Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure data access method for alliance chain

An access method and security data technology, applied in digital data protection, electronic digital data processing, computer security devices, etc., can solve problems such as alliance chain data leakage

Active Publication Date: 2021-04-02
浙江数秦科技有限公司
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is: the current technical problem that the alliance chain data has a risk of leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure data access method for alliance chain
  • Secure data access method for alliance chain
  • Secure data access method for alliance chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] A secure data access method for alliance chains, comprising the following steps:

[0034] Step A) Build the access proxy layer 200:

[0035] Such as figure 1 As shown, the external consensus protocol is released on the alliance chain, and the alliance chain nodes Open up the chain data storage area 300 on its own storage device, and the external consensus protocol takes over the data access authority of the chain data storage area 300, and records the chain data storage area 300 as a storage node , The number of nodes in the alliance chain is 100, and the external consensus protocol will store the nodes Unified addressing of the storage space, and set the data buffer , alliance chain node It only knows its own unified address.

[0036] Step B) Data storage:

[0037] Such as figure 2 As shown, the data Stored procedures include:

[0038] Step B1) Consortium chain node Submit data storage requirements to the external consensus protocol, and the data to...

Embodiment 2

[0053] A secure data access method for consortium chains, this embodiment is based on the first embodiment, the storage node The unified addressing of the storage space has been improved, such as Figure 5 As shown, in step A), the external consensus protocol will store the node The method for unified addressing of the storage space includes: Step A1) The external consensus protocol according to the storage node The size of the storage space allocates multiple addressing intervals, and each addressing interval can index storage nodes of all storage space and there is surplus; step A2) storage nodes Randomly extract some addresses from each addressing interval as false addresses, addressing as false addresses points to the same storage area, and the rest of the addressing points to the real storage area; step A3) storage node Set the order of multiple addressing intervals, and set the addressing switching cycle. After each switching cycle, the storage node Loop switc...

Embodiment 3

[0055] A secure data access method for consortium chains. This embodiment is based on the first embodiment, and the participating data The access consortium chain node 100 has been further improved. In this embodiment, the alliance chain node Submit data storage requirements to the external consensus protocol, and the data to be stored is , the external consensus protocol randomly selects storage nodes middle Participate in storing data as , will participate in storage nodes and their order are recorded in tabular form and identified with the data The association is stored in the alliance chain node Corresponding storage node On the alliance chain node need to restore data , recorded according to the table storage nodes and their order, construct secure multi-party computations, obtain recovered data , to complete the data access. This embodiment records that the technical solution is suitable for data access of consortium chains with many nodes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of block chains, in particular to a security data access method for an alliance chain, which comprises the following steps: A) access agent layer construction: an external consensus protocol is published, and the storage space of a storage node is uniformly addressed; B) data storage: B1) the alliance chain node submits a data storage demand; B2) the external consensus protocol sequentially distributes the data to the storage nodes, and the storage nodes decide whether to receive the data or not according to a certain probability; B3) the alliance chain node associates the data identifier with the storage addresses; and C) data extraction: C1) the alliance chain node submits a data extraction demand, C2) calculates whether an output address is areal storage address through a secure multi-party, and C3) performs external consensus protocol splicing to obtain data and complete data extraction, The method has the substantive effects that the data can be obtained only in the alliance chain, and the data on the alliance chain is ensured not to be leaked.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a secure data access method for consortium chains. Background technique [0002] In the framework of the alliance chain, a block chain is built between institutions, and the data is visible in each institution of the alliance chain. In some scenarios with high data security requirements, members within the alliance do not want organizations outside the alliance to be able to obtain data on the alliance chain. At this point, access control to the data on the consortium chain is required. The access control of alliance chain data is mainly divided into two aspects: access control of communication data on the chain and access control of node storage data. Access control of communication data on the chain is accomplished through node certificates and SSL. The current access control of node storage data uses disk encryption. The nodes in the consortium chain encrypt the data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6218G06F21/64
Inventor 张金琳袁超俞学劢
Owner 浙江数秦科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products