[go: up one dir, main page]

CN110162992B - Data processing method, data processing device and computer system - Google Patents

Data processing method, data processing device and computer system Download PDF

Info

Publication number
CN110162992B
CN110162992B CN201910475647.2A CN201910475647A CN110162992B CN 110162992 B CN110162992 B CN 110162992B CN 201910475647 A CN201910475647 A CN 201910475647A CN 110162992 B CN110162992 B CN 110162992B
Authority
CN
China
Prior art keywords
endorsement
node
nodes
encrypted data
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910475647.2A
Other languages
Chinese (zh)
Other versions
CN110162992A (en
Inventor
马逸龙
王云浩
帅斌成
过晓冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910475647.2A priority Critical patent/CN110162992B/en
Publication of CN110162992A publication Critical patent/CN110162992A/en
Application granted granted Critical
Publication of CN110162992B publication Critical patent/CN110162992B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer And Data Communications (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present disclosure provides a data processing method, applied to an endorsement node in a blockchain network, where the blockchain network includes a plurality of nodes including one or more endorsement nodes, the method including: acquiring an endorsement node set designated by a client; generating a key and distributing the key to each endorsement node in an endorsement node set, wherein the number of the endorsement nodes in the endorsement node set is less than or equal to the number of the endorsement nodes in the block chain network; encrypting transaction data from a client based on a secret key to obtain encrypted data; the encrypted data are sent to endorsement nodes in the block chain network, and endorsement verification is carried out on the encrypted data by the endorsement nodes, wherein the endorsement nodes with the keys can decrypt the encrypted data; and if the endorsement verification is successful, sending the encrypted data to the block chain network, and storing the encrypted data into the block chain by each node in the block chain network. The present disclosure also provides a data processing apparatus and a computer system.

Description

Data processing method, data processing device and computer system
Technical Field
The present disclosure relates to a data processing method, a data processing apparatus, and a computer system.
Background
The goal of block-chain technology is to achieve distributed reliable storage of data. When the block chain is specifically implemented, data is stored incrementally on multiple nodes in a network, the fact that the data cannot be tampered with in the chain is guaranteed through a Secure Hash Algorithm (SHA), and the consistency of the data stored on each node is achieved through a consensus Algorithm and a network transmission protocol.
Block chains can be generally divided into Public chains (Public Chain) and permission chains (permitted Chain), wherein the permission chains can be further divided into federation chains (Consortium) and Private chains (Private Chain) according to whether the data maintainer is a single Entity (Entity).
However, in the prior art, no matter what type of blockchain technology, the transaction data is visible to each node in the blockchain network during endorsement and uplink processes, so that privacy protection of the transaction data cannot be realized.
Disclosure of Invention
One aspect of the present disclosure provides a data processing method applied to an endorsement node in a blockchain network, the blockchain network comprising a plurality of nodes, the plurality of nodes comprising one or more endorsement nodes. The method comprises the following steps: acquiring an endorsement node set designated by a client; generating a key and distributing the key to each endorsement node in the endorsement node set, wherein the number of endorsement nodes in the endorsement node set is less than or equal to the number of endorsement nodes in the block chain network; encrypting the transaction data from the client based on the secret key to obtain encrypted data; sending the encrypted data to each endorsement node in the block chain network, and carrying out endorsement verification on the encrypted data by each endorsement node, wherein the endorsement node holding the key can decrypt the encrypted data; and if the endorsement verification is successful, sending the encrypted data to the block chain network, and storing the encrypted data into a block chain by each node in the block chain network.
Optionally, the generating the key includes: generating the key in one-to-one correspondence with the set of endorsement nodes.
Optionally, the successful endorsement verification includes: receiving a first number of acknowledgement messages, wherein a ratio of the first number to a number of endorsement nodes in the set of endorsement nodes exceeds a first predetermined ratio. Specifically, after the encrypted data is sent to each endorsement node in the block chain network, any endorsement node holding the key decrypts the encrypted data based on the key to obtain the transaction data, the transaction data is simulated and executed by any endorsement node, and if the execution result is correct, the confirmation message is returned to the endorsement node.
Optionally, the plurality of nodes further include a sorting node. The sending the encrypted data to the blockchain network includes: and sending the encrypted data to the sequencing node, sequencing the encrypted data by the sequencing node, and sending the encrypted data to other nodes except the sequencing node in the block chain network at a specified time based on a sequencing position, so that the other nodes store the encrypted data in the corresponding block chains.
Optionally, after the sending the encrypted data to each endorsement node in the blockchain network, the method further includes: responding to a key request of any node; and if any node is an endorsement node in the endorsement node set, sending the key to the any node.
Optionally, the sending the encrypted data to the blockchain network includes: and if the transaction data belongs to the specified category, sending the encrypted data to the blockchain network.
Optionally, the method further includes: and if the transaction data do not belong to the specified category, the transaction data are sent to the block chain network, all nodes in the block chain network carry out consensus verification on the transaction data, and the transaction data are stored in the block chain after the verification is passed.
Optionally, the sending the encrypted data to each endorsement node in the blockchain network includes: and sending the encrypted data to each endorsement node in the block chain network based on an epidemic propagation protocol.
Another aspect of the present disclosure provides a data processing apparatus applied to an endorsement node in a blockchain network, where the blockchain network includes a plurality of nodes including one or more endorsement nodes, the apparatus comprising: the device comprises an acquisition module, a generation module, an encryption module, an endorsement module and a chaining module. The acquisition module is used for acquiring the endorsement node set specified by the client. The generation module is used for generating a key and distributing the key to each endorsement node in the endorsement node set, wherein the number of endorsement nodes in the endorsement node set is less than or equal to the number of endorsement nodes in the block chain network. And the encryption module is used for encrypting the transaction data sent by the client based on the secret key to obtain encrypted data. And the endorsement module is used for sending the encrypted data to each endorsement node in the block chain network, and each endorsement node carries out endorsement verification on the encrypted data, wherein the endorsement node holding the key can decrypt the encrypted data. And the uplink module is used for sending the encrypted data to the block chain network when the endorsement verification is successful, and storing the encrypted data into the block chain by each node in the block chain network.
Another aspect of the present disclosure provides a computer system applied to an endorsement node in a blockchain network, the blockchain network comprising a plurality of nodes including one or more endorsement nodes, the computer system comprising: memory, processor and computer program stored on the memory and executable on the processor for implementing the method as described above when the processor executes the program.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions for implementing the method as described above when executed.
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario of a data processing method, apparatus and computer system according to an embodiment of the present disclosure;
FIG. 2 schematically shows a flow chart of a data processing method according to an embodiment of the present disclosure;
Fig. 3A schematically illustrates a schematic diagram of the operation principle of a block-chain network in the prior art;
figure 3B schematically illustrates a schematic diagram of the working principle of a blockchain network according to an embodiment of the present disclosure;
FIG. 4 schematically shows a block diagram of a data processing apparatus according to an embodiment of the present disclosure;
FIG. 5 schematically shows a block diagram of a data processing apparatus according to another embodiment of the present disclosure; and
fig. 6 schematically shows a block diagram of a computer system according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs, unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flowcharts are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon for use by or in connection with an instruction execution system.
The embodiment of the disclosure provides a data processing method and device and a computer system capable of applying the method. The method comprises a strategy acquisition stage, a key generation stage, a data encryption stage, an endorsement stage and a chain winding stage. In the policy acquisition stage, an endorsement node set specified by the client is acquired, the endorsement node set represents the endorsement policy currently formulated by the client, and the endorsement node set comprises one or more endorsement nodes specified by the client. In a key generation phase, a key is generated and distributed to each endorsement node in the set of endorsement nodes. And in the data encryption stage, encrypting the transaction data from the client based on the secret key to obtain encrypted data. And then entering an endorsement stage, and sending the encrypted data to each endorsement node in the block chain network for endorsement verification. And finally, in the uplink stage, uplink storage is carried out on the encrypted data with successful endorsement verification.
Fig. 1 schematically shows an application scenario of a data processing method, apparatus and computer system according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in FIG. 1, the application scenario shows a block chain network (blockchain network)100, where the blockchain network 100 may include nodes (nodes) 101 to 106, and the nodes 101 to 106 commonly maintain a blockchain (blockchain) 110.
The nodes 101 to 106 may be various computing nodes with the same or different computing capabilities, such as a personal computer, a network server, a database server, a smart phone, and the like, which are not limited herein. Any two nodes in the nodes 101-106 can perform point-to-point communication.
Block chain 110 is a distributed database of blocks (blocks) linked in chronological order by hash pointers. Blocks of the block chain are added according to the time sequence, when a preset condition is met, each node in the block chain network allows a current node to create the block and add the block into the block chain, and the added block is used as the current latest block on the block chain. At a particular time, the current latest block obtained from the block chain by the node maintaining the same block chain is the same.
It should be understood that the size and type of blockchain network, the number of nodes, the length of blockchain, the number of blocks, etc. in fig. 1 are merely illustrative. According to actual needs, there may be any size and type of blockchain network, any number of nodes, any length of blockchain, any number of blocks, etc., and this is not a limitation here.
Fig. 2 schematically shows a flow chart of a data processing method according to an embodiment of the present disclosure. The method is applied to an endorsement node in a blockchain network, wherein the blockchain network comprises a plurality of nodes, and the plurality of nodes comprise one or more endorsement nodes.
As shown in fig. 2, the method includes operations S201 to S205:
in operation S201, a set of endorsement nodes specified by a client is obtained.
The endorsement node set specified by the client comprises one or more endorsement nodes, and the number of the endorsement nodes in the endorsement node set is less than or equal to the number of the endorsement nodes in the block chain network. The endorsement node set specified by the client represents the set of endorsement nodes trusted by the client in the data processing process, and can be regarded as an endorsement policy formulated by the client in the data processing process. The set of endorsement nodes each time a client designates may be the same or different, as the case may be. For example, the set of endorsement nodes specified by the client for transaction data of different security levels is different, the set of endorsement nodes specified by the client at different times is different, and so on, and is not limited herein. The endorsement node is an endorsement node bound to the client, and the client can trust the endorsement node, so that the endorsement node can acquire the endorsement node set specified by the client in operation S201, and the endorsement node set at least includes the endorsement node.
In operation S202, a key is generated and distributed to each endorsement node in the set of endorsement nodes.
After obtaining the endorsement node set specified by the client, this operation S202 generates a key for the endorsement node set, and distributes the key to each endorsement node in the endorsement node set as a current valid key, so that the endorsement node currently trusted by the client can obtain the key, and other endorsement nodes in the blockchain network cannot obtain the key.
In operation S203, transaction data from the client is encrypted based on the key, resulting in encrypted data.
After obtaining the endorsement node set specified by the client and generating and distributing the key for the endorsement node set, the present operation S203 further obtains the transaction data from the client, where the obtained endorsement node set specified by the client corresponds to the transaction data, which indicates that the client allows the transaction data to be disclosed to the endorsement nodes in the endorsement node set. In order to ensure that the transaction data is not leaked to other endorsement nodes that the client does not trust, the operation S203 encrypts the transaction data based on the key generated above to obtain encrypted data.
In operation S204, the encrypted data is sent to each endorsement node in the block chain network, and each endorsement node performs endorsement verification on the encrypted data.
The endorsement mechanism in the blockchain network requires that transaction data that needs to be subjected to endorsement verification is sent to each endorsement node in the blockchain network, and this operation S204 sends the encrypted data obtained in operation S203 to each endorsement node in the blockchain network according to the endorsement mechanism. For each endorsement node in the endorsement node set, the endorsement nodes hold corresponding keys, and can decrypt the encrypted data, so that the decrypted transaction data can be subjected to endorsement verification. For other endorsement nodes not holding corresponding keys, the endorsement nodes cannot decrypt the encrypted data and further cannot perform endorsement verification on the transaction data.
In operation S205, if the endorsement verification is successful, the encrypted data is sent to the blockchain network, and each node in the blockchain network stores the encrypted data in a blockchain.
In operation S205, it may be determined whether endorsement verification is successful according to the endorsement result of each endorsement node, and if the endorsement verification is successful, the encrypted data may be linked, that is, the encrypted data is stored in the blockchain, each node in the blockchain network may obtain the encrypted data from the blockchain, but since the encrypted data is the encrypted data, the real transaction data may be obtained only by the endorsement node having the key.
As can be seen, the method shown in fig. 2 is based on an endorsement node set specified by a client, generates and distributes a key within the endorsement node set, encrypts transaction data from the client based on the key to obtain encrypted data, and then performs endorsement and chaining on the encrypted data. According to the scheme, during endorsement, during uplink and after uplink, real transaction data are only visible for endorsement nodes trusted by the client, and the privacy of the transaction data of the client is protected.
In an embodiment of the present disclosure, the generating the key may include: and generating a key in one-to-one correspondence with the acquired endorsement node set to ensure that the current valid key is only held by the endorsement node currently trusted by the client, wherein for the key generated each time, when the endorsement node set specified by the client is changed, the key is not valid any more, and a new current valid key needs to be generated. For example, in the first data processing procedure, an endorsement node set 1 specified by a client is acquired, and a key 1 is generated for the endorsement node set 1. In the second data processing process, the endorsement node set 2 specified by the client is acquired, and the key 2 is generated for the endorsement node set 2. When the endorsement node set 1 is different from the endorsement node set 2, the key 1 and the key 2 are different, and when the endorsement node set 1 is the same as the endorsement node set 2, the key 1 and the key 2 may be the same or different. If the rule that the key 1 is the same as the key 2 is adopted, in the actual execution process, after the endorsement node set 2 is obtained, whether the endorsement node set 2 is the same as the endorsement node set 1 or not can be judged, if so, the key 2 does not need to be generated, and the key 1 can be directly used.
In an embodiment of the present disclosure, after the encrypted data is sent to each endorsement node in the blockchain network, for any endorsement node 1 holding a currently valid key, the any endorsement node 1 may decrypt the encrypted data based on the key to obtain corresponding transaction data. The endorsement node 1 can perform simulated execution on the transaction data, and if the execution result is correct and the endorsement on the endorsement node 1 is determined to be successful, the endorsement node 1 returns a confirmation message to the endorsement node bound with the client. For any endorsement node 2 not holding the current valid key, the endorsement node 2 cannot decrypt the encrypted data, and further cannot perform simulation execution on the encrypted data, and thus the endorsement failure on the endorsement node 2 is directly determined.
On this basis, the successful endorsement verification comprises the following steps: a first number of acknowledgement messages is received, wherein a ratio of the first number to a number of endorsement nodes in the acquired set of endorsement nodes exceeds a first predetermined ratio.
In the endorsement process, the endorsement node with the current effective key can smoothly carry out endorsement verification on the encrypted transaction data to obtain a successful or failed endorsement result. And the endorsement node not holding the current effective key cannot perform endorsement verification on the encrypted transaction data and can only obtain a failed endorsement result. For the client, the purpose of endorsement verification of the transaction data by only allowing the currently trusted endorsement node is achieved, and the problem that privacy is easily revealed in the process of endorsement verification of the transaction data on the untrusted endorsement node is avoided.
Further, in one embodiment of the present disclosure, the plurality of nodes in the blockchain network further includes a sorting node. The sending the encrypted data to the blockchain network includes: and sending the encrypted data to the sequencing node, sequencing the encrypted data by the sequencing node, and sending the encrypted data to other nodes except the sequencing node in the block chain network at a specified time based on the sequencing position, wherein the other nodes can comprise endorsement nodes and/or common nodes, so that the other nodes store the encrypted data in the corresponding block chains.
In some cases, after generating a corresponding key for the obtained endorsement node set and distributing the key within the scope of the endorsement node set, the endorsement node 1 in the endorsement node set accidentally loses the key, so that after sending the encrypted data to each endorsement node in the blockchain network, the endorsement node 1 cannot decrypt and endorse the encrypted data with the key. To avoid this, the endorsement node 1 may send a key request to the endorsement node bound to the client, where the key request refers to a request message for a currently valid key. The data processing method according to the embodiment of the present disclosure may further include: and responding to the key request of any node, and sending the current effective key to any node if the any node is an endorsement node in the set of endorsement nodes which are currently effective.
In an embodiment of the disclosure, the sending the encrypted data to the blockchain network includes: and if the transaction data corresponding to the encrypted data belongs to the specified category, sending the encrypted data to the blockchain network, and storing the encrypted data into the blockchain by a plurality of nodes in the blockchain network. In this case, the encrypted data in the blockchain cannot be tampered, any node in the blockchain network can acquire the encrypted data, but only the node holding the key corresponding to the encrypted data therein can decrypt the encrypted data, and thus acquire the real transaction data corresponding to the encrypted data. The transaction data of the designated category may be data with a high requirement for privacy protection, and this embodiment ensures that the transaction data can still be privacy protected after uplink.
On this basis, further, after determining that the encrypted data endorsement verification is successful, the data processing method according to the embodiment of the present disclosure may further include: and if the transaction data corresponding to the encrypted data does not belong to the specified category, directly sending the transaction data to a block chain network, carrying out consensus verification on the transaction data by each node in the block chain network, and storing the transaction data into a block chain after the verification is passed. When the transaction data does not belong to the designated category, it is indicated that the privacy protection requirement of the transaction data is low, and at this time, the uplink can be directly performed on the transaction data.
A data processing method according to an embodiment of the present disclosure is described below with reference to fig. 3A to 3B in conjunction with specific embodiments:
fig. 3A schematically shows a schematic diagram of the working principle of a blockchain network in the prior art.
Fig. 3B schematically illustrates a schematic diagram of the working principle of a blockchain network according to an embodiment of the present disclosure.
As shown in fig. 3A, the interaction process between nodes in a blockchain network in the prior art is shown above. The block chain network comprises nodes 1-9, wherein the nodes 1-4 have endorsement verification capability and are endorsement nodes in the block chain network, the node 5 is a sequencing node, the nodes 6-9 are common nodes, and the endorsement node 1 is a node bound with a client. The method comprises the steps that a client side sends transaction data A to an endorsement node 1, the endorsement node 1 conducts endorsement verification on the transaction data locally, the transaction data A is sent to endorsement nodes 2-4 to conduct endorsement verification, whether the endorsement verification of the transaction data A is successful or not is determined according to endorsement results of the endorsement nodes 1-4, and determination rules of the endorsement verification results can be set according to actual needs and are not limited. And when the transaction data A is confirmed to be successfully subjected to endorsement verification, sending the transaction data A to the sequencing node 5, wherein the sequencing node 5 does not check the content of the received transaction data, and the sequencing node 5 performs sequencing Service (Order Service) on the transaction data A and other received transaction data according to a preset sequencing rule and determines the time for submitting the transaction data A according to the sequencing position. When the corresponding time arrives, the sequencing node 5 sends the transaction data A to a plurality of nodes in the block chain network, for example, to the nodes 2-4 and the nodes 6-9, the nodes 2-4 and the nodes 6-9 perform consensus verification on the transaction data A, and after the consensus verification is passed, each node stores the transaction data A into the corresponding block chain, so that the uplink of the transaction data A is realized.
The lower part of fig. 3A shows the operation of an endorsement node in a blockchain network in the prior art. Taking the endorsement node 2 as an example, after receiving the transaction data a, the endorsement node 2 may perform chain code emulation (chainode) on the transaction data a, and after determining that the transaction data a is legal and compliant, return the endorsement result to the endorsement node 1 after signing. And after receiving the submitted information sent by the sequencing node 5, the endorsement node 2 stores the transaction data A into the corresponding block chain through consensus verification, so as to realize uplink confirmation (Commit) of the block chain. Wherein the endorsement node 2 local database can only hold the transaction data a, i.e. the public state of the transaction data a.
In the working process of the block chain network shown in fig. 3A, the transaction data stored in the block chain is visible to all nodes, and in the process of endorsement verification by each endorsement node, the transaction data is visible to each endorsement node, so that the problem of privacy disclosure of the transaction data is easily caused.
The improved blockchain network shown in fig. 3B works to solve the above-mentioned problems. As shown in fig. 3B, the above illustrates an interaction process between nodes in a blockchain network according to an embodiment of the present disclosure. The block chain network comprises nodes 1-9, wherein the nodes 1-3 have endorsement verification capability and are endorsement nodes in the block chain network, the node 4 is a sequencing node, the nodes 5-9 are common nodes, and the endorsement node 1 is a node bound with a client. The endorsement node 1 acquires an endorsement node set designated by the client, and the endorsement node set designated by the client is { endorsement node 1, endorsement node 2} in this example, which represents that the client currently trusts the endorsement node 1 and the endorsement node 2. After acquiring the endorsement node set, the endorsement node 1 correspondingly generates a key 1, stores the key 1 locally, and distributes the key 1 to the endorsement node 2 by a specified key management means. The client sends transaction data A to the endorsement node 1, the endorsement node 1 locally performs endorsement verification on the transaction data, and encrypts the transaction data A by using the key 1 to obtain encrypted data A'. The endorsement node 1 sends the encrypted data A 'to endorsement nodes 2-4 for endorsement verification, and whether the endorsement verification of the encrypted data A' is successful is determined according to endorsement results of the endorsement nodes 1-3, wherein a determination rule of the endorsement verification result can be set according to actual needs, and no limitation is imposed on the determination rule.
In another example, the key 1 may also be generated at the client, the client sends the endorsement node set { endorsement node 1, endorsement node 2}, the key 1 and the encrypted data a 'to the endorsement node 1 bound thereto by specifying a key management means, the endorsement node 1 distributes the key 1 to the endorsement node 2, the endorsement node 1 locally performs endorsement verification on the encrypted data a', and sends the encrypted data a 'to the endorsement nodes 2 to 3 for endorsement verification based on a Gossip Protocol (Gossip Protocol), and it is determined whether the endorsement verification of the encrypted data a' is successful according to the endorsement result of the endorsement nodes 1 to 3.
And when the endorsement verification of the encrypted data A 'is successful, sending the encrypted data A' to the sequencing node 4, wherein the sequencing node 4 does not examine the content of the received transaction data, and the sequencing node 4 performs sequencing service on the encrypted data A 'and other received transaction data according to a preset sequencing rule and determines the time for submitting the encrypted data A' according to the sequencing position. When a corresponding time arrives, the sequencing node 4 sends the encrypted data A 'to a plurality of nodes in the block chain network, for example, to the nodes 2-3 and the nodes 5-9, the nodes 2-3 and the nodes 5-9 perform consensus verification on the encrypted data A', and after the consensus verification is passed, the nodes respectively store the encrypted data A 'into the corresponding block chains, so that the uplink of the encrypted data A' is realized.
The lower part of fig. 3B shows the working process of one endorsement node in a blockchain network according to an embodiment of the present disclosure. Taking the endorsement node 2 as an example, after receiving the encrypted data a ', the endorsement node 2 may decrypt the encrypted data a' by using the key 1 to obtain the transaction data a, then perform chain code simulation (chainode) execution on the transaction data, update the endorsement state to be an endorsed state after determining that the transaction data is legal and compliant, and return the endorsement result to the endorsement node 1 after signing. And after receiving the submitted information sent by the sequencing node 4, the endorsement node 2 stores the encrypted data A' into the corresponding block chain through consensus verification, thereby realizing uplink acknowledgement (Commit) of the block chain. Wherein the endorsement node 2 local database can store the transaction data a and can also store the encrypted data a'. Taking endorsement node 3 as an example again, endorsement node 3 is not in the endorsement node set specified by the client, and endorsement node 3 does not hold key 1 and cannot perform endorsement verification on encrypted data a'.
It can be seen that the transaction data a during endorsement verification, during uplink and after uplink is visible to endorsement nodes 1-2 holding the key 1 and invisible to other nodes. Further, according to the data processing method of the embodiment of the present disclosure, a key retrieving mechanism is further provided, when an endorsement node that holds a key, for example, the endorsement node 2, accidentally loses the key 1, or the endorsement node 2 deletes local private data by mistake, the endorsement node 2 cannot perform endorsement verification on the encrypted data a', at this time, the endorsement node 2 may initiate a key request to the endorsement node 1, request the key 1 or corresponding private data according to specific conditions, and ensure consistency of internal data of each endorsement node in an endorsement node set specified by the client.
Fig. 4 schematically shows a block diagram of a data processing device according to an embodiment of the present disclosure. The data processing apparatus 400 is applied to an endorsement node in a blockchain network comprising a plurality of nodes including one or more endorsement nodes.
As shown in fig. 4, the data processing apparatus 400 includes: an acquisition module 410, a generation module 420, an encryption module 430, an endorsement module 440, and a chaining module 450.
The obtaining module 410 is configured to obtain a set of endorsement nodes specified by a client.
The generating module 420 is configured to generate a key and distribute the key to each endorsement node in the endorsement node set, where the number of endorsement nodes in the endorsement node set is less than or equal to the number of endorsement nodes in the blockchain network.
The encryption module 430 is configured to encrypt transaction data sent from the client based on the key, so as to obtain encrypted data.
The endorsement module 440 is configured to send the encrypted data to each endorsement node in the block chain network, and perform endorsement verification on the encrypted data by each endorsement node, where the endorsement node holding the key can decrypt the encrypted data.
The uplink module 450 is configured to send the encrypted data to the blockchain network when the endorsement verification is successful, and each node in the blockchain network stores the encrypted data into a blockchain.
Fig. 5 schematically shows a block diagram of a data processing device according to another embodiment of the present disclosure. The data processing apparatus 500 is applied to an endorsement node in a blockchain network comprising a plurality of nodes including one or more endorsement nodes.
As shown in fig. 5, the data processing apparatus 500 includes: an acquisition module 510, a generation module 520, an encryption module 530, an endorsement module 540, and a chaining module 550. The obtaining module 510, the generating module 520, the encrypting module 530, the endorsement module 540, and the chain winding module 550 respectively have the same functions as those of the obtaining module 410, the generating module 420, the encrypting module 430, the endorsement module 440, and the chain winding module 450, and repeated description is omitted.
In an embodiment of the present disclosure, the generating module 520 is specifically configured to generate the key in a one-to-one correspondence with the endorsement node set.
In one embodiment of the present disclosure, the endorsement module 540 is further configured to determine that the endorsement verification is successful when a first number of acknowledgement messages is received. After the encrypted data are sent to each endorsement node in the block chain network, any endorsement node holding the key decrypts the encrypted data based on the key to obtain the transaction data, any endorsement node performs simulation execution on the transaction data, and if an execution result is correct, the confirmation message is returned to the endorsement module 540 of the endorsement node.
In one embodiment of the disclosure, the plurality of nodes in the blockchain network further includes a sorting node. The uplink module 550 is specifically configured to send the encrypted data to the sorting node, sort the encrypted data by the sorting node, and send the encrypted data to other nodes in the block chain network except the sorting node at a specified time based on the sorting position, so that the other nodes store the encrypted data in their corresponding block chains.
In one embodiment of the present disclosure, the data processing apparatus 500 further includes: a response module 560 and a sending module 570. The response module 560 is configured to respond to a key request from any one of the endorsement nodes in the blockchain network after the endorsement module 540 sends the encrypted data to the endorsement nodes in the blockchain network. The sending module 570 is configured to send the key to the any node when the any node is an endorsement node in the set of endorsement nodes.
In an embodiment of the present disclosure, the uplink module 550 is specifically configured to send the encrypted data to the blockchain network if the transaction data belongs to a specified category.
Specifically, as an optional embodiment, the data processing apparatus 500 further includes an auxiliary module 580, configured to, when the transaction data does not belong to the specified category, send the transaction data to the blockchain network, perform consensus verification on the transaction data by each node in the blockchain network, and store the transaction data into the blockchain after the verification is passed.
In an embodiment of the present disclosure, the endorsement module 540 is specifically configured to send the encrypted data to each endorsement node in the block chain network based on an epidemic propagation protocol.
It should be noted that the implementation, solved technical problems, implemented functions, and achieved technical effects of each module/unit/subunit and the like in the apparatus part embodiment are respectively the same as or similar to the implementation, solved technical problems, implemented functions, and achieved technical effects of each corresponding step in the method part embodiment, and are not described herein again.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any of the obtaining module 510, the generating module 520, the encrypting module 530, the endorsement module 540, the chaining module 550, the responding module 560, the sending module 570, and the assisting module 580 may be combined into one module to be implemented, or any one of the modules may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the disclosure, at least one of the obtaining module 510, the generating module 520, the encrypting module 530, the endorsement module 540, the chaining module 550, the responding module 560, the sending module 570, and the assisting module 580 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware by any other reasonable manner of integrating or packaging a circuit, or in any one of three implementations of software, hardware, and firmware, or in any suitable combination of any of them. Alternatively, at least one of the obtaining module 510, the generating module 520, the encrypting module 530, the endorsement module 540, the chaining module 550, the responding module 560, the sending module 570, and the assisting module 580 may be implemented at least in part as a computer program module that, when executed, performs a corresponding function.
Fig. 6 schematically shows a block diagram of a computer system suitable for implementing the above described method according to an embodiment of the present disclosure. The computer system illustrated in FIG. 6 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 6, computer system 600 includes a processor 610 and a computer-readable storage medium 620. The computer system 600 may perform a method according to an embodiment of the disclosure.
In particular, the processor 610 may comprise, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 610 may also include onboard memory for caching purposes. The processor 610 may be a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
Computer-readable storage medium 620, for example, may be a non-volatile computer-readable storage medium, specific examples including, but not limited to: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and so on.
The computer-readable storage medium 620 may include a computer program 621, which computer program 621 may include code/computer-executable instructions that, when executed by the processor 610, cause the processor 610 to perform a method according to an embodiment of the disclosure, or any variation thereof.
The computer program 621 may be configured with, for example, computer program code comprising computer program modules. For example, in an example embodiment, code in computer program 621 may include one or more program modules, including 621A, 621B, … …, for example. It should be noted that the division and number of the modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, so that the processor 610 may execute the method according to the embodiment of the present disclosure or any variation thereof when the program modules are executed by the processor 610.
According to an embodiment of the present invention, at least one of the obtaining module 510, the generating module 520, the encrypting module 530, the endorsement module 540, the winding module 550, the responding module 560, the sending module 570, and the assisting module 580 may be implemented as a computer program module as described with reference to fig. 6, which, when executed by the processor 610, may implement the data processing method described above.
The present disclosure also provides a computer-readable storage medium, which may be embodied in the device/apparatus/system described in the above embodiments; or may exist alone without being assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement a method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments of the present disclosure and/or the claims may be made without departing from the spirit and teachings of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
While the disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (10)

1. A data processing method applied to an endorsement node in a blockchain network, the blockchain network comprising a plurality of nodes including one or more endorsement nodes, the method comprising:
Acquiring an endorsement node set specified by a client, wherein the endorsement node set is a set of endorsement nodes trusted by the client in each data processing process, the client specifies the endorsement node set according to an endorsement strategy formulated in each data processing process, and the endorsement node sets specified by the client at each time are different;
generating a key and distributing the key to each endorsement node in the endorsement node set, wherein the number of endorsement nodes in the endorsement node set is less than the number of endorsement nodes in the block chain network, and the key is generated for the endorsement node set;
encrypting the transaction data from the client based on the secret key to obtain encrypted data;
the encrypted data are sent to endorsement nodes in the block chain network, and endorsement verification is carried out on the encrypted data by the endorsement nodes, wherein the endorsement nodes holding the secret keys can decrypt the encrypted data; and
and if the endorsement verification is successful, sending the encrypted data to the block chain network, and storing the encrypted data into a block chain by each node in the block chain network.
2. The method of claim 1, wherein the generating a key comprises: generating the key in one-to-one correspondence with the set of endorsement nodes.
3. The method of claim 1, wherein the endorsement verification success comprises: receiving a first quantity of confirmation messages, wherein the proportion of the first quantity to the number of endorsement nodes in the endorsement node set exceeds a first preset proportion, after the encrypted data are sent to each endorsement node in the block chain network, any endorsement node holding the key decrypts the encrypted data based on the key to obtain the transaction data, the transaction data are simulated and executed by any endorsement node, and if the execution result is correct, the confirmation messages are returned to the endorsement node.
4. The method of claim 1, wherein the plurality of nodes further comprises a ranking node;
the sending the encrypted data to the blockchain network comprises: and sending the encrypted data to the sequencing node, sequencing the encrypted data by the sequencing node, and sending the encrypted data to other nodes except the sequencing node in the block chain network at a specified time based on a sequencing position, so that the other nodes store the encrypted data in the corresponding block chains.
5. The method of claim 1, wherein after the transmitting the encrypted data to each endorsement node in the blockchain network, the method further comprises:
responding to a key request of any node; and
and if any node is an endorsement node in the endorsement node set, sending the key to the any node.
6. The method of claim 1, wherein the sending the encrypted data to the blockchain network comprises:
and if the transaction data belongs to the specified category, sending the encrypted data to the blockchain network.
7. The method of claim 6, further comprising:
and if the transaction data do not belong to the specified category, the transaction data are sent to the block chain network, all nodes in the block chain network carry out consensus verification on the transaction data, and the transaction data are stored in the block chain after the verification is passed.
8. The method of claim 1, wherein the sending the encrypted data to each endorsement node in the blockchain network comprises: and sending the encrypted data to each endorsement node in the block chain network based on an epidemic propagation protocol.
9. A data processing apparatus for use in an endorsement node in a blockchain network comprising a plurality of nodes including one or more endorsement nodes, the apparatus comprising:
an obtaining module, configured to obtain an endorsement node set specified by a client, where the endorsement node set is a set of endorsement nodes trusted by the client in each data processing process, and the client specifies the endorsement node set according to an endorsement policy formulated in each data processing process, and the endorsement node sets specified by the client at each time are different;
a generating module, configured to generate a key and distribute the key to each endorsement node in the endorsement node set, where the number of endorsement nodes in the endorsement node set is less than the number of endorsement nodes in the block chain network, and the key is generated for the endorsement node set;
the encryption module is used for encrypting the transaction data sent by the client based on the secret key to obtain encrypted data;
the endorsement module is used for sending the encrypted data to each endorsement node in the block chain network and carrying out endorsement verification on the encrypted data by each endorsement node, wherein the endorsement node holding the key can decrypt the encrypted data; and
And the uplink module is used for sending the encrypted data to the block chain network when the endorsement verification is successful, and storing the encrypted data into a block chain by each node in the block chain network.
10. A computer system for use in an endorsement node in a blockchain network, the blockchain network comprising a plurality of nodes including one or more endorsement nodes, the computer system comprising: memory, a processor and a computer program stored on the memory and executable on the processor, the processor when executing the program for implementing:
acquiring an endorsement node set designated by a client, wherein the endorsement node set is a set of endorsement nodes trusted by the client in each data processing process, the client designates the endorsement node set according to an endorsement strategy formulated in each data processing process, and the endorsement node set designated by the client at each time is different;
generating a key and distributing the key to each endorsement node in the endorsement node set, wherein the number of endorsement nodes in the endorsement node set is less than the number of endorsement nodes in the block chain network, and the key is generated for the endorsement node set;
Encrypting the transaction data from the client based on the secret key to obtain encrypted data;
the encrypted data are sent to endorsement nodes in the block chain network, and endorsement verification is carried out on the encrypted data by the endorsement nodes, wherein the endorsement nodes holding the secret keys can decrypt the encrypted data; and
and if the endorsement verification is successful, sending the encrypted data to the block chain network, and storing the encrypted data into a block chain by each node in the block chain network.
CN201910475647.2A 2019-05-31 2019-05-31 Data processing method, data processing device and computer system Active CN110162992B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910475647.2A CN110162992B (en) 2019-05-31 2019-05-31 Data processing method, data processing device and computer system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910475647.2A CN110162992B (en) 2019-05-31 2019-05-31 Data processing method, data processing device and computer system

Publications (2)

Publication Number Publication Date
CN110162992A CN110162992A (en) 2019-08-23
CN110162992B true CN110162992B (en) 2022-06-28

Family

ID=67627103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910475647.2A Active CN110162992B (en) 2019-05-31 2019-05-31 Data processing method, data processing device and computer system

Country Status (1)

Country Link
CN (1) CN110162992B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602138B (en) * 2019-09-26 2021-06-11 腾讯科技(深圳)有限公司 Data processing method and device for block chain network, electronic equipment and storage medium
US10956204B1 (en) * 2019-10-14 2021-03-23 International Business Machines Corporation Free-riding node identification for blockchain
CN111027099B (en) * 2019-12-09 2022-04-26 京东科技信息技术有限公司 Identity verification method, device, system and computer readable storage medium
CN111415153A (en) * 2020-03-17 2020-07-14 联想(北京)有限公司 Processing method, electronic equipment and transaction method based on block chain
CN111414633B (en) * 2020-03-18 2023-07-21 联想(北京)有限公司 Information processing method and device
CN111431880B (en) * 2020-03-18 2022-03-25 联想(北京)有限公司 Information processing method and device
CN111444272B (en) * 2020-03-18 2024-06-18 联想(北京)有限公司 Data processing method and device
CN111414634B (en) * 2020-03-18 2023-09-19 联想(北京)有限公司 Information processing method and device
CN111464298A (en) * 2020-03-30 2020-07-28 北京金山云网络技术有限公司 Data processing method and device in block chain and block chain network
CN111460525B (en) * 2020-03-31 2024-06-18 腾讯科技(深圳)有限公司 Block chain-based data processing method, device and storage medium
CN111553594B (en) * 2020-04-28 2023-04-14 腾讯科技(深圳)有限公司 Resource allocation method, device, computer equipment and computer readable storage medium
CN111614643B (en) * 2020-05-12 2022-11-25 傲林科技有限公司 Key management method and block chain system
US11375009B1 (en) * 2020-12-07 2022-06-28 International Business Machines Corporation Minimizing the impact of malfunctioning peers on blockchain
CN112488592A (en) * 2020-12-23 2021-03-12 树根互联技术有限公司 Engineering equipment management method and device based on block chain and computer terminal
CN113407558A (en) * 2021-07-14 2021-09-17 广东粤信智能科技有限公司 Transaction data updating method, storage medium and system based on block chain world state
US11863561B2 (en) * 2021-11-10 2024-01-02 Oracle International Corporation Edge attestation for authorization of a computing node in a cloud infrastructure system
CN115033645B (en) * 2022-07-06 2023-11-21 贵州电网有限责任公司 Power data storage method and system based on block chain technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108376368A (en) * 2018-03-07 2018-08-07 物数(上海)信息科技有限公司 Endorsement strategy determines method, apparatus, electronic equipment, storage medium
CN109271805A (en) * 2018-08-10 2019-01-25 广东工业大学 A kind of storage of data subregion, querying method and system based on block chain
CN109493204A (en) * 2018-10-16 2019-03-19 平安科技(深圳)有限公司 Business bookkeeping methods and terminal device based on block chain

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG11201908666VA (en) * 2017-03-21 2019-10-30 Tora Holdings Inc Secure order matching by distributing data and processing across multiple segregated computation nodes
CN108632284B (en) * 2018-05-10 2021-02-23 网易(杭州)网络有限公司 User data authorization method, medium, device and computing equipment based on block chain
CN109684880A (en) * 2019-01-07 2019-04-26 江西金格科技股份有限公司 A kind of web data guard method based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108376368A (en) * 2018-03-07 2018-08-07 物数(上海)信息科技有限公司 Endorsement strategy determines method, apparatus, electronic equipment, storage medium
CN109271805A (en) * 2018-08-10 2019-01-25 广东工业大学 A kind of storage of data subregion, querying method and system based on block chain
CN109493204A (en) * 2018-10-16 2019-03-19 平安科技(深圳)有限公司 Business bookkeeping methods and terminal device based on block chain

Also Published As

Publication number Publication date
CN110162992A (en) 2019-08-23

Similar Documents

Publication Publication Date Title
CN110162992B (en) Data processing method, data processing device and computer system
ES2872101T3 (en) Distributed key management for trusted runtime environments
CN111541785B (en) Cloud computing-based blockchain data processing method and device
CN111090888B (en) Contract verification method and device
CN110580413B (en) Private data query method and device based on down-link authorization
CN110580262B (en) Private data query method and device based on intelligent contract
CN109067528B (en) Cryptographic operation, method for creating work key, cryptographic service platform and device
WO2020259635A1 (en) Method and apparatus for sharing blockchain data
JP2020528224A (en) Secure execution of smart contract operations in a reliable execution environment
CN111523110B (en) Authority query configuration method and device based on chain codes
CN111090875A (en) Contract deployment method and device
CN110535641B (en) Key management method and apparatus, computer device, and storage medium
US10528751B2 (en) Secure and efficient cloud storage with retrievability guarantees
CN110580245B (en) Private data sharing method and device
CN114616797B (en) Processing requests to control information stored on multiple servers
CN110580411B (en) Permission query configuration method and device based on intelligent contract
KR102282788B1 (en) Blockchain system for supporting change of plain text data included in transaction
CN116050537A (en) Federal learning method and device, readable storage medium and electronic equipment
CN114157415A (en) Data processing method, computing node, system, computer equipment and storage medium
CN112948465B (en) Data processing method and device based on block chain
WO2025098706A1 (en) Securely generating and multi-party sharing of a root of trust in a clustered cryptosystem
CN106257859A (en) A kind of password using method
CN116132185B (en) Data calling method, system, device, equipment and medium
CN115001719B (en) Private data processing system, method, device, computer equipment and storage medium
CN117595996A (en) Electronic signature processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant