Unlock instant, AI-driven research and patent intelligence for your innovation.

A secure data access method for consortium chain

An access method and security data technology, applied in digital data protection, electronic digital data processing, computer security devices, etc., can solve problems such as alliance chain data leakage

Active Publication Date: 2021-06-08
浙江数秦科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is: the current technical problem that the alliance chain data has a risk of leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure data access method for consortium chain
  • A secure data access method for consortium chain
  • A secure data access method for consortium chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] A secure data access method for alliance chains, comprising the following steps:

[0034] Step A) Build the access proxy layer 200:

[0035] Such as figure 1 As shown, the external consensus protocol is released on the alliance chain, and the alliance chain nodes Open up the chain data storage area 300 on its own storage device, and the external consensus protocol takes over the data access authority of the chain data storage area 300, and records the chain data storage area 300 as a storage node , The number of nodes in the alliance chain is 100, and the external consensus protocol will store the nodes Unified addressing of the storage space, and set the data buffer , alliance chain node It only knows its own unified address.

[0036] Step B) Data storage:

[0037] Such as figure 2 As shown, the data Stored procedures include:

[0038] Step B1) Consortium chain node Submit data storage requirements to the external consensus protocol, and the data to...

Embodiment 2

[0053] A secure data access method for consortium chains, this embodiment is based on the first embodiment, the storage node The unified addressing of the storage space has been improved, such as Figure 5 As shown, in step A), the external consensus protocol will store the node The method for unified addressing of the storage space includes: Step A1) The external consensus protocol according to the storage node The size of the storage space allocates multiple addressing intervals, and each addressing interval can index storage nodes of all storage space and there is surplus; step A2) storage nodes Randomly extract part of the address from each addressing interval as a false address, addressing as a false address points to the same storage area, and the rest of the addressing points to the real storage area; step A3) storage node Set the order of multiple addressing intervals, and set the addressing switching cycle. After each switching cycle, the storage node Loop ...

Embodiment 3

[0055] A secure data access method for consortium chains. This embodiment is based on the first embodiment, and the participating data The access consortium chain node 100 has been further improved. In this embodiment, the alliance chain node Submit data storage requirements to the external consensus protocol, and the data to be stored is , the external consensus protocol randomly selects storage nodes middle Participate in storing data as , will participate in storage nodes and their order are recorded in tabular form and identified with the data The association is stored in the alliance chain node Corresponding storage node On the alliance chain node need to restore data , recorded according to the table storage nodes and their order, construct secure multi-party computations, obtain recovered data , to complete the data access. This embodiment records that the technical solution is suitable for data access of consortium chains with many nodes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the technical field of blockchain, and specifically relates to a secure data access method for alliance chains, including: A) constructing an access agent layer: publishing an external consensus protocol, and uniformly addressing the storage space of storage nodes; B) Data storage: B1) Consortium chain nodes submit data storage requirements; B2) The external consensus protocol will be distributed to storage nodes in turn, and the storage nodes will decide whether to accept it with a certain probability; B3) Consortium chain nodes will associate the data identifier with a storage address; C ) Data extraction: C1) Consortium chain nodes submit data extraction requirements; C2) Whether the output address through secure multi-party calculation is the real storage address; C3) External consensus protocol splicing to obtain data and complete data extraction. The substantive effect of the present invention is: the data can only be obtained in the alliance chain, ensuring that the data on the alliance chain will not be leaked.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a secure data access method for consortium chains. Background technique [0002] In the framework of the alliance chain, a block chain is built between institutions, and the data is visible in each institution of the alliance chain. In some scenarios with high data security requirements, members within the alliance do not want organizations outside the alliance to be able to obtain data on the alliance chain. At this point, access control to the data on the consortium chain is required. The access control of alliance chain data is mainly divided into two aspects: access control of communication data on the chain and access control of node storage data. Access control of communication data on the chain is accomplished through node certificates and SSL. The current access control of node storage data uses disk encryption. The nodes in the consortium chain encrypt the data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6218G06F21/64
Inventor 张金琳袁超俞学劢
Owner 浙江数秦科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More