Movatterモバイル変換


[0]ホーム

URL:


CN113034138A - Privacy protection method based on block chain - Google Patents

Privacy protection method based on block chain
Download PDF

Info

Publication number
CN113034138A
CN113034138ACN202110269073.0ACN202110269073ACN113034138ACN 113034138 ACN113034138 ACN 113034138ACN 202110269073 ACN202110269073 ACN 202110269073ACN 113034138 ACN113034138 ACN 113034138A
Authority
CN
China
Prior art keywords
block chain
node
transaction
data
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110269073.0A
Other languages
Chinese (zh)
Inventor
关涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sany Intelligent Manufacturing Shenzhen Co ltd
Original Assignee
Sany Intelligent Manufacturing Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sany Intelligent Manufacturing Shenzhen Co ltdfiledCriticalSany Intelligent Manufacturing Shenzhen Co ltd
Priority to CN202110269073.0ApriorityCriticalpatent/CN113034138A/en
Publication of CN113034138ApublicationCriticalpatent/CN113034138A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a privacy protection method based on a block chain, which receives inquiry transaction aiming at target privacy data initiated by an inquirer; encrypting the private data by a private key, calculating a HASH value of the private data, packaging the private data after information packaging, information confirmation and block chain consensus, bringing the private data into a block, and storing the private data at the link point of the block in a distributed manner; comparing the HASH value of the applied privacy authentication information with the corresponding HASH value on the block chain, and returning a comparison result; and under the condition that the query condition of the returned comparison result is met, reading target privacy data into the trusted execution environment of the block chain node for decryption so that the inquirer acquires corresponding decrypted data, and performing decrement update on the query quota. The existing privacy authentication mode of the invention needs to pay higher cost, but the privacy authentication authorization cost by adopting the block chain technology is almost ignored, and the penetration type supervision of the block chain system is realized.

Description

Privacy protection method based on block chain
Technical Field
The invention relates to a privacy protection method based on a block chain, and belongs to the technical field of artificial intelligence.
Background
Blockchains are a term of art in information technology. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect. Many public chain transactions exist that are publicly transparent, such as: bitcoin, etherhouse, EOS, etc. Although the public chain transaction account is anonymous, the amount of the transaction is public and transparent due to the initiator and the receiver of each transaction, the specific person of the anonymous account corresponding to the real world can be inquired in an indirect mode by searching the transaction record, and particularly, the traditional privacy authentication information is submitted to a third-party service platform in a clear text, so that privacy leakage is easily caused. Therefore, a privacy protection method based on a block chain is urgently needed to solve the problem existing in the prior art.
In order to solve the technical problems, a new technical scheme is especially provided.
Disclosure of Invention
The present invention is directed to a privacy protection method based on a block chain, so as to solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a privacy protection method based on a blockchain, the method comprising the steps of:
receiving a query transaction aiming at target privacy data initiated by a query party;
encrypting the private data through a private key, calculating a HASH value of the private data, packaging and incorporating the private data into a block after information packaging, information confirmation and block chain consensus are completed, and storing the private data at the link points of the block in a distributed mode;
step three, comparing the HASH value of the applied privacy authentication information with the corresponding HASH value on the block chain, and returning a comparison result;
reading target privacy data into a trusted execution environment of the block chain node for decryption under the condition that a query condition of a returned comparison result is met, so that the inquirer acquires corresponding decrypted data, and performing decrement updating on the query quota;
step five, registering a messagebase account on the application of each connection block chain node; the messagebase is a message address;
and step six, carrying out application message communication between the same block chain nodes or message communication between different block chain nodes by adopting the registered new messagebase, wherein the content of the message communication is provided with a selective uplink chain, so that the evidence is convenient to retain.
Preferably, the first step of auditing the query transaction of the private data after the query transaction, wherein the auditing mode includes:
step 1, the auditing node decrypts and verifies the private transaction Tx-AB, signs the transaction hash value HAB after the verification is passed, and then sends the signature to A;
step 2, the node A encrypts the transaction by using the same AES key in the S1, encrypts the AES key by using the public key of the node B, and sends the encrypted private transaction, the hash value of the transaction and the encrypted AES key to the node B;
step 3, after receiving the privacy transaction Tx-AB, the node B sends confirmation information to the node A;
step 4, the node A broadcasts the hash value of Tx-AB and the signature of the auditing node;
step 5, other nodes directly pack the hash value of the privacy transaction and the signature of the auditing node into a block after receiving the hash value and the signature;
and 6, after receiving the block containing the Tx-AB, the node A and the node B decrypt the transaction, execute the transaction and update the private state.
Preferably, the step four data query condition includes that the query quota has not been exhausted.
Preferably, the information package is a complete data block combined by a data block encrypted by an asymmetric encryption algorithm and the personal signature information.
Compared with the prior art, the invention has the beneficial effects that: the existing privacy authentication mode needs to pay higher cost, but the privacy authentication authorization cost by adopting the block chain technology is almost ignored, and the penetration supervision of the block chain system is realized. The supervision node can monitor the health state of the blockchain system in real time, and audit on private transactions, private data and behaviors of other nodes is achieved.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a technical scheme that: a privacy protection method based on a blockchain, the method comprising the steps of:
receiving a query transaction aiming at target privacy data initiated by a query party;
encrypting the private data through a private key, calculating a HASH value of the private data, packaging and incorporating the private data into a block after information packaging, information confirmation and block chain consensus are completed, and storing the private data at the link points of the block in a distributed mode;
step three, comparing the HASH value of the applied privacy authentication information with the corresponding HASH value on the block chain, and returning a comparison result;
reading target privacy data into a trusted execution environment of the block chain node for decryption under the condition that a query condition of a returned comparison result is met, so that the inquirer acquires corresponding decrypted data, and performing decrement updating on the query quota;
step five, registering a messagebase account on the application of each connection block chain node; the messagebase is a message address;
and step six, carrying out application message communication between the same block chain nodes or message communication between different block chain nodes by adopting the registered new messagebase, wherein the content of the message communication is provided with a selective uplink chain, so that the evidence is convenient to retain.
Preferably, the first step of auditing the query transaction of the private data after the query transaction, wherein the auditing mode includes:
step 1, the auditing node decrypts and verifies the private transaction Tx-AB, signs the transaction hash value HAB after the verification is passed, and then sends the signature to A;
step 2, the node A encrypts the transaction by using the same AES key in the S1, encrypts the AES key by using the public key of the node B, and sends the encrypted private transaction, the hash value of the transaction and the encrypted AES key to the node B;
step 3, after receiving the privacy transaction Tx-AB, the node B sends confirmation information to the node A;
step 4, the node A broadcasts the hash value of Tx-AB and the signature of the auditing node;
step 5, other nodes directly pack the hash value of the privacy transaction and the signature of the auditing node into a block after receiving the hash value and the signature;
and 6, after receiving the block containing the Tx-AB, the node A and the node B decrypt the transaction, execute the transaction and update the private state.
Preferably, the step four data query condition includes that the query quota has not been exhausted.
Preferably, the information package is a complete data block combined by a data block encrypted by an asymmetric encryption algorithm and the personal signature information.
When the system is used, the existing privacy authentication mode needs to pay higher cost, but the privacy authentication authorization cost by adopting the block chain technology is almost ignored, and the penetration supervision of the block chain system is realized. The supervision node can monitor the health state of the blockchain system in real time, and audit on private transactions, private data and behaviors of other nodes is achieved.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (4)

CN202110269073.0A2021-03-122021-03-12Privacy protection method based on block chainPendingCN113034138A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202110269073.0ACN113034138A (en)2021-03-122021-03-12Privacy protection method based on block chain

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202110269073.0ACN113034138A (en)2021-03-122021-03-12Privacy protection method based on block chain

Publications (1)

Publication NumberPublication Date
CN113034138Atrue CN113034138A (en)2021-06-25

Family

ID=76470123

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202110269073.0APendingCN113034138A (en)2021-03-122021-03-12Privacy protection method based on block chain

Country Status (1)

CountryLink
CN (1)CN113034138A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113902431A (en)*2021-09-262022-01-07东软集团股份有限公司Block chain transaction method and device, storage medium and electronic equipment
CN114598554A (en)*2022-05-092022-06-07山东省计算中心(国家超级计算济南中心) Method and system for protecting user privacy data in application programs
CN115085905A (en)*2022-07-152022-09-20上汽通用五菱汽车股份有限公司Transaction data evidence checking method, device, equipment and medium based on block chain
CN115459928A (en)*2022-09-062022-12-09中国建设银行股份有限公司 Data sharing method, device, equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109472601A (en)*2018-11-212019-03-15北京蓝石环球区块链科技有限公司The block chain framework of privacy transaction can be supervised
CN110309663A (en)*2019-06-252019-10-08湖南搜云网络科技股份有限公司Privacy authenticating method and system based on block chain
CN110365773A (en)*2019-07-172019-10-22湖南智慧政务区块链科技有限公司Information communication method based on block chain message addresses
CN111222157A (en)*2019-10-302020-06-02支付宝(杭州)信息技术有限公司Method and device for inquiring block chain private data
CN111475829A (en)*2019-11-082020-07-31支付宝(杭州)信息技术有限公司Private data query method and device based on block chain account

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109472601A (en)*2018-11-212019-03-15北京蓝石环球区块链科技有限公司The block chain framework of privacy transaction can be supervised
CN110309663A (en)*2019-06-252019-10-08湖南搜云网络科技股份有限公司Privacy authenticating method and system based on block chain
CN110365773A (en)*2019-07-172019-10-22湖南智慧政务区块链科技有限公司Information communication method based on block chain message addresses
CN111222157A (en)*2019-10-302020-06-02支付宝(杭州)信息技术有限公司Method and device for inquiring block chain private data
CN111475829A (en)*2019-11-082020-07-31支付宝(杭州)信息技术有限公司Private data query method and device based on block chain account

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113902431A (en)*2021-09-262022-01-07东软集团股份有限公司Block chain transaction method and device, storage medium and electronic equipment
CN114598554A (en)*2022-05-092022-06-07山东省计算中心(国家超级计算济南中心) Method and system for protecting user privacy data in application programs
CN115085905A (en)*2022-07-152022-09-20上汽通用五菱汽车股份有限公司Transaction data evidence checking method, device, equipment and medium based on block chain
CN115459928A (en)*2022-09-062022-12-09中国建设银行股份有限公司 Data sharing method, device, equipment and medium

Similar Documents

PublicationPublication DateTitle
CN113034138A (en)Privacy protection method based on block chain
CN114866323B (en)User-controllable privacy data authorization sharing system and method
CN113988863B (en) A supervised online payment privacy protection method, device and electronic device
CN107425982B (en)Method and block chain for realizing intelligent contract data encryption
US10396984B2 (en)Apparatus and system having multi-party cryptographic authentication
CN113489733A (en)Block chain-based content center network privacy protection method
CN107911216A (en)A kind of block chain transaction method for secret protection and system
CN102571329B (en)Password key management
CN109561110B (en) A SGX-based cloud platform audit log protection method
US9215070B2 (en)Method for the cryptographic protection of an application
US20210217004A1 (en)Data processing method, apparatus, device, and medium in blockchain fund settlement system
US20230362002A1 (en)Systems and methods for block data security for digital communications from a physical device
US12210658B2 (en)Executing entity-specific cryptographic code in a cryptographic
CN111639952A (en)Returned goods checking method, returned goods checking system, returned goods checking server and returned goods checking terminal based on block chain
CN111159257A (en)Tax certification query method and system based on block chain
CN111327419A (en)Method and system for resisting quantum computation block chain based on secret sharing
CN109995715A (en)Private data encipher-decipher method, device, equipment and the storage medium of block chain
CN112671729B (en)Internet of vehicles oriented anonymous key leakage resistant authentication method, system and medium
CN102419810B (en)High-reliability electronic medical record proving method
WO2025129873A1 (en)Cross-institution blacklist sharing method and system based on reusable garbled circuit
CN116132185B (en)Data calling method, system, device, equipment and medium
Patil et al.A review on contemporary security issues of cloud computing
CN109672522A (en)A kind of key querying method and cloud platform
NeelaDSDOS Cloud: A Decentralized Secure Data Outsourcing System With Hybrid Encryption, Blockchain Smart Contract‐Based Access Control, and Hash Authentication Codes for Cloud Security
Guo et al.Supply chain optimization: cross-chain data privacy protection scheme based on semi-homomorphic encryption.

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20210625


[8]ページ先頭

©2009-2025 Movatter.jp