiffrée pour chaîne de blocs, et procédé utilisant ce système

Country Status (2)

Country Link
CN (1) CN106055993A (fr)
WO (1) WO2018032374A1 (fr)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566436A (zh) * 2018-05-28 2018-09-21 上海交通大学 一种基于区块链的分布式电力设备信息采集系统和方法
CN110135178A (zh) * 2019-04-11 2019-08-16 贝克链区块链技术有限公司 区块链验证中的零延迟账本访问技术
CN110993044A (zh) * 2019-11-28 2020-04-10 周口师范学院 一种医疗联盟链轻量级动态自主跨链交互方法
CN111131259A (zh) * 2019-12-26 2020-05-08 罗碧霞 一种基于多方合营项目管理模式的账目共享系统
CN111177265A (zh) * 2019-12-27 2020-05-19 安徽讯呼信息科技有限公司 一种区块链分域方法
CN111177080A (zh) * 2019-12-31 2020-05-19 西安理工大学 一种基于区块链和ipfs的知识图谱存储与验证方法
CN111405223A (zh) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 一种视频处理方法、装置及设备
CN111416832A (zh) * 2019-01-07 2020-07-14 珠海金山办公软件有限公司 一种文件更新方法、装置、电子设备和可读存储介质
CN111415718A (zh) * 2020-02-29 2020-07-14 重庆邮电大学 一种基于区块链和条件代理重加密的电子处方共享方法
CN111985004A (zh) * 2019-05-21 2020-11-24 欧簿客科技股份有限公司 判断信息完整性的方法及其计算机系统
CN112635010A (zh) * 2020-12-28 2021-04-09 扬州大学 基于双区块链的边缘计算下数据存储与共享方法
CN112835977A (zh) * 2021-01-20 2021-05-25 中国科学院信息工程研究所 一种基于区块链的数据库管理方法及系统
CN113420325A (zh) * 2021-06-07 2021-09-21 北京许继电气有限公司 一种基于区块链技术的物联网数据管理系统和方法
CN113593090A (zh) * 2021-07-30 2021-11-02 国家电网有限公司技术学院分公司 一种基于区块链的变电站五防蓝牙锁具系统
CN113611014A (zh) * 2021-07-08 2021-11-05 国家电网有限公司技术学院分公司 一种基于区块链的五防锁具管理方法
CN114116895A (zh) * 2021-11-17 2022-03-01 北京八分量信息科技有限公司 一种区块链大数据的云存储系统
CN114386098A (zh) * 2021-12-31 2022-04-22 江苏任务网络科技有限公司 一种大数据存储与溯源系统
CN114417375A (zh) * 2021-12-30 2022-04-29 南京邮电大学 一种基于切片优化的星际文件系统加解密方法
CN115438320A (zh) * 2022-07-25 2022-12-06 云海链控股股份有限公司 一种基于区块链和数字指纹的隐匿数据确权方法
CN115687506A (zh) * 2021-07-27 2023-02-03 深圳中经量子科技有限公司 基于区块链的文件存储和读取方法、装置、设备和介质
CN115842833A (zh) * 2022-11-24 2023-03-24 国家电投集团重庆狮子滩发电有限公司 一种超融合虚拟存储的处理方法、装置及系统
CN116090024A (zh) * 2023-02-06 2023-05-09 山东昱鑫信息科技有限公司 一种数据的可靠存储装置、系统及方法
TWI802145B (zh) * 2021-12-13 2023-05-11 財團法人國家實驗研究院 數位檔案的時效管理系統與其運作方法
CN116432207A (zh) * 2023-06-07 2023-07-14 国网福建省电力有限公司 一种基于区块链的电力数据权限分级管理方法
US12153702B2 (en) 2022-02-25 2024-11-26 Micro Focus Llc Using a trusted authority to enforce encryption levels/authentication levels in a blockchain
CN119311310A (zh) * 2024-09-27 2025-01-14 江苏新质信息科技有限公司 一种密码设备软件模块发行授权方法及系统
CN120412868A (zh) * 2025-04-17 2025-08-01 禾创科技有限公司 一种基于区块链的医疗数据共享方法及系统

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107944255B (zh) * 2016-10-13 2020-08-04 深圳市图灵奇点智能科技有限公司 一种面向区块链的密钥管理方法
CN106548330B (zh) * 2016-10-27 2018-03-16 上海亿账通区块链科技有限公司 基于区块链的交易验证方法及系统
CN106991334B (zh) 2016-11-24 2021-03-02 创新先进技术有限公司 一种数据存取的方法、系统及装置
EP3566390B1 (fr) * 2017-01-03 2020-12-02 University Of Stavanger Distribution de contenu commandée par l'utilisateur, décentralisée, distribuée et sécurisée
CN106487821B (zh) * 2017-01-04 2020-07-03 北京天云智汇科技有限公司 一种基于互联网区块链技术的数字签名方法
CN106845960B (zh) * 2017-01-24 2018-03-20 上海壹账通区块链科技有限公司 基于区块链的安全交易方法及系统
CN106973036B (zh) * 2017-02-07 2020-04-14 杭州云象网络技术有限公司 一种基于非对称加密的区块链隐私保护方法
CN106919476A (zh) * 2017-02-24 2017-07-04 中国科学院软件研究所 基于联盟链的数据安全备份方法、客户端及云服务端
CN107451002B (zh) * 2017-03-24 2020-11-10 北京瑞卓喜投科技发展有限公司 针对修改区块体数据的区块链的主动验证方法及系统
WO2018176232A1 (fr) * 2017-03-28 2018-10-04 深圳市源畅通科技有限公司 Système d'ouverture de session de transaction de communication électronique anti-perte d'informations à performance de sécurité élevée
CN107016272A (zh) * 2017-03-28 2017-08-04 深圳市源畅通科技有限公司 一种安全性能高的防信息丢失电子通讯交易登录系统
CN108885899B (zh) * 2017-04-01 2022-02-08 达闼机器人有限公司 医学影像传输数据的处理方法、装置及电子设备
CN107067720B (zh) * 2017-04-01 2020-10-27 成都信息工程大学 一种基于区块链的城市实时交通系统及方法
CN106921677A (zh) * 2017-04-20 2017-07-04 陈少峰 一种区块链房屋信息多次加密系统
CN107273410B (zh) * 2017-05-03 2020-07-07 上海点融信息科技有限责任公司 基于区块链的分布式存储
GB201707788D0 (en) * 2017-05-15 2017-06-28 Nchain Holdings Ltd Computer-implemented system and method
CN106992990A (zh) * 2017-05-19 2017-07-28 北京牛链科技有限公司 数据共享方法和系统以及区块链系统和计算设备
KR102588710B1 (ko) * 2017-05-22 2023-10-16 엔체인 홀딩스 리미티드 파라미터화 가능 스마트 계약
CN107273455B (zh) * 2017-05-31 2020-12-18 深圳前海微众银行股份有限公司 区块链数据访问方法和装置
CN107341402B (zh) * 2017-06-19 2020-09-01 上海策链信息科技有限公司 一种程序执行方法及装置
CN107392528A (zh) * 2017-06-30 2017-11-24 海航创新科技研究有限公司 集装箱运营数据处理方法和装置
WO2019006849A1 (fr) * 2017-07-07 2019-01-10 克洛斯比尔有限公司 Procédé et système de signature électronique
CN107610279B (zh) * 2017-08-11 2020-05-05 北京云知科技有限公司 一种车辆启动控制系统、方法和智能钥匙
US10296248B2 (en) * 2017-09-01 2019-05-21 Accenture Global Solutions Limited Turn-control rewritable blockchain
WO2019098873A1 (fr) * 2017-11-16 2019-05-23 Accenture Global Solutions Limited Pile d'opérations de blockchain pour blockchain réinscriptible
GB201720389D0 (en) * 2017-12-07 2018-01-24 Nchain Holdings Ltd Computer-implemented system and method
CN108259169B (zh) * 2018-01-09 2021-07-20 北京大学深圳研究生院 一种基于区块链云存储的文件安全分享方法及系统
CN108471510A (zh) * 2018-01-29 2018-08-31 东莞理工学院 一种基于区块链的视频操作记录保护方法及系统
CN110414256A (zh) * 2018-04-26 2019-11-05 中思博安科技(北京)有限公司 一种基于区块链的精准扶贫数据交换共享方法及平台
CN108683667B (zh) * 2018-05-16 2021-12-03 深圳市迅雷网络技术有限公司 账户保护方法、装置、系统和存储介质
CN109064124B (zh) * 2018-07-17 2023-02-28 腾讯科技(深圳)有限公司 基于区块链验证、存储工作履历的方法和装置
CN109165205A (zh) * 2018-08-21 2019-01-08 甲骨文科技时代(深圳)有限公司 一种基于区块链的数据存储方法及装置
CN110033258B (zh) * 2018-11-12 2021-03-23 创新先进技术有限公司 基于区块链的业务数据加密方法及装置
CN109525671B (zh) * 2018-11-26 2021-05-14 远光软件股份有限公司 基于区块链的数据存储方法、电子设备及存储介质
CN109347868B (zh) * 2018-11-27 2021-06-08 咪咕文化科技有限公司 一种信息验证方法、装置及存储介质
CN109451071B (zh) * 2018-12-29 2021-05-11 杭州趣链科技有限公司 一种基于区块链的可信数据网格系统
CN109729168B (zh) * 2018-12-31 2021-10-01 浙江成功软件开发有限公司 一种基于区块链的数据共享交换系统及方法
TWI829061B (zh) * 2019-02-25 2024-01-11 英屬維爾京群島商東方海外(信息科技)控股有限公司 貨物運輸組織之零信任通信系統及其使用方法
CN109829824B (zh) * 2019-03-05 2020-10-27 河钢国际科技(北京)有限公司 一种基于区块链技术的商品交易信息共享方法
US11341261B2 (en) * 2019-04-05 2022-05-24 Spideroak, Inc. Integration of a block chain, managing group authority and access in an enterprise environment
CN111639063B (zh) * 2020-06-08 2023-08-01 中国银行股份有限公司 一种基于区块链的应急信息处理方法及系统
CN111917720A (zh) * 2020-06-28 2020-11-10 中科物缘科技(杭州)有限公司 基于区块链的文件碎片化加密存储方法、获取方法及系统
CN111865965A (zh) * 2020-07-16 2020-10-30 董海霞 一种云电子医疗数据加密系统
CN113159750A (zh) * 2020-09-15 2021-07-23 裴俊伟 基于区块链的设备确定方法
CN113360931B (zh) * 2021-06-29 2022-11-08 上海万向区块链股份公司 基于区块链的司法电子送达信息安全防护系统和方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014133A (zh) * 2010-11-26 2011-04-13 清华大学 在云存储环境下一种安全存储系统的实现方法
CN102546600A (zh) * 2011-12-20 2012-07-04 华为技术有限公司 基于代理的加密、解密方法,网络设备、网络装置及系统
CN102624708A (zh) * 2012-02-23 2012-08-01 浙江工商大学 一种面向云存储的高效数据加密、更新和访问控制方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9547771B2 (en) * 2013-02-12 2017-01-17 Amazon Technologies, Inc. Policy enforcement with associated data
TWM504286U (zh) * 2015-03-25 2015-07-01 Glory Tech Service Co Ltd 內嵌智能晶片之安全數位記憶卡及行動讀卡終端機
CN105844505A (zh) * 2016-03-17 2016-08-10 深圳市新世纪启航科技开发有限公司 一种通过区块链技术进行数字货币交易的方法
CN105812126B (zh) * 2016-05-19 2018-10-12 齐鲁工业大学 健康区块链数据加密密钥的轻量级备份与高效恢复方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014133A (zh) * 2010-11-26 2011-04-13 清华大学 在云存储环境下一种安全存储系统的实现方法
CN102546600A (zh) * 2011-12-20 2012-07-04 华为技术有限公司 基于代理的加密、解密方法,网络设备、网络装置及系统
CN102624708A (zh) * 2012-02-23 2012-08-01 浙江工商大学 一种面向云存储的高效数据加密、更新和访问控制方法

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566436B (zh) * 2018-05-28 2023-06-27 上海交通大学 一种基于区块链的分布式电力设备信息采集系统和方法
CN108566436A (zh) * 2018-05-28 2018-09-21 上海交通大学 一种基于区块链的分布式电力设备信息采集系统和方法
CN111405223A (zh) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 一种视频处理方法、装置及设备
CN111416832B (zh) * 2019-01-07 2023-03-24 珠海金山办公软件有限公司 一种文件更新方法、装置、电子设备和可读存储介质
CN111416832A (zh) * 2019-01-07 2020-07-14 珠海金山办公软件有限公司 一种文件更新方法、装置、电子设备和可读存储介质
CN110135178A (zh) * 2019-04-11 2019-08-16 贝克链区块链技术有限公司 区块链验证中的零延迟账本访问技术
CN111985004A (zh) * 2019-05-21 2020-11-24 欧簿客科技股份有限公司 判断信息完整性的方法及其计算机系统
CN110993044A (zh) * 2019-11-28 2020-04-10 周口师范学院 一种医疗联盟链轻量级动态自主跨链交互方法
CN110993044B (zh) * 2019-11-28 2023-03-28 周口师范学院 一种医疗联盟链轻量级动态自主跨链交互方法
CN111131259B (zh) * 2019-12-26 2023-12-22 北京亿邦德利智能科技有限公司 一种基于多方合营项目管理模式的账目共享系统
CN111131259A (zh) * 2019-12-26 2020-05-08 罗碧霞 一种基于多方合营项目管理模式的账目共享系统
CN111177265A (zh) * 2019-12-27 2020-05-19 安徽讯呼信息科技有限公司 一种区块链分域方法
CN111177080A (zh) * 2019-12-31 2020-05-19 西安理工大学 一种基于区块链和ipfs的知识图谱存储与验证方法
CN111177080B (zh) * 2019-12-31 2023-04-11 西安理工大学 一种基于区块链和ipfs的知识图谱存储与验证方法
CN111415718A (zh) * 2020-02-29 2020-07-14 重庆邮电大学 一种基于区块链和条件代理重加密的电子处方共享方法
CN111415718B (zh) * 2020-02-29 2024-02-09 沈培君 一种基于区块链和条件代理重加密的电子处方共享方法
CN112635010B (zh) * 2020-12-28 2023-07-07 扬州大学 基于双区块链的边缘计算下数据存储与共享方法
CN112635010A (zh) * 2020-12-28 2021-04-09 扬州大学 基于双区块链的边缘计算下数据存储与共享方法
CN112835977B (zh) * 2021-01-20 2022-07-15 中国科学院信息工程研究所 一种基于区块链的数据库管理方法及系统
CN112835977A (zh) * 2021-01-20 2021-05-25 中国科学院信息工程研究所 一种基于区块链的数据库管理方法及系统
CN113420325A (zh) * 2021-06-07 2021-09-21 北京许继电气有限公司 一种基于区块链技术的物联网数据管理系统和方法
CN113420325B (zh) * 2021-06-07 2024-05-28 北京许继电气有限公司 一种基于区块链技术的物联网数据管理系统和方法
CN113611014B (zh) * 2021-07-08 2023-07-21 国家电网有限公司技术学院分公司 一种基于区块链的五防锁具管理方法
CN113611014A (zh) * 2021-07-08 2021-11-05 国家电网有限公司技术学院分公司 一种基于区块链的五防锁具管理方法
CN115687506A (zh) * 2021-07-27 2023-02-03 深圳中经量子科技有限公司 基于区块链的文件存储和读取方法、装置、设备和介质
CN113593090A (zh) * 2021-07-30 2021-11-02 国家电网有限公司技术学院分公司 一种基于区块链的变电站五防蓝牙锁具系统
CN113593090B (zh) * 2021-07-30 2023-07-18 国家电网有限公司技术学院分公司 一种基于区块链的变电站五防蓝牙锁具系统
CN114116895B (zh) * 2021-11-17 2024-04-12 北京八分量信息科技有限公司 一种区块链大数据的云存储系统
CN114116895A (zh) * 2021-11-17 2022-03-01 北京八分量信息科技有限公司 一种区块链大数据的云存储系统
TWI802145B (zh) * 2021-12-13 2023-05-11 財團法人國家實驗研究院 數位檔案的時效管理系統與其運作方法
CN114417375A (zh) * 2021-12-30 2022-04-29 南京邮电大学 一种基于切片优化的星际文件系统加解密方法
CN114386098A (zh) * 2021-12-31 2022-04-22 江苏任务网络科技有限公司 一种大数据存储与溯源系统
CN114386098B (zh) * 2021-12-31 2024-05-03 江苏大道云隐科技有限公司 一种大数据存储与溯源系统
US12153702B2 (en) 2022-02-25 2024-11-26 Micro Focus Llc Using a trusted authority to enforce encryption levels/authentication levels in a blockchain
CN115438320B (zh) * 2022-07-25 2023-08-11 云海链控股股份有限公司 一种基于区块链和数字指纹的隐匿数据确权方法
CN115438320A (zh) * 2022-07-25 2022-12-06 云海链控股股份有限公司 一种基于区块链和数字指纹的隐匿数据确权方法
CN115842833A (zh) * 2022-11-24 2023-03-24 国家电投集团重庆狮子滩发电有限公司 一种超融合虚拟存储的处理方法、装置及系统
CN115842833B (zh) * 2022-11-24 2023-12-15 国家电投集团重庆狮子滩发电有限公司 一种超融合虚拟存储的处理方法、装置及系统
CN116090024B (zh) * 2023-02-06 2024-01-30 上海泰锟医药技术有限公司 一种数据的可靠存储装置、系统及方法
CN116090024A (zh) * 2023-02-06 2023-05-09 山东昱鑫信息科技有限公司 一种数据的可靠存储装置、系统及方法
CN116432207B (zh) * 2023-06-07 2023-09-22 国网福建省电力有限公司 一种基于区块链的电力数据权限分级管理方法
CN116432207A (zh) * 2023-06-07 2023-07-14 国网福建省电力有限公司 一种基于区块链的电力数据权限分级管理方法
CN119311310A (zh) * 2024-09-27 2025-01-14 江苏新质信息科技有限公司 一种密码设备软件模块发行授权方法及系统
CN120412868A (zh) * 2025-04-17 2025-08-01 禾创科技有限公司 一种基于区块链的医疗数据共享方法及系统
CN120412868B (zh) * 2025-04-17 2025-09-30 禾创科技有限公司 一种基于区块链的医疗数据共享方法及系统

Also Published As

Publication number Publication date
CN106055993A (zh) 2016-10-26

Similar Documents

Publication Publication Date Title
WO2018032374A1 (fr) Système de mémorisation chiffrée pour chaîne de blocs, et procédé utilisant ce système
US11803654B2 (en) Integration of a block chain, managing group authority and access in an enterprise environment
CN106330452B (zh) 一种用于区块链的安全网络附加装置及方法
US11238543B2 (en) Payroll based blockchain identity
US11874943B2 (en) Managing group authority and access to a secured file system in a decentralized environment
WO2018032377A1 (fr) Système de stockage de fichiers de sécurité en lecture seule pour chaîne de blocs, et procédé associé
US11544392B2 (en) Implementation of a file system on a block chain
US20100005318A1 (en) Process for securing data in a storage unit
CN108259169A (zh) 一种基于区块链云存储的文件安全分享方法及系统
CN111010430B (zh) 一种基于双链结构的云计算安全数据共享方法
WO2018032379A1 (fr) Système de stockage sécurisé de fichiers de transactions à distance non sécurisé pour chaîne de blocs
Shu et al. Shield: A stackable secure storage system for file sharing in public storage
CN112989385B (zh) 一种云际计算环境中数据安全动态访问控制方法及系统
CN106685994A (zh) 一种基于gis角色等级权限的云gis资源访问控制方法
CN119272313B (zh) 一种面向大规模供应链数据的时间受控细粒度溯源方法
CN114978664A (zh) 一种数据共享方法、装置及电子设备
CN118368117A (zh) 针对链上数字内容基于密文策略属性加密的受控访问方法及设备
CN114124392B (zh) 支持访问控制的数据可控流通方法、系统、设备和介质
CN118018357A (zh) 一种面向自主可控和安全分享的数据封装方法
CN117457133A (zh) 支持动态访问的去中心化电子病历共享方法及系统
CN117677946A (zh) 用于改进基于分布式分类账的查询记录系统中的研究者隐私的系统和方法
Shu et al. Secure storage system and key technologies
Xia et al. Research on Data Security and Management Mechanism Based on Blockchain
CN121077640A (zh) 一种细粒度医疗数据共享方法
CN120811674A (zh) 一种基于区块链的Hadoop数据加解密方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16913134

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16913134

Country of ref document: EP

Kind code of ref document: A1