WO2021253299A1 - 数据处理方法、存储介质、电子设备及数据交易系统 - Google Patents
数据处理方法、存储介质、电子设备及数据交易系统 Download PDFInfo
- Publication number
- WO2021253299A1 WO2021253299A1 PCT/CN2020/096652 CN2020096652W WO2021253299A1 WO 2021253299 A1 WO2021253299 A1 WO 2021253299A1 CN 2020096652 W CN2020096652 W CN 2020096652W WO 2021253299 A1 WO2021253299 A1 WO 2021253299A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- program
- node
- transaction
- data processing
- Prior art date
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 42
- 238000012545 processing Methods 0.000 claims abstract description 96
- 238000000034 method Methods 0.000 claims abstract description 64
- 238000012552 review Methods 0.000 claims abstract description 45
- 230000005540 biological transmission Effects 0.000 claims abstract description 34
- 238000012795 verification Methods 0.000 claims description 61
- 230000008569 process Effects 0.000 claims description 23
- 238000012550 audit Methods 0.000 claims description 18
- 239000000284 extract Substances 0.000 claims description 16
- 230000007246 mechanism Effects 0.000 claims description 13
- 238000004590 computer program Methods 0.000 claims description 6
- 230000006870 function Effects 0.000 claims description 4
- 238000004891 communication Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 238000011161 development Methods 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 238000005259 measurement Methods 0.000 description 3
- 101000932768 Conus catus Alpha-conotoxin CIC Proteins 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000013075 data extraction Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 101000983970 Conus catus Alpha-conotoxin CIB Proteins 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Definitions
- the present disclosure relates to the field of data processing, and in particular, to a data processing method, storage medium, electronic equipment, and data transaction system.
- the purpose of the present disclosure is to provide a data processing method, storage medium, electronic equipment, and data transaction system to solve technical problems existing in related technologies.
- the present disclosure provides a data processing method, including: extracting a data transaction program from a blockchain network, the data transaction program is written into the blockchain network after the program is approved, wherein The approval of the program at least indicates that the data processing method of the data transaction program is consistent with the data processing method agreed in the data transaction contract; the data transaction program is run in the trusted execution environment TEE of the computer, wherein the data The transaction program is used to obtain data from a data source based on a secure transmission channel, and process the data; to obtain the program output result of the data transaction program.
- the data transaction program is reviewed in the following manner: the program review node obtains the data transaction program uploaded by the program developer; in determining how the data transaction program processes the data and the blockchain network If the data processing methods agreed in the data transaction contract are consistent, sign the data transaction program according to the private key of the data review node; write the signed data transaction program into the blockchain network;
- the running the data transaction program in the trusted execution environment TEE of the computer includes: signing the data transaction program extracted from the blockchain network according to the public key of the program audit node, and signing After the authentication is successful, the data transaction program is run in the trusted execution environment TEE of the computer.
- the data transaction contract is stored in the blockchain network after being signed by both parties of the data transaction, and the data transaction contract includes at least one of the following: the program output result of the data transaction program does not include the input office The data processed by the data transaction program; the method of extracting data from the data source; the quantity restriction information of extracting data from the data source.
- the running the data transaction program in the trusted execution environment TEE of the computer includes: performing legality verification and integrity verification on the running code and data of the data transaction program based on the TEE verification mechanism; After the legality verification and the integrity verification, the data transaction program is run.
- the data transaction program includes a data access program and a data processing program.
- the data transaction program acquiring data from a data source based on a secure transmission channel includes: The included random number and/or quantity restriction condition information is signed to obtain signature information; the signature information is sent to the data access program, wherein the data access program determines that the signature authentication of the signature information is successful Establish a secure transmission channel with the data processing program, so that the data processing program obtains data from the data source through the secure transmission channel based on the data access program.
- a data transaction system including: a program review node, a data buyer node, and a data seller node; the program review node is used to review the data transaction program developed by the program development node, and determine When the data processing method of the data transaction program is consistent with the data processing method agreed in the data transaction contract in the blockchain network, the data transaction program is signed according to the private key of the data review node, and The signed data transaction program is written into the blockchain network; one of the data seller node and the data buyer node can be used by a data processing node to run the data transaction program, and the data processing node For performing the steps of the method described in the first aspect of the present disclosure.
- the data transaction program includes a data access program and a data processing program
- the data seller node runs the data access program and the data processing program as the data processing node
- the data processing node is specifically used for : Extract the data access program and the data processing program from the blockchain network, and run the data access program and the data processing program in the trusted execution environment TEE of the computer, and obtain the data The program output result of the processing program; wherein the data access program is used to obtain data from a data source, and the data processing program is used to obtain the data based on the secure transmission channel between the data processing program and the data access program. Data, and output the program output result after processing the data.
- the data processing node is configured to: verify the data access program and the data processing program according to the public key of the program review node, and when determining the data access program and the data processing program After passing the review of the program review node, run the data access program and the data processing program in the TEE.
- the data processing node is further used to: based on the TEE verification mechanism, perform legality verification and integrity verification on the running code and data of the data processing program and the data access program; After the verification and the integrity verification, the data processing program and the data access program are run.
- the data buyer node is configured to sign the random number and/or quantity restriction information included in the data processing contract according to the private key of the data buyer node to obtain the first signature information, and
- the first signature information is sent to the data access program, and the random number included in the data processing contract is signed according to the private key of the data buyer node to obtain the second signature information, and the second
- the signature information is sent to the data processing program;
- the data processing node is also used to: verify the first signature information and the second signature information based on the public key of the data buyer node, in the first After both the signature information and the second signature information are verified, the data access program and the data processing program are run in the TEE.
- the data transaction program includes a data access program and a data processing program, and the data buyer node runs the data access program and the data processing program as the data processing node; the data processing node is specifically used for : Extract the data access program and the data processing program from the blockchain network, and run the data access program and the data processing program in the trusted execution environment TEE of the computer to obtain the data processing The program output result of the program; wherein the data access program is used to obtain data from a data source, and the data processing program is used to obtain the data based on a secure transmission channel between the data processing program and the data access program , And output the program output result after processing the data.
- the data transaction program includes a data access program and a data processing program, the data seller node runs the data access program, and the data buyer node runs the data processing program;
- the data seller node is specifically used to: extract the data access program from the blockchain network, and run the data access program in the trusted execution environment TEE of the computer, wherein the data access program is based on security
- the transmission channel obtains data from the data source
- the data buyer node is specifically used to: extract the data processing program from the blockchain network, and run the data processing program in the trusted execution environment TEE of the computer to obtain The program output result of the data processing program; wherein the data processing program is used to obtain the data based on the secure transmission channel between the data processing program and the data access program, and to process the data Then output the output result of the program.
- the data seller node is further configured to: verify the data access program according to the public key of the program review node, and after determining that the data access program has passed the review by the program review node, The data access program is run in the TEE; the data buyer node is also used to: verify the data processing program according to the public key of the program review node, and when it is determined that the data processing program has passed the data processing program After the review of the program review node, the data processing program is run in the TEE.
- the data seller node is used to sign the random number and/or quantity restriction information included in the data processing contract according to the private key of the data seller node to obtain the first signature information, and then Sending the first signature information to the data access program;
- the data buyer node is used to sign the random number included in the data processing contract according to the private key of the data buyer node to obtain second signature information, and send the second signature information to the data processing Program; the data seller node is also used to verify the second signature information based on the public key of the data buyer node, after the second signature information is verified, run the data access in the TEE Program; the data buyer node is also used to verify the first signature information based on the public key of the data seller node, and after the first signature information is verified, run the data processing in the TEE program.
- a third aspect of the present disclosure provides a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, the steps of the method described in the first aspect of the present disclosure are implemented.
- an electronic device including a memory and a processor, and a computer program is stored in the memory, and the processor is configured to execute the computer program in the memory to implement the steps of the method in the first aspect of the present disclosure.
- the data transaction program is run in the computer's trusted execution environment TEE, and the original data is extracted and processed in the form agreed in the data transaction contract through the data transaction program, and the output result is obtained. Because of the program running in the TEE Free from the interference of external hardware and software, the original data will be processed according to the form in the data transaction contract, thereby reducing the resale, copying, sharing and abuse of data, and improving the data security in data transactions.
- Fig. 1 is a schematic diagram showing a data transaction system according to an exemplary disclosed embodiment.
- Fig. 2 is a schematic diagram showing another data transaction system according to an exemplary disclosed embodiment.
- Fig. 3 is a flowchart showing a data processing method according to an exemplary disclosed embodiment.
- Fig. 4 is a schematic diagram showing a transaction process of a data transaction system according to an exemplary disclosed embodiment.
- Fig. 5 is a block diagram showing an electronic device according to an exemplary disclosed embodiment.
- the present disclosure can be applied to scenarios of data circulation, including scenarios where the data provider is unwilling to copy, resell, share, and abuse the data in ways other than agreed upon.
- the data transaction program is written into the blockchain network. Due to the characteristic that the data in the blockchain network is difficult to be tampered with, the security of the data transaction program can be guaranteed.
- the data transaction program in this disclosure is a program that runs in TEE (Trusted Execution Environment).
- TEE is a secure area in the processor, which provides a safe and isolated operating environment for the program to run. It is guaranteed that the code and data running in it will not be illegally obtained by external software (including operating system, BIOS, etc.) or hardware (including other areas of the processor).
- external software including operating system, BIOS, etc.
- hardware including other areas of the processor.
- TEE can be implemented through ARM TrustZone, Intel SGX, etc.
- Fig. 1 is a schematic diagram showing a data transaction system according to an exemplary disclosed embodiment.
- the data transaction system 100 includes a program review node 101, a data buyer node 102, and a data seller node 103, wherein ,
- the program review node can review the data transaction program and write the signed data transaction program into the blockchain network; either the data seller node 103 or the data buyer node 102 can extract the data transaction program from the blockchain network , And run the data transaction program in TEE to obtain the program output result.
- the program review node 101 can obtain the data transaction program uploaded by the program developer, and review whether the data processing method of the data transaction program is consistent with the data processing method agreed in the data transaction contract stored in the blockchain network, if If yes, sign the data transaction program according to its own private key, and write the signed data transaction program into the blockchain network.
- the data processing method can refer to whether the output result of the program includes the input data, the method of extracting the data from the data source, any one of the three of the three kinds of information, or the three of the three. Any combination of.
- the program review node can It is used to review whether the data transaction program only outputs the data processing results without outputting the source data, whether the data transaction program extracts data from the B database based on the A interface/contract, and whether the data transaction program's online access to the data volume is X.
- the data transaction program can be directly uploaded to the blockchain network, and the program review node can directly upload the data transaction program to the blockchain network after reviewing the data transaction program uploaded to the blockchain network.
- the data transaction program in the block chain network is signed, and the step of uploading the data transaction program by the program review node is omitted.
- the program review node can be either the data seller or the data buyer, that is, the data review node can be the same node as the data seller node, or it can be the same node as the data buyer node; the program review The node may also be a third-party node, such as the maintainer of the data transaction system.
- the program developer can also be either the data seller or the data buyer, or a third party agreed by both parties to the transaction. That is to say, the uploaded data transaction program can be either a data seller node or a data buyer node.
- the nodes are uploaded to the blockchain network.
- the program seller can develop a data transaction program for processing data to obtain the processing result of the agreed demand according to the agreed requirements of both parties, and upload it to the blockchain network through the data seller node, and the data buyer node can obtain the data transaction program.
- the data transaction program in the blockchain network when it is verified that the processing method of the data is the same as the agreement, it is signed with its own private key.
- the data seller node 103 is used as the data processing node to run the data transaction program, which is specifically used to extract the data transaction program from the blockchain network.
- the data transaction program is written into the data transaction program after the program is approved.
- the approval of the program at least indicates that the data processing method of the data transaction program is consistent with the data processing method agreed in the data transaction contract; the data transaction program is run in the TEE, where all The data transaction program is used to obtain data from a data source based on a secure transmission channel, and process the data; and obtain the program output result of the data transaction program.
- the signature of the data transaction program can also be verified through the public key of the program review node, so as to verify whether the data transaction program passes the review by the program review node. After the signature verification is passed, the data can be run. Transaction program, if the signature verification fails, the program may not be run, so that it can be found that the data transaction program has been maliciously tampered with before running, preventing others from tampering with the data transaction program to obtain the source data, and protecting the security of the data sex.
- a verification strip Quote is generated by a data transaction program, which includes the developer’s public key fingerprint and other information.
- a verification strip Quote is generated by a data transaction program, which includes the developer’s public key fingerprint and other information.
- the developer’s public key fingerprint included in the Quote and the developer secret recorded in the data transaction contract in the blockchain network Whether the key information is consistent can determine whether the program running in the TEE is a specified program, thereby preventing the data transaction program from being maliciously replaced, thereby preventing the behavior of obtaining source data by replacing the program to be run, thereby improving the security of the data.
- the data transaction program Before running the data transaction program, you can also sign the random number/quantity restriction information in the data transaction contract according to the private key of the data processing node, and send the signature information to the data transaction program. After the data transaction program verifies the signature information Run to determine that the node running the data transaction program is the designated node, so as to prevent nodes other than the agreed node in the data transaction contract from running the program to obtain the data processing result, and to ensure that the data transaction program is running on the agreed node. So as to ensure the security of the data.
- the data transaction program may include a data access program and a data processing program.
- the data access program is used to obtain data from a data source
- the data processing program is used to obtain data based on the difference between the data processing program and the data access program.
- the secure transmission channel between the two obtains the data, and outputs the program output result after processing the data.
- the data access program and the data processing program can be developed by the same developer or by different developers, can be reviewed by the same program review node, or can be reviewed by different program review nodes.
- the data access program can be developed by the data seller and uploaded to the blockchain network by the data buyer node, with the data buyer as the program reviewer and the data buyer node as the program review node to review the data access program;
- the data processing program can be developed by the data buyer and uploaded to the blockchain network by the data seller node.
- the data seller is the program reviewer and the data seller node is the program review node to review the data processing program.
- the data processing program may be set differently according to different data transaction contracts, but the data access program can be through the characteristics of the data access interface, from the preset multiple data access programs
- the upper limit of the data access of the data access program can be set differently according to the data access contract, and is reviewed by the data review node.
- the data access program and the data transaction program can be run on either the data seller node or the data buyer node.
- the data seller node is used as the data processing node to run the data access program and the data processing program as an example for description.
- the data buyer node signs the random number and/or quantity restriction information included in the data processing contract according to the private key of the data buyer node to obtain the first signature information, and
- the first signature information is sent to the data access program, and the random number included in the data processing contract is signed according to the private key of the data buyer node to obtain the second signature information, and the second Sending the signature information to the data processing program;
- the data seller node verifies the first signature information and the second signature information based on the public key of the data buyer node. After both the first signature information and the second signature information are verified, The data access program and the data processing program are run in the TEE.
- the data seller node can sign the data access program and data processing program, and the data buyer node verifies the signature to determine the identity of the transaction object Run the program to improve data security in data transactions.
- the data seller node runs the data transaction program (including the data access program and the data processing program) as an example in this embodiment, the present disclosure does not run the data transaction program on the data seller node or the data buyer node.
- the data buyer node runs the data transaction program, it is only necessary to adapt the content executed by the data seller node in the example of this embodiment and the related signature to be executed by the data buyer node.
- the content executed by the data buyer node and the related signature adaptive transformation in the example of the embodiment are executed by the data seller node.
- the data transaction program is run in the computer's trusted execution environment TEE, and the original data is extracted and processed in the form agreed in the data transaction contract through the data transaction program, and the output result is obtained. Because of the program running in the TEE Free from the interference of external hardware and software, the original data will be processed according to the form in the data transaction contract, thereby reducing the resale, copying, sharing and abuse of data, and improving the data security in data transactions.
- the data transaction program can be prevented from being tampered with, being replaced, or being run on other nodes. Data security.
- Fig. 2 is a schematic diagram showing a data transaction system according to an exemplary disclosed embodiment.
- the data transaction system 200 may include a program review node 201, a data buyer node 202, and a data seller node 203, and the data
- the transaction program includes a data access program and a data processing program.
- the program review node 201 reviews the data access program and data processing program, it uploads it to the blockchain network, and the data buyer node 202 extracts and runs data from the blockchain network Processing program, the data seller node 203 extracts and runs the data access program from the blockchain network.
- the program review node 201 can obtain the data access program and data processing program uploaded by the program developer, and verify whether the data access program and the data processing program process the data in the same way as the data transaction contract stored in the blockchain network The agreed data processing method is the same. If it is, the data access program and data processing program are signed according to their own private key, and the signed data access program and data processing program are written into the blockchain network.
- the data processing method can refer to whether the output result of the program includes the input data, the method of extracting the data from the data source, any one of the three of the three kinds of information, or the three of the three. Any combination of.
- the program review node can It is used to verify whether the data processing program only outputs the data processing results without outputting the source data, whether the data access program extracts data from the B database based on the A interface/contract, and whether the data transaction program obtains the online amount of data X.
- the program developer can directly upload the data access program and data processing program to the blockchain network when uploading the program, and the program review node can review the data access program and data uploaded to the blockchain network After processing the program, directly sign the data access program and data processing program in the blockchain network, and save the step of uploading the data access program and data processing program by the program review node.
- the program review node can be either the data seller or the data buyer, that is to say, the data review node can be the same node as the data seller node, or it can be the same node as the data buyer node, or the data seller
- the data buyer and the data buyer respectively audit one of the two programs.
- Both the data seller node and the data seller node can be used as data audit nodes; the program audit node can also be a third-party node, such as the maintainer of the data transaction system.
- the program developer can also be either the data seller or the data buyer.
- the two programs can also be developed by both parties of the data seller and the data buyer.
- the program can also be a third party agreed upon by both parties to the transaction, that is,
- the uploaded data transaction program can be uploaded to the blockchain network by either the data seller node or the data buyer node.
- the data access program can be developed by the data seller and uploaded to the blockchain network by the data buyer node, with the data buyer as the program reviewer and the data buyer node as the program review node to review the data access program;
- the data processing program can be developed by the data buyer and uploaded to the blockchain network by the data seller node.
- the data seller is the program reviewer and the data seller node is the program review node to review the data processing program.
- the data processing program may be set differently according to different data transaction contracts, but the data access program can be through the characteristics of the data access interface, from the preset multiple data access programs
- the upper limit of the data access of the data access program can be set differently according to the data access contract, and is reviewed by the data review node.
- the data seller node verifies the data access program according to the public key of the program review node, and after determining that the data access program has passed the review of the program review node, runs the data access program in the TEE .
- the data seller node running the data access program can verify the data access program based on the public key of the data buyer node.
- the data buyer node verifies the data processing program according to the public key of the program review node, and after determining that the data processing program has passed the review of the program review node, runs the data processing in the TEE program.
- the data buyer node running the data processing program can verify the data processing program based on the public key of the data seller node.
- the data seller node signs the random number and/or quantity restriction information included in the data processing contract according to the private key of the data seller node, obtains the first signature information, and sends the first signature information to the data Access program;
- the data buyer node signs the random number included in the data processing contract according to the private key of the data buyer node, obtains second signature information, and sends the second signature information to the data processing program;
- the data seller node verifies the second signature information obtained from the data processing program based on the public key of the data buyer node, and runs the TEE in the TEE after the second signature information is verified.
- Data access program the data buyer node verifies the first signature information obtained from the data access program based on the public key of the data seller node, and after the first signature information is verified, the TEE Run the data processing program in. Therefore, the program can be run under the condition that the identity of the object running the program is determined to be consistent with the agreed transaction object, and the data security in the data transaction can be improved.
- the data seller node and the data buyer node can also verify the legality of the running code and data of the data access program and data processing program run by itself and the other party based on the TEE verification mechanism And integrity verification; after passing the legality verification and the integrity verification, run the data access program or the data processing program respectively.
- a verification strip Quote is generated by a data access program, which includes information such as the developer's public key fingerprint of the data access program, and the data seller node and data buyer node can both verify the developer's public key fingerprint and block included in the quote.
- a data access program which includes information such as the developer's public key fingerprint of the data access program
- the data seller node and data buyer node can both verify the developer's public key fingerprint and block included in the quote.
- the program running in the TEE is the specified program
- another verification strip Quote is generated by the data processing program, which includes the data The developer’s public key fingerprint of the processing program and other information, the data seller node and the data buyer node can both verify the developer’s public key fingerprint included in the Quote and the development of the data processing program recorded in the data transaction contract in the blockchain network
- the key information of the user is consistent, it can be determined whether the program running in the TEE is the specified program, so as to prevent the data transaction program running by itself or the other party from being maliciously replaced, thereby
- the data transaction program is run in the computer's trusted execution environment TEE, and the original data is extracted and processed in the form agreed in the data transaction contract through the data transaction program, and the output result is obtained. Because of the program running in the TEE Free from the interference of external hardware and software, the original data will be processed according to the form in the data transaction contract, thereby reducing the resale, copying, sharing and abuse of data, and improving the data security in data transactions.
- the data transaction program is divided into data access program and data processing program, which are respectively run by the data seller node and the data buyer node, the data seller node runs the program to extract data from the data source, and the data buyer node runs the original data to calculate the processing result
- the program fixes the data extraction party to the seller, and the data buyer does not interfere with the data extraction, thereby further enhancing the security of data transactions.
- the data transaction program can be prevented from being tampered with, being replaced, or being run on other nodes. Data security.
- Fig. 3 is a flow chart showing a data processing method according to an exemplary disclosed embodiment.
- the data processing method is applied to a data processing node. It is worth noting that in the data transaction system of the present disclosure, both the data seller node and the data seller node can be used as the data processing node to execute the steps of the method. As shown in Figure 3, the data processing method includes the following steps:
- the approval of the program at least indicates that the data processing method of the data transaction program is consistent with the data processing method agreed in the data transaction contract.
- the data transaction program is used to obtain data from a data source based on a secure transmission channel, and process the data.
- the data transaction program is reviewed in the following manner: the program review node obtains the data transaction program uploaded by the program developer; in determining how the data transaction program processes the data and the blockchain network If the data processing methods agreed in the data transaction contract are consistent, sign the data transaction program according to the private key of the data review node; write the signed data transaction program into the blockchain network;
- the running the data transaction program in the trusted execution environment TEE of the computer includes: signing the data transaction program extracted from the blockchain network according to the public key of the program audit node, and signing After the authentication is successful, the data transaction program is run in the trusted execution environment TEE of the computer.
- the data transaction contract is stored in the blockchain network after being signed by both parties of the data transaction, and the data transaction contract includes at least one of the following: the program output result of the data transaction program does not include the input office The data processed by the data transaction program; the method of extracting data from the data source; the quantity restriction information of extracting data from the data source.
- the running the data transaction program in the trusted execution environment TEE of the computer includes: performing legality verification and integrity verification on the running code and data of the data transaction program based on the TEE verification mechanism; After the legality verification and the integrity verification, the data transaction program is run.
- the data transaction program includes a data access program and a data processing program.
- the data transaction program acquiring data from a data source based on a secure transmission channel includes: The included random number and/or quantity restriction condition information is signed to obtain signature information; the signature information is sent to the data access program, wherein the data access program determines that the signature authentication of the signature information is successful Establish a secure transmission channel with the data processing program, so that the data processing program obtains data from the data source through the secure transmission channel based on the data access program.
- the data transaction program is run in the computer's trusted execution environment TEE, and the original data is extracted and processed in the form agreed in the data transaction contract through the data transaction program, and the output result is obtained. Because of the program running in the TEE Free from the interference of external hardware and software, the original data will be processed according to the form in the data transaction contract, thereby reducing the resale, copying, sharing and abuse of data, and improving the data security in data transactions.
- the data transaction program can be prevented from being tampered with, being replaced, or being run on other nodes. Data security.
- Fig. 4 shows the detailed transaction process of the data transaction system provided by the embodiment of the present disclosure. As shown in Figure 4, the process involves 4 types of roles shown in dashed boxes and 5 components shown in solid boxes.
- each role has a different blockchain account, and has an asymmetric key pair composed of a public key and a private key, which is used to prove its identity when publishing information or writing data in the blockchain.
- the responsibilities of the different roles are as follows:
- TEE program developer responsible for the development of data access programs and data processing programs, and publish the developed programs to the blockchain.
- TEE program reviewer The TEE program reviewer is responsible for obtaining the program issued by the TEE program developer from the blockchain and reviewing whether the program has untrusted logic. If the audit is passed, the auditing party uses its own blockchain account to write "safe and reliable" information about the audited program into the blockchain.
- Data seller the owner of the data, responsible for running the data access program.
- Data buyer the data demander, responsible for running the data processing program.
- an entity can become one or more of the above-mentioned roles at the same time.
- the buyer can act as the TEE program developer at the same time to develop the corresponding TEE program, and the seller can act as the TEE program reviewer to review the program.
- the seller can also act as a TEE program developer at the same time to develop the corresponding TEE program, and the buyer can act as the TEE program reviewer to review the program.
- Blockchain responsible for recording data access procedures and data processing procedures and their characteristic information, as well as the audit results of the above procedures.
- the feature information of the above-mentioned access program and data processing program is the Enclave Measurement and the public key of the Enclave developer.
- Transaction contract responsible for recording the transaction agreement reached by the buyer and the seller, for example, it can be agreed: the public key of the blockchain account of the buyer and the seller, the data access program and data processing program used and its characteristic information, the upper limit of the data access (can be infinite), The public key, random number, etc. of the blockchain account of the TEE program reviewer.
- Data access program The program should meet the requirements of the TEE environment used, and it can be a different data processing program depending on the data source.
- the program When using Intel SGX, the program is Intel SGX Enclave.
- the data access program can achieve the following two functions: a) Provide access to the data source for the data processing program; b) Write the actual data access situation (data access volume, etc.) of the data processing program to the blockchain, Used for subsequent billing and settlement.
- the data access program should perform access control on the data access request of the data processing program based on the access restriction conditions specified in the transaction contract recorded in the blockchain, for example, when the amount of data access has reached the upper limit of the contract Request for access.
- the conditions for passing the review of the data access program can be: 1) Whether the data required by the data processing program is read from the data source truly and without error; 2) Whether the actual data access situation is actually written into the blockchain.
- Data processing program The program should meet the requirements of the TEE environment used, and different data processing programs can be used for different data analysis and processing requirements.
- the program is Intel SGX Enclave.
- the data processing program can achieve the following two functions: a) obtain the required data through the data access agent; b) perform calculation and statistics processing on the obtained data, and only output the processing results, and do not output the original data information under any circumstances.
- the conditions for passing the review of the data processing program can be: 1) Whether only the processing results are output, under any circumstances, the original data information is not output in any form or any information that can be derived from the original data.
- Data source responsible for storing seller data, and can serve any type of database system, file system or other data storage services.
- the TEE program developer develops data access programs based on the data source data storage mechanism (such as database type), develops corresponding data processing programs based on data processing and analysis requirements, and publishes the developed programs to the blockchain.
- the data source data storage mechanism such as database type
- the TEE program reviewer obtains the corresponding program from the blockchain and audits the program in accordance with the review conditions. After the review is passed, the TEE program reviewer uses the private key of its own blockchain account to sign the audit result and will review it Write the result and its signature to the blockchain.
- the buyer and seller can reach a transaction contract in any way and write the contract information into the blockchain.
- C1.1 ⁇ C1.2 start the TEE program and the initialization process for the buyer and the seller, including:
- the seller obtains the transaction contract and the data access program agreed in the transaction contract from the blockchain, and checks whether the program has passed the audit.
- the inspection method is: a) Use the public key pair of the TEE program auditor's blockchain account recorded in the transaction contract The audit signature is verified to determine whether the verification is passed; b) to determine whether the audit result is "approved”. If the review is passed, the data access program will be initiated in the TEE environment of the computing platform selected by the seller.
- the seller uses the private key of his own blockchain account to sign the random number in the transaction contract on the blockchain and the upper limit of data access to obtain the signature SignatureA, and enter SignatureA into the data access program. At the same time, the seller enters the data agreed in the transaction contract Information such as the upper limit of access is entered into the data access program.
- the buyer obtains the transaction contract and the data processing program agreed in the transaction contract from the blockchain, and checks whether the program passes the review.
- the inspection method is: a) Use the TEE program recorded in the transaction contract to review the public key pair of the blockchain account of the party The audit signature is verified to determine whether the verification is passed; b) to determine whether the audit result is "approved”. If the review is passed, the data processing program will be initiated in the TEE environment of the computing platform selected by the buyer.
- the buyer uses the private key of his own blockchain account to sign the random number in the transaction contract on the blockchain to obtain the signature SignatureB, and enter the SignatureB into the data access program.
- data access program and the data processing program selected by the above-mentioned buyer and seller can be the same host or different hosts.
- C2.1 ⁇ C2.2 are the process of mutual authentication of data access program and data processing program and establishment of end-to-end secure transmission channel. specifically:
- PS This verification process ensures that the data access program and the data processing program itself have not been tampered with during operation, including tampering with the running party, and not being tampered with by malicious programs such as the operating system/trojan horse of the host)
- the above verification mechanism is implemented using the remote attestation (Remote Attestation) provided by SGX.
- the remote attestation mechanism is: a) Data access program and data processing program generate Quotes respectively (Quote includes Enclave Measurement and Enclave developer public key fingerprints); b) Buyers and sellers exchange Quotes for data access programs and data processing programs; c) The buyer and seller verify the legitimacy of the Quote through the remote verification service provided by SGX; d) The buyer and seller verify whether the Enclave Measurement and the enclave developer public key fingerprint contained in the Quote are consistent with the corresponding information in the transaction contract on the blockchain.
- SignatureA and SignatureB from the data access program and data processing program run by the other party, and use the public key, random number, and upper limit of data access in the transaction contract on the blockchain to verify SignatureA and SignatureB. If verified If it fails, the subsequent process will stop. It is worth noting that this verification process ensures that the data access program and data processing program are run by the buyer and seller specified in the transaction contract.
- the seller gives the data access program the right to access the data source of the seller.
- the buyer and seller respectively control the data access program and the data processing program to establish an end-to-end secure transmission channel.
- the channel can be TLS, VPN or any other channel that guarantees transmission security.
- the subsequent communication between the data access program and the data processing program is here. In a safe passage.
- C3.1 ⁇ C3.3 are the data acquisition and processing procedures. specifically:
- the data processing program requests data from the data access program, and the data access agent responds to the data request of the data processing program according to whether the actual amount of data access exceeds the upper limit of data access agreed in the transaction contract, reads the data from the data source, and Return the data to the data processing program.
- the data processing program calculates the processing logic according to its own data, processes the data accordingly, and outputs the data processing results.
- the data access program uses the private key to sign the actual data access volume of the data processing program, the data access volume and signature are written into the blockchain for subsequent billing and settlement based on the actual business volume.
- Fig. 5 is a block diagram showing an electronic device 500 according to an exemplary embodiment.
- the electronic device can be provided as any node in the data transaction system of the present disclosure for executing any step in the data processing method of the present disclosure .
- the electronic device 500 may include: a processor 501 and a memory 502.
- the electronic device 500 may further include one or more of a multimedia component 503, an input/output (I/O) interface 504, and a communication component 505.
- I/O input/output
- the processor 501 is used to control the overall operation of the electronic device 500 to complete all or part of the steps in the aforementioned data processing method.
- the memory 502 is used to store various types of data to support operations on the electronic device 500. These data may include, for example, instructions for any application or method to operate on the electronic device 500, as well as application-related data. For example, contact data, messages sent and received, pictures, audio, video, etc.
- the memory 502 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as static random access memory (Static Random Access Memory, SRAM for short), electrically erasable programmable read-only memory ( Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-only Memory (Read-Only Memory, ROM for short), magnetic memory, flash memory, magnetic disk or optical disk.
- the multimedia component 503 may include a screen and an audio component.
- the screen may be, for example, a touch screen, and the audio component is used to output and/or input audio signals.
- the audio component may include a microphone, which is used to receive external audio signals.
- the received audio signal may be further stored in the memory 502 or sent through the communication component 505.
- the audio component also includes at least one speaker for outputting audio signals.
- the I/O interface 504 provides an interface between the processor 501 and other interface modules.
- the above-mentioned other interface modules may be a keyboard, a mouse, a button, and the like. These buttons can be virtual buttons or physical buttons.
- the communication component 505 is used for wired or wireless communication between the electronic device 500 and other devices.
- Wireless communication such as Wi-Fi, Bluetooth, Near Field Communication (NFC), 2G, 3G, 4G, NB-IOT, eMTC, or other 5G, etc., or one or more of them
- the corresponding communication component 505 may include: a Wi-Fi module, a Bluetooth module, an NFC module, and so on.
- the electronic device 500 may be used by one or more application specific integrated circuits (Application Specific Integrated Circuit, ASIC for short), digital signal processor (Digital Signal Processor, DSP for short), and digital signal processing equipment (Digital Signal Processor for short).
- ASIC Application Specific Integrated Circuit
- DSP Digital Signal Processor
- DSP Digital Signal Processor
- Digital Signal Processor Digital Signal Processor for short
- Signal Processing Device DSPD for short
- PLD Programmable Logic Device
- FPGA Field Programmable Gate Array
- controller microcontroller, microprocessor or other electronic components Realization, used to execute the above-mentioned data processing method.
- a computer-readable storage medium including program instructions that, when executed by a processor, implement the steps of the above-mentioned data processing method.
- the computer-readable storage medium may be the foregoing memory 502 including program instructions, and the foregoing program instructions may be executed by the processor 501 of the electronic device 500 to complete the foregoing data processing method.
- a data processing method comprising: extracting a data transaction program from a blockchain network, the data transaction program is written into the blockchain network after the program is approved, wherein the program is approved At least it shows that the data processing method of the data transaction program is consistent with the data processing method agreed in the data transaction contract; the data transaction program is run in the trusted execution environment TEE of the computer, wherein the data transaction program is used for security-based
- the transmission channel obtains data from the data source and processes the data; obtains the program output result of the data transaction program.
- the data transaction program is reviewed in the following ways: the program review node obtains the data transaction program uploaded by the program developer; after determining how the data transaction program processes the data and how When the data processing methods agreed in the data transaction contract in the blockchain network are consistent, the data transaction program is signed according to the private key of the data audit node; the signed data transaction program is written into The blockchain network; the running of the data transaction program in the trusted execution environment TEE of the computer includes: the data transaction program extracted from the blockchain network according to the public key pair of the verification node of the program Perform signature verification, and after successful signature verification, run the data transaction program in the trusted execution environment TEE of the computer.
- the data transaction contract is stored in the blockchain network after being signed by both parties of the data transaction, and the data transaction contract includes at least one of the following: The output result of the program does not include the data input to the data transaction program for processing; the method of extracting data from the data source; and the limit information of the quantity of data extracted from the data source.
- the running the data transaction program in the trusted execution environment TEE of the computer includes: verifying the legality of the running code and data of the data transaction program based on the TEE verification mechanism Verification and integrity verification; after passing the legality verification and the integrity verification, run the data transaction program.
- the data transaction program includes a data access program and a data processing program
- the data transaction program acquiring data from a data source based on a secure transmission channel includes: The private key signs the random number and/or quantity restriction information included in the data processing contract to obtain signature information; and sends the signature information to the data access program, where the data access program is sure to After the signature authentication of the signature information is successful, a secure transmission channel with the data processing program is established, so that the data processing program obtains data from the data source through the secure transmission channel based on the data access program .
- a data transaction system comprising: a program review node, a data buyer node, and a data seller node; the program review node is used to review the data transaction program developed by the program development node, and when determining the data transaction program
- the data processing method is consistent with the data processing method agreed in the data transaction contract in the blockchain network
- the data transaction program is signed according to the private key of the data audit node, and the signed data
- the transaction program is written into the blockchain network; one of the data seller node and the data buyer node can be used by a data processing node to run the data transaction program, and the data processing node is used to execute The steps of the method described in one aspect.
- the data transaction program includes a data access program and a data processing program
- the data seller node runs the data access program and the data processing program as the data processing node
- the data processing node is specifically used to: extract the data access program and the data processing program from the blockchain network, and run the data access program and the data access program in the trusted execution environment TEE of the computer Data processing program, and obtain the program output results of the data processing program; wherein, the data access program is used to obtain data from a data source, and the data processing program is used to obtain data based on the data processing program and the data access program
- the secure transmission channel between the two obtains the data, and outputs the program output result after processing the data.
- the data processing node is configured to: verify the data access program and the data processing program according to the public key of the program review node, and determine the After the data access program and the data processing program have passed the review of the program review node, run the data access program and the data processing program in the TEE.
- the data processing node is further used to: based on the TEE verification mechanism, verify the legality and integrity of the running code and data of the data processing program and the data access program Verification; after passing the legality verification and the integrity verification, run the data processing program and the data access program.
- the data buyer node is used to sign the random number and/or quantity restriction information included in the data processing contract according to the private key of the data buyer node , Obtain the first signature information, send the first signature information to the data access program, and sign the random number included in the data processing contract according to the private key of the data buyer node to obtain the second Signature information and send the second signature information to the data processing program; the data processing node is also used to: pair the first signature information and the second signature based on the public key of the data buyer node Information is verified, and after the first signature information and the second signature information are both verified, the data access program and the data processing program are run in the TEE.
- the data transaction system wherein the data transaction program includes a data access program and a data processing program, and the data buyer node runs the data access program and the data processing program as the data processing node
- the data processing node is specifically used to: extract the data access program and the data processing program from the blockchain network, and run the data access program and the data access program in the trusted execution environment TEE of the computer A data processing program to obtain the program output results of the data processing program; wherein the data access program is used to obtain data from a data source, and the data processing program is used to obtain data based on the difference between the data processing program and the data access program.
- the secure transmission channel between the two obtains the data, and outputs the program output result after processing the data.
- the data transaction system wherein the data transaction program includes a data access program and a data processing program, and the data buyer node runs the data access program and the data processing program as the data processing node
- the data processing node is specifically used to: extract the data access program and the data processing program from the blockchain network, and run the data access program and the data access program in the trusted execution environment TEE of the computer A data processing program to obtain the program output results of the data processing program; wherein the data access program is used to obtain data from a data source, and the data processing program is used to obtain data based on the difference between the data processing program and the data access program.
- the secure transmission channel between the two obtains the data, and outputs the program output result after processing the data.
- the data transaction program includes a data access program and a data processing program
- the data seller node runs the data access program
- the data buyer node runs the data processing program
- the data seller node is specifically used to: extract the data access program from the blockchain network, and run the data access program in the trusted execution environment TEE of the computer, wherein the data access program is based on The secure transmission channel obtains data from a data source
- the data buyer node is specifically used to: extract the data processing program from the blockchain network, and run the data processing program in the trusted execution environment TEE of the computer, Obtain the program output result of the data processing program; wherein, the data processing program is used to acquire the data based on the secure transmission channel between the data processing program and the data access program, and perform the data processing on the data After processing, the output result of the program is output.
- the data seller node is further used to: verify the data access program according to the public key of the program review node, and determine that the data access program has passed all After the review of the program review node, run the data access program in the TEE; the data buyer node is also used to: verify the data processing program according to the public key of the program review node, and determine After the data processing program has passed the review of the program review node, run the data processing program in the TEE.
- the data seller node is used to sign the random number and/or quantity restriction information included in the data processing contract according to the private key of the data seller node, Obtain the first signature information, and send the first signature information to the data access program;
- the data buyer node is used to sign the random number included in the data processing contract according to the private key of the data buyer node to obtain second signature information, and send the second signature information to the data processing Program; the data seller node is also used to verify the second signature information based on the public key of the data buyer node, after the second signature information is verified, run the data access in the TEE Program; the data buyer node is also used to verify the first signature information based on the public key of the data seller node, and after the first signature information is verified, run the data processing in the TEE program.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Databases & Information Systems (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (10)
- 一种数据处理方法,其特征在于,所述方法应用于数据处理节点,所述方法包括:从区块链网络中提取数据交易程序,所述数据交易程序是在程序审核通过后写入所述区块链网络中的,其中,所述程序审核通过至少表明该数据交易程序对数据的处理方式与数据交易合约中约定的数据处理方式一致;在计算机的可信执行环境TEE中运行所述数据交易程序,其中,所述数据交易程序用于基于安全传输通道从数据源获取数据,并对所述数据进行处理;获取所述数据交易程序的程序输出结果。
- 根据权利要求1所述的方法,其特征在于,通过如下方式对所述数据交易程序进行审核:程序审核节点获取程序开发者上传的数据交易程序;在确定所述数据交易程序对数据的处理方式与所述区块链网络中的数据交易合约中约定的数据处理方式一致的情况下,根据所述数据审核节点的私钥对所述数据交易程序进行签名;将签名后的所述数据交易程序写入所述区块链网络;所述在计算机的可信执行环境TEE中运行所述数据交易程序,包括:根据所述程序审核节点的公钥对从所述区块链网络中提取的数据交易程序进行签名认证,并在签名认证成功后,在计算机的可信执行环境TEE中运行所述数据交易程序。
- 根据权利要求2所述的方法,其特征在于,所述数据交易合约是数据交易双方签定后存储到所述区块链网络的,所述数据交易合约包括以下至少一种:所述数据交易程序的程序输出结果不包括输入所述数据交易程序进行处理的数据;从所述数据源提取数据的方式;从所述数据源提取数据的数量限制条件信息。
- 根据权利要求1-3任一项所述的方法,其特征在于,所述在计算机的可信执行环境TEE中运行所述数据交易程序包括:基于TEE验证机制,对所述数据交易程序的运行代码和数据进行合法性验证以及完整性验证;在通过所述合法性验证以及所述完整性验证后,运行所述数据交易程序。
- 根据权利要求1-3任一项所述的方法,其特征在于,所述数据交易程序包括数据访问程序和数据处理程序,所述数据交易程序基于安全传输通道从数据源获取数据包括:根据所述数据处理节点的私钥对所述数据交易合约中包括的随机数和/或数量限制条件信息进行签名,得到签名信息;将所述签名信息发送给所述数据访问程序,其中,所述数据访问程序在确定对所述签名信息的签名认证成功后,建立与所述数据处理程序之间的安全传输通道,以便所述数据处理程序基于所述数据访问程序通过所述安全传输通道从所述数据源获取到数据。
- 一种数据交易系统,其特征在于,包括:程序审核节点、数据买方节点以及数据卖方节点;所述程序审核节点用于对程序开发节点开发的数据交易程序进行审核,并在确定所述数据交易程序对数据的处理方式与区块链网络中的数据交易合约中约定的数据处理方式一致的情况下,根据所述数据审核节点的私钥对所述数据交易程序进行签名,将签名后的所述数据交易程序写入所述区块链网络;所述数据卖方节点和所述数据买方节点中的一者能够用于数据处理节点运行所述数据交易程序,所述数据处理节点用于执行权利要求1-5任一项所述的方法。
- 根据权利要求6所述的数据交易系统,其特征在于,所述数据交易 程序包括数据访问程序和数据处理程序,所述数据买方节点作为所述数据处理节点运行所述数据访问程序和所述数据处理程序;所述数据处理节点具体用于:从所述区块链网络中提取所述数据访问程序和所述数据处理程序,并在计算机的可信执行环境TEE中运行所述数据访问程序和所述数据处理程序,获取所述数据处理程序的程序输出结果;其中,所述数据访问程序用于从数据源获取数据,所述数据处理程序用于基于所述数据处理程序与所述数据访问程序之间的安全传输通道获取所述数据,并在对所述数据进行处理后输出所述程序输出结果。
- 根据权利要求6所述的数据交易系统,其特征在于,所述数据交易程序包括数据访问程序和数据处理程序,所述数据卖方节点运行所述数据访问程序,所述数据买方节点运行所述数据处理程序;所述数据卖方节点具体用于:从所述区块链网络中提取所述数据访问程序,并在计算机的可信执行环境TEE中运行所述数据访问程序,其中,所述数据访问程序基于安全传输通道从数据源获取数据;所述数据买方节点具体用于:从所述区块链网络中提取所述数据处理程序,并在计算机的可信执行环境TEE中运行所述数据处理程序,获取所述数据处理程序的程序输出结果;其中,所述数据处理程序用于基于所述数据处理程序与所述数据访问程序之间的安全传输通道获取所述数据,并在对所述数据进行处理后输出所述程序输出结果。
- 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,该程序被处理器执行时实现权利要求1-5中任一项所述方法的步骤。
- 一种电子设备,其特征在于,包括:存储器,其上存储有计算机程序;处理器,用于执行所述存储器中的所述计算机程序,以实现权利要求1-5中任一项所述方法的步骤。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/096652 WO2021253299A1 (zh) | 2020-06-17 | 2020-06-17 | 数据处理方法、存储介质、电子设备及数据交易系统 |
CN202080005718.3A CN113015973B (zh) | 2020-06-17 | 2020-06-17 | 数据处理方法、存储介质、电子设备及数据交易系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2020/096652 WO2021253299A1 (zh) | 2020-06-17 | 2020-06-17 | 数据处理方法、存储介质、电子设备及数据交易系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021253299A1 true WO2021253299A1 (zh) | 2021-12-23 |
Family
ID=76385276
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/096652 WO2021253299A1 (zh) | 2020-06-17 | 2020-06-17 | 数据处理方法、存储介质、电子设备及数据交易系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN113015973B (zh) |
WO (1) | WO2021253299A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113901498B (zh) * | 2021-10-15 | 2023-12-26 | 北京智融云河科技有限公司 | 一种数据共享方法、装置、设备及存储介质 |
CN114358746A (zh) * | 2022-01-17 | 2022-04-15 | 湖南和信安华区块链科技有限公司 | 一种基于区块链的软件开发集成控制系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140270179A1 (en) * | 2011-07-21 | 2014-09-18 | Huawei Technologies Co., Ltd. | Method and system for key generation, backup, and migration based on trusted computing |
CN109933987A (zh) * | 2018-11-30 | 2019-06-25 | 上海点融信息科技有限责任公司 | 用于区块链网络的密钥生成方法、签名方法、存储介质、计算设备 |
CN110245506A (zh) * | 2019-05-30 | 2019-09-17 | 阿里巴巴集团控股有限公司 | 基于区块链的智能合约管理方法及装置、电子设备 |
CN110580262A (zh) * | 2019-11-08 | 2019-12-17 | 支付宝(杭州)信息技术有限公司 | 基于智能合约的隐私数据查询方法及装置 |
CN110580412A (zh) * | 2019-11-08 | 2019-12-17 | 支付宝(杭州)信息技术有限公司 | 基于链代码的权限查询配置方法及装置 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018516026A (ja) * | 2015-03-20 | 2018-06-14 | リヴェッツ・コーポレーションRivetz Corp. | ブロックチェーンを使用したデバイス整合性の自動認証 |
CN110266659B (zh) * | 2019-05-31 | 2020-09-25 | 联想(北京)有限公司 | 一种数据处理方法和设备 |
CN110659994A (zh) * | 2019-09-27 | 2020-01-07 | 深圳市网心科技有限公司 | 基于区块链的数据交易方法、数据交易装置及系统 |
CN111127013B (zh) * | 2019-12-24 | 2023-12-29 | 深圳大学 | 基于区块链的去中心化数据交易方法、装置、设备及介质 |
-
2020
- 2020-06-17 WO PCT/CN2020/096652 patent/WO2021253299A1/zh active Application Filing
- 2020-06-17 CN CN202080005718.3A patent/CN113015973B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140270179A1 (en) * | 2011-07-21 | 2014-09-18 | Huawei Technologies Co., Ltd. | Method and system for key generation, backup, and migration based on trusted computing |
CN109933987A (zh) * | 2018-11-30 | 2019-06-25 | 上海点融信息科技有限责任公司 | 用于区块链网络的密钥生成方法、签名方法、存储介质、计算设备 |
CN110245506A (zh) * | 2019-05-30 | 2019-09-17 | 阿里巴巴集团控股有限公司 | 基于区块链的智能合约管理方法及装置、电子设备 |
CN110580262A (zh) * | 2019-11-08 | 2019-12-17 | 支付宝(杭州)信息技术有限公司 | 基于智能合约的隐私数据查询方法及装置 |
CN110580412A (zh) * | 2019-11-08 | 2019-12-17 | 支付宝(杭州)信息技术有限公司 | 基于链代码的权限查询配置方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN113015973A (zh) | 2021-06-22 |
CN113015973B (zh) | 2023-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI723658B (zh) | 基於區塊鏈中智慧合約保護交易活動敏感資料的方法和設備 | |
US10841307B2 (en) | User ID codes for online verification | |
US20240320722A1 (en) | Managing eligibility for access to restricted goods and services | |
CN107341702B (zh) | 一种业务处理的方法及装置 | |
CN110166442B (zh) | 一种基于区块链的数据处理方法和装置 | |
US20210089300A1 (en) | System and method for identifying particular computer platform associated with potential altered or falsified execution of copy of software | |
US11876801B2 (en) | User ID codes for online verification | |
CN109978688A (zh) | 分布式共识系统之访问控制方法及其契约产生器与服务器 | |
CN110246039B (zh) | 基于联盟链的交易监测方法、装置及电子设备 | |
Gupta et al. | TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces | |
WO2021253299A1 (zh) | 数据处理方法、存储介质、电子设备及数据交易系统 | |
TWI644270B (zh) | 具監管機制的帳聯網系統及其實施方法 | |
CN114945931A (zh) | 用于减轻票据融资欺诈的方法和设备 | |
WO2020252753A1 (zh) | 区块链节点设备及其认证方法、装置、存储介质 | |
JP7334280B2 (ja) | プログラム検証方法及び装置、プラットフォーム及びユーザ端末、並びに、オンラインサービスシステム | |
Mirzamohammadi et al. | Tabellion: Secure legal contracts on mobile devices | |
CN114329567A (zh) | 投标文件生成方法、校验方法、电子设备及介质 | |
Stampernas | Blockchain technologies and smart contracts in the context of the Internet of Things | |
Yang et al. | Video transaction algorithm considering FISCO alliance chain and improved trusted computing | |
US20240281796A1 (en) | Systems and Methods for Facilitating Digital Wallet-Based Transactions | |
KR20230126799A (ko) | Ai 모델의 신뢰 환경 구축을 위한 프레임워크 및 프레임워크를 이용한 ai 모델의 공정성 검증 방법 | |
CN117474682A (zh) | 一种数据处理方法、装置、介质和设备 | |
CN114663120A (zh) | 评论数据存储方法、装置、服务器及存储介质 | |
KR20230109029A (ko) | 블록체인 네트워크에 기반하여 nft를 공증하기 위한 방법 및 이를 이용한 공증 서버 | |
WO2023138918A1 (en) | Method and apparatus for reputation rating |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20940703 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20940703 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19/06/2023) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20940703 Country of ref document: EP Kind code of ref document: A1 |