CN112329037A - Data acquisition method and device - Google Patents
Data acquisition method and device Download PDFInfo
- Publication number
- CN112329037A CN112329037A CN202011249713.3A CN202011249713A CN112329037A CN 112329037 A CN112329037 A CN 112329037A CN 202011249713 A CN202011249713 A CN 202011249713A CN 112329037 A CN112329037 A CN 112329037A
- Authority
- CN
- China
- Prior art keywords
- target data
- terminal
- network platform
- data acquisition
- access information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 88
- 238000012795 verification Methods 0.000 claims abstract description 25
- 238000004590 computer program Methods 0.000 claims description 18
- 230000008569 process Effects 0.000 description 20
- 238000004891 communication Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2471—Distributed queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Probability & Statistics with Applications (AREA)
- Computational Linguistics (AREA)
- Mathematical Physics (AREA)
- Fuzzy Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The embodiment of the invention provides a data acquisition method and a data acquisition device, wherein the method comprises the following steps: retrieving the data issued by the second terminal in the block chain network platform to determine target data; sending a target data acquisition request to a second terminal through a block chain network platform; and receiving the target data access information sent by the second terminal through the block chain network platform to acquire the target data. The device is used for executing the method. According to the data acquisition method and device provided by the embodiment of the invention, the credibility of the target data acquirer is ensured by verifying the target data acquisition request, and the target data access information is sent after the verification is passed, so that the target data is ensured to be acquired according to the target data access information, the leakage of the target data is avoided, and the safety of the target data is ensured.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a data acquisition method and device.
Background
In the big data era, data has immeasurable value for individuals or enterprises, so data acquisition comes to the end.
The data acquisition methods in the prior art are accomplished by negotiating or signing a business contract or performing project implementation. Under the current situation that the data application demand widely exists, security supervision and data security confirmation are lacked in data acquisition, so that sharing enthusiasm of enterprises or individuals owning source data is not high, and a lot of services lack of data cannot be developed.
Therefore, how to provide a data acquisition method capable of ensuring the security of data and data acquisition is a technical problem that needs to be solved by those skilled in the art at present.
Disclosure of Invention
The data acquisition method and the data acquisition device provided by the embodiment of the invention are used for overcoming the safety problem existing in the data acquisition process in the prior art and can ensure the target data and the safety of the target data acquisition.
In a first aspect, a data obtaining method provided in an embodiment of the present invention includes:
retrieving the data issued by the second terminal in the block chain network platform to determine target data;
sending a target data acquisition request to the second terminal through the block chain network platform;
receiving target data access information sent by the second terminal through the block chain network platform to acquire the target data;
and the target data access information is sent to the block chain network platform after the second terminal verifies the target data acquisition request.
Further, after receiving, by the blockchain network platform, the target data access information sent by the second terminal, the method further includes:
acquiring a second terminal public key through the block chain network platform;
decrypting the target data access information based on the second terminal public key and a preset first terminal private key;
wherein the second terminal public key is published by the second terminal on the blockchain network platform.
Further, after the acquiring the target data, the method further includes:
and receiving the information of the interest deduction sent by the block chain network platform.
In a second aspect, another data acquisition method provided in an embodiment of the present invention includes:
the data are issued on the block chain network platform for the first terminal to retrieve;
receiving a target data acquisition request sent by a first terminal through the block chain network platform;
verifying the target data acquisition request, and sending target data access information to the first terminal through the block chain network platform after the target data acquisition request passes the verification so that the first terminal can acquire the target data;
the target data acquisition request is sent to the blockchain network platform by the first terminal after the first terminal determines the target data by retrieving the data.
Further, before the sending the target data access information to the first terminal through the blockchain network platform, the method further includes:
acquiring a first terminal public key through the block chain network platform;
encrypting the target data access information based on the first terminal public key and a preset second terminal private key;
wherein the first terminal public key is published by the first terminal on the blockchain network platform.
In a third aspect, an embodiment of the present invention further provides a data acquisition apparatus, including:
the device comprises a target data determining module, a sending and acquiring request module and a target data acquiring module;
the target data determining module is used for retrieving the data issued by the second terminal in the block chain network platform so as to determine the target data;
a sending and acquiring request module, configured to send a target data acquiring request to the second terminal through the blockchain network platform;
a target data acquisition module, configured to receive, through the blockchain network platform, target data access information sent by the second terminal, so as to acquire the target data;
and the target data access information is sent to the block chain network platform after the second terminal verifies the target data acquisition request.
In a fourth aspect, an embodiment of the present invention further provides another data acquiring apparatus, including:
the system comprises a data issuing module, a receiving and acquiring request module and an access information sending module;
the data publishing module is used for publishing data on the block chain network platform for the first terminal to retrieve;
a receiving and acquiring request module, configured to receive, through the blockchain network platform, a target data acquiring request sent by a first terminal;
the access information sending module is used for verifying the target data acquisition request and sending target data access information to the first terminal through the block chain network platform after the target data acquisition request passes the verification so that the first terminal can acquire the target data;
the target data acquisition request is sent to the blockchain network platform by the first terminal after the first terminal determines the target data by retrieving the data.
In a fifth aspect, an embodiment of the present invention further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the steps of any of the data acquisition methods described above.
In a sixth aspect, the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the data acquisition method as described in any one of the above.
The data acquisition method and the device provided by the embodiment of the invention utilize the block chain network platform to search the data issued by the second terminal, determine the required target data, and sends a target data acquisition request to the second terminal through the blockchain network platform for the second terminal to verify, after the second terminal passes the verification, acquiring target data access information through the blockchain network platform, acquiring target data based on the target data access information, because the second terminal only needs to send the target data access information in the process, the leakage of the target data is avoided, the safety of the target data is ensured, and because the second terminal verifies the target data acquisition request before sending the target data access information, and the target data access information is sent after the verification is passed, so that the safety and the credibility of the target data acquisition process are guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a data acquisition method according to an embodiment of the present invention;
fig. 2 is a second schematic flowchart of a data acquisition method according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a data acquisition apparatus according to an embodiment of the present invention;
fig. 4 is a second schematic structural diagram of a data acquisition apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention;
fig. 6 is a second schematic structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow chart of a data acquisition method according to an embodiment of the present invention, and as shown in fig. 1, the method includes:
s110, retrieving data issued by a second terminal in the block chain network platform to determine target data;
s120, sending a target data acquisition request to a second terminal through a block chain network platform;
s130, receiving target data access information sent by a second terminal through a block chain network platform to obtain target data;
and the target data access information is sent to the block chain network platform after the second terminal verifies the target data acquisition request.
It should be noted that the execution subject of the method may be a first terminal, and the first terminal may be a data consumer. For example, it may be an electronic device, a component in an electronic device, an integrated circuit, or a chip. The electronic device may be a mobile electronic device or a non-mobile electronic device. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The following describes the technical solution of the present invention in detail by taking an example of a data acquisition method for a data consumer to execute the embodiment of the present invention.
It should be noted that the data acquisition method provided in the embodiment of the present invention is implemented based on a block chain network platform. The block chain technology is a novel decentralized distributed secure storage technology and has the characteristics of safety and reliability. The block chain is used as a shared distributed database, all participants of the block chain jointly record and verify, data information and generated blocks are sequentially recorded and verified according to time sequence, a chain data structure is formed in a sequential connection mode, and the cryptology principle is utilized to ensure that the data information is not falsified, traceable and counterfeitable.
In practical application, a data demander installs a blockchain network platform in an operating terminal device to add into the blockchain network platform where a second terminal is located, and both the data demander and the second terminal are used as nodes and stored in the blockchain network platform.
The data demander searches the data issued by the second terminal in the block chain network platform to determine the required target data, the second terminal providing the data firstly establishes a database, stores the data in the database, ensures that the database can be accessed, and finishes the design of access information; and then, the data including the data attribute information is released on the blockchain network platform according to a preset period, after the consensus mechanism of the blockchain network platform is completed, the data released by the second terminal can be published in the whole blockchain network platform and can be retrieved, and a data demander inquires the data corresponding to the actual demand by retrieving the data including the data attribute information released on the blockchain network platform according to the actual demand, namely determines the target data.
For example, if the data demander only wants to obtain the data related to the user order generated by the second terminal within a predetermined time period during the use of a certain application program, the data demander screens out the data related to the attribute information of the user order data during the retrieval process, and uses the screened data as the target data.
In this process, the attribute information of the data may include: data source metadata: including IP and port number, physical topology, version number, database name and domain name, etc.; storing metadata: management attributes (creators, task lines, etc.), lifecycle, storage format and size, data characteristics, data structures, etc.; operation metadata: table access information, table associations, field information, etc.; cost metadata: CPU consumption, compression rate, etc. The preset period may also be set according to actual conditions, and the preset period in the embodiment of the present invention is one day.
It should be noted that the database may be a database established based on a Distributed Hash Table (DHT), and the DHT is a Distributed storage method, where each client end is responsible for a small-range route and is responsible for storing a small part of data without a server end, so as to implement addressing and storage of the whole DHT storage network.
The database may also be based on an InterPlanetary File System (IPFS), which is a network transmission protocol aiming at creating persistent and distributed storage and shared files, and the technology is a content addressable peer-to-peer hypermedia distribution protocol, and a storage network obtained based on the technology can also achieve the same data storage purpose as the DHT.
The database may also be selected from a Structured Query Language database (SQL) or an unstructured Query Language database (Not Only Structured Query Language).
It should be noted that, after determining the required target data, the data demander sends a target data acquisition request to the second terminal through the blockchain network platform, so that the second terminal verifies the data demander according to the target data acquisition request, and sends target data access information to the data demander after the verification is passed, so that the data demander obtains the target data according to the database established by the target data access information second terminal.
In this embodiment of the present invention, verifying the target data acquisition request may include: it is determined whether the content of the target data that the data consumer wants to obtain is sharable or available for trading or to ensure that the data consumer is trustworthy, e.g., that the data consumer belongs to a legitimate partner. If the target data which the data demander wants to obtain is determined to be sharable or tradeable or the data demander belongs to a legal partner which can be trusted, the verification is passed.
The data acquisition method provided by the embodiment of the invention utilizes the blockchain network platform to retrieve data issued by the second terminal, determines the required target data, sends a target data acquisition request to the second terminal through the blockchain network platform for the second terminal to verify, acquires the target data access information through the blockchain network platform after the second terminal passes the verification, and acquires the target data based on the target data access information.
Further, in an embodiment, after receiving, by the blockchain network platform, the target data access information sent by the second terminal, the method further includes:
acquiring a second terminal public key through a block chain network platform;
decrypting the target data access information based on the second terminal public key and a preset first terminal private key;
and the second terminal public key is disclosed by the second terminal on the block chain network platform.
Specifically, the blockchain network platform includes all other nodes which wish to participate in data transaction parties, in addition to the data demander node of the first terminal and the second terminal node. When the second terminal sends the target data access information to the data demander through the block chain network platform, the target data access information is encrypted by using a preset encryption algorithm to form a ciphertext, and then the ciphertext is sent to the data demander.
The data demander decrypts the target data access information according to the corresponding preset decryption algorithm, and the second terminal encrypts the target data access information, so that the situation that in the data transmission process, even if the target data access information is acquired by other nodes of the non-data demander, the target data access information cannot be acquired through decryption, the target data can be acquired according to the target data access information, and the data transmission safety is guaranteed.
It should be noted that communication can be performed between nodes on the blockchain network platform.
It should be noted that the preset encryption algorithm in the embodiment of the present invention may be a symmetric encryption algorithm, and the corresponding preset decryption algorithm may be a symmetric decryption algorithm; the preset encryption algorithm can also be an asymmetric encryption algorithm, and the corresponding preset decryption algorithm can be an asymmetric decryption algorithm; the symmetric encryption algorithm may specifically include: DES, 3DES, AES, etc., and the asymmetric encryption algorithm may specifically include: RSA, DSA, etc.
In practical application, the target data access information is encrypted by using an asymmetric encryption technology, and it can be understood that, in the asymmetric encryption technology, a pair of public key and private key is provided, if the public key is used to encrypt the information, only the corresponding private key can be used to decrypt: if the information is encrypted with a private key pair, it can only be decrypted with the corresponding public key. The asymmetric encryption technique is described in detail below in connection with a data transaction process.
And after the verification is passed, the second terminal encrypts the target data access information and transmits the target data access information. Specifically, the target data access information may be encrypted by using the same key, that is, the key for encrypting the target data access information is the same, or the target data access information may be encrypted by using a key with a different public key and a different private key. It is understood that if the keys used in the encryption are different, the corresponding public keys used in the decryption are different.
The second terminal obtains a public key of the first terminal, namely the data demander, through the block chain network platform, encrypts the target data access information according to the public key of the data demander, ensures that only the data demander can decrypt and check the target data access information, encrypts the target data access information encrypted by the public key of the data demander again according to a preset private key of the second terminal to form a digital signature, forms a ciphertext and ensures the source reliability of the target data access information.
Correspondingly, the process of decrypting the target data access information by the data demander may specifically be: the data demander obtains a public key of the second terminal through the block chain network platform, decrypts the digital signature encrypted by the private key of the second terminal according to the public key of the second terminal so as to ensure that the source of the target data access information belongs to the second terminal, and decrypts the target data access information encrypted by the public key of the first terminal according to a preset first terminal, namely the private key of the data demander so as to obtain the decrypted target data access information.
It should be noted that, in the embodiment of the present invention, the first terminal public key and the second terminal public key may be directly allocated by the blockchain network platform after the first terminal and the second terminal join the blockchain network platform. In the embodiment of the invention, the first terminal private key and the second terminal private key have uniqueness and cannot be tampered. In the embodiment of the invention, the information encrypted based on the first terminal public key can only be decrypted by using the first terminal private key, and the information encrypted based on the second terminal public key can only be decrypted by using the second terminal private key.
According to the data acquisition method provided by the embodiment of the invention, the second terminal public key is acquired through the block chain network platform, and the received target data access information encrypted by the second terminal is decrypted based on the second terminal public key and the preset first terminal private key, so that the safety and the reliability of the data acquisition process are ensured, the second terminal of the source side of the target data access information can be verified, and the source safety and the reliability of the information are ensured; the target data access information encrypted by the second terminal can only be decrypted by the private key of the first terminal, so that the target data access information cannot be decrypted even if the target data access information is acquired by a non-first terminal, and the target data is acquired according to the decrypted target data access information, so that the safety of the target data is guaranteed; in addition, based on the data acquisition process, the data acquisition process does not need to be managed in a third-party organization, can not be cached by anyone, and can trace the authority from the records on the chain once copyright dispute occurs, so that the data maintenance right is realized.
Further, in an embodiment, step S130 is followed by:
s140, receiving a right deduction message sent by the block chain network platform;
specifically, after the data demander acquires the target data according to step S130, the data demander pays the right to acquire the target data by executing an intelligent contract set in the blockchain network platform, and the blockchain network platform takes the cost as the benefit of the second terminal and receives the benefit deduction message of the blockchain network platform.
It should be noted that the intelligent contracts are codes stored on the blockchain network platform, and can execute specific functions according to the preset rules.
The intelligent contract is used for helping the second terminal and the data demander to realize data transaction, ensuring that the data demander needs to pay certain rights and interests after acquiring the target data, and simultaneously ensuring that the second terminal can receive the purchasing rights and interests paid by the data demander when transmitting the target data required by the data demander.
It should be noted that, the purchase right of the data transaction may also be set through an intelligent contract, and the purchase right is a value corresponding to the target data for the transaction that is determined by the coordination of the second terminal, the first terminal and the blockchain network platform. The method can also comprise the following steps: and further dividing the data transaction between all nodes participating in the data transaction of the first terminal and the second terminal and the data transaction of the second terminal, which are established in the intelligent contract, for example, 80% of the deduction rights of the data demanders are sent to the account of the second terminal, and 20% of the deduction rights are sent to the accounts of all nodes participating in the data transaction of the first terminal and the second terminal.
It should be noted that the intelligent contract is executed during the data transaction process, and the point-to-point data transaction between the second terminal and the data demander is automatically processed after the execution. Specifically, the data demander executes the smart contract after initiating the target data acquisition request. And executing the intelligent contract on the data demand side, decrypting the encrypted target data access information by using the private key of the intelligent contract and the public key of the second terminal to obtain target data, and paying the required rights and interests to the second terminal according to the contract of the intelligent contract after the target data is obtained, thereby completing the data transaction.
It should be noted that all information flows related to data interaction are recorded in the blockchain network in a transparent and complete manner, and are verified and recorded by the blockchain consensus algorithm, so that the information flows are guaranteed not to be tampered.
It should be noted that the consensus algorithm can be defined as a mechanism for achieving consensus through a blockchain network platform. The common (decentralized) blockchain acts as a distributed system and does not rely on a central authority, but rather is passed through by distributed nodes to effect transactions. The consensus mechanism in the embodiment of the invention can be PoW workload certification, PoS rights and interests certification, DPoS delegation rights and interests certification and the like.
According to the data acquisition method provided by the embodiment of the invention, the automatic process of acquiring the target data is realized by executing the intelligent contract arranged on the block chain network platform, the purchase right is paid to the second terminal after the target data is acquired based on the agreement of the intelligent contract, the unnecessary right loss of a data demander is reduced because only the right required by acquiring the target data needs to be paid, the rights of both sides of the data transaction are ensured, meanwhile, the intelligent contract is responsible for judging whether both sides of the transaction can achieve a data exchange contract, and after the data exchange is completed, the second terminal is ensured to acquire the corresponding right, and meanwhile, the data acquirer can obtain a data source with sufficient amount and quality guarantee.
Fig. 2 is a second schematic flow chart of the data acquisition method according to the embodiment of the present invention, as shown in fig. 2, the method includes:
s210, data are issued on a block chain network platform for a first terminal to retrieve;
s220, receiving a target data acquisition request sent by a first terminal through a block chain network platform;
s230, verifying the target data acquisition request, and sending target data access information to the first terminal through the block chain network platform after the target data acquisition request passes the verification so that the first terminal can acquire the target data;
the target data acquisition request is sent to the block chain network platform after the first terminal determines the target data by retrieving the data.
It should be noted that the executing subject of the method may be the first terminal, and the first terminal may be the data owner. For example, it may be an electronic device, a component in an electronic device, an integrated circuit, or a chip. The electronic device may be a mobile electronic device or a non-mobile electronic device. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
It should be noted that the data owner issues the data in the blockchain network platform for the first terminal to retrieve, and it should be noted that the data issued by the second terminal includes attribute information of the data, so that the first terminal queries the data corresponding to the actual demand by retrieving the data including the attribute information of the data issued by the second terminal on the blockchain network platform according to the actual demand, that is, determines the target data. After the first terminal determines the required target data, a target data acquisition request is sent through the blockchain network platform.
It should be noted that, after receiving a target data acquisition request sent by the first terminal through the blockchain network platform, the data owner verifies the target data acquisition request, and sends target data access information to the first terminal through the blockchain network platform after the verification is passed, so that the first terminal can acquire the target data.
In this embodiment of the present invention, verifying the target data acquisition request may include: it is determined whether the content of the target data that the first terminal wants to acquire is sharable or available for trading or to ensure whether the first terminal is trusted, e.g. the first terminal belongs to a legitimate partner. If the target data which the first terminal wants to acquire is determined to be sharable or transactable or the first terminal belongs to a legal partner which can be trusted, the verification is passed.
The data acquisition method provided by the embodiment of the invention utilizes the block chain network platform to release data for the first terminal to retrieve, determines the required target data, receives the target data acquisition request sent by the first terminal through the block chain network platform for verification, and sends the target data access information to the first terminal through the block chain network platform after the verification is passed, so that the first terminal can acquire the target data according to the target data access information.
Further, in an embodiment, before sending the target data access information to the first terminal through the blockchain network platform, the method further includes:
acquiring a first terminal public key through a block chain network platform;
encrypting the target data access information based on the first terminal public key and a preset second terminal private key;
wherein the first terminal public key is published by the first terminal on the blockchain network platform.
It should be noted that when the data owner sends the target data access information to the data demander through the block chain network platform, the target data access information is encrypted by using the preset encryption algorithm to form a ciphertext, and then the ciphertext is sent to the first terminal;
the data owner can ensure that the target data access information cannot be obtained through decryption and the target data can be obtained according to the target data access information even after the target data access information is obtained by other nodes which are not the first terminal in the data transmission process by encrypting the target data access information, so that the safety of data transmission is guaranteed. The asymmetric encryption technique is described in detail below in connection with a data transaction process.
Specifically, a data owner obtains a public key of a first terminal, namely a data demander, through a block chain network platform, encrypts target data access information according to the public key of the first terminal to ensure that only the first terminal can decrypt and view the target data access information, then encrypts the target data access information encrypted by the public key of the data demander again according to a preset private key of a second terminal to form a digital signature, and forms a ciphertext to ensure the source reliability of the target data access information.
It should be noted that, in the embodiment of the present invention, the first terminal public key and the second terminal public key may be directly allocated by the blockchain network platform after the first terminal and the second terminal join the blockchain network platform. In the embodiment of the invention, the first terminal private key and the second terminal private key have uniqueness and cannot be tampered. In the embodiment of the invention, the information encrypted based on the first terminal public key can only be decrypted by using the first terminal private key, and the information encrypted based on the second terminal public key can only be decrypted by using the second terminal private key.
It should be noted that, the above detailed description of the embodiment of the data acquisition method provided by the present invention describes the process of decrypting the target data access information by the first terminal, and is not repeated here.
According to the data acquisition method provided by the embodiment of the invention, the first terminal public key is acquired through the block chain network platform, and the target data access information is encrypted based on the first terminal public key and the preset second terminal private key, so that the first terminal can decrypt the received target data access information based on the first terminal private key and the second terminal public key, the safety and the reliability of the data acquisition process are ensured, the second terminal of the source side of the target data access information can be verified, and the source safety and the reliability of the information are ensured; in addition, the target data access information encrypted by the second terminal can only be decrypted by the private key of the first terminal, so that the target data access information cannot be decrypted even if the target data access information is acquired by a non-first terminal, and the target data is acquired according to the decrypted target data access information, so that the safety of the target data is guaranteed.
Fig. 3 is a schematic structural diagram of a data acquisition apparatus according to an embodiment of the present invention, and as shown in fig. 3, the apparatus includes: a target data determination module 310, a sending acquisition request module 320 and a target data acquisition module 330;
a target data determining module 310, configured to retrieve, in the blockchain network platform, data issued by the second terminal to determine target data;
a sending and acquiring request module 320, configured to send a target data acquiring request to the second terminal through the blockchain network platform;
a target data obtaining module 330, configured to receive, through the blockchain network platform, target data access information sent by the second terminal, so as to obtain target data;
and the target data access information is sent to the block chain network platform after the second terminal verifies the target data acquisition request.
It should be noted that, in the data acquisition apparatus corresponding to the method provided by the present invention, since the embodiment of the apparatus portion and the embodiment of the method portion correspond to each other, please refer to the description of the embodiment of the method portion for the embodiment of the apparatus portion, which is not repeated herein.
The data acquisition apparatus provided in the embodiment of the present invention, based on the target data determination module 310, retrieves data issued by the second terminal using the blockchain network platform, determines the required target data, and in combination with the sending acquisition request module 320, sends a target data acquisition request to the second terminal through the blockchain network platform for the second terminal to perform verification, and after the second terminal passes the verification, acquires target data access information through the blockchain network platform through the target data acquisition module 330, and acquires the target data based on the target data access information. In the process, the second terminal only needs to send the target data access information, so that the leakage of the target data is avoided, the safety of the target data is guaranteed, and the safety and the reliability of the target data obtaining process are guaranteed because the second terminal verifies the target data obtaining request before sending the target data access information and sends the target data access information after the verification is passed.
Fig. 4 is a second schematic structural diagram of a data acquisition apparatus according to an embodiment of the present invention, as shown in fig. 4, the apparatus includes: a data publishing module 410, a receiving and acquiring request module 420 and a sending access information module 430;
a data publishing module 410, configured to publish data on the blockchain network platform for the first terminal to retrieve;
a receive request obtaining module 420, configured to receive, through a blockchain network platform, a target data obtaining request sent by a first terminal;
the access information sending module 430 is configured to verify the target data acquisition request, and send target data access information to the first terminal through the blockchain network platform after the target data acquisition request passes the verification, so that the first terminal can acquire the target data;
the target data acquisition request is sent to the block chain network platform after the first terminal determines the target data by retrieving the data.
It should be noted that, in the data acquisition apparatus corresponding to the method provided by the present invention, since the embodiment of the apparatus portion and the embodiment of the method portion correspond to each other, please refer to the description of the embodiment of the method portion for the embodiment of the apparatus portion, which is not repeated herein.
The data acquisition device provided by the embodiment of the invention utilizes the block chain network platform to issue data for the first terminal to retrieve through the data issuing module 410, determines the required target data, utilizes the block chain network platform to receive the target data acquisition request sent by the first terminal through the receiving acquisition request module 420, and combines the sending access information module 430 to verify the target data acquisition request, and sends the target data access information to the first terminal through the block chain network platform after the verification is passed, so that the first terminal can acquire the target data according to the target data access information, because only the target data access information needs to be sent in the process, the leakage of the target data is avoided, the safety of the target data is ensured, and because the target data acquisition request sent by the first terminal is verified before the target data access information is sent, the target data access information is sent after the verification is passed, so that the safety and the credibility of the target data acquisition process are guaranteed; in addition, the data acquisition process does not need to be managed in a third-party organization, can not be cached by anyone, and can trace the authority from the records on the chain once copyright dispute occurs, so that the data right is maintained.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 5, the electronic device may include: a processor (processor)510, a communication interface (communication interface)620, a memory (memory)530 and a bus (bus)540, wherein the processor 510, the communication interface 520 and the memory 530 are communicated with each other via the bus 540. Processor 510 may call logic instructions in memory 530 to perform the following method:
retrieving the data issued by the second terminal in the block chain network platform to determine target data;
sending a target data acquisition request to a second terminal through a block chain network platform;
and receiving the target data access information sent by the second terminal through the block chain network platform to acquire the target data.
Fig. 6 is a second schematic structural diagram of an electronic device according to an embodiment of the present invention, as shown in fig. 6, the electronic device may include: a processor (processor)610, a communication interface (communication interface)620, a memory (memory)630 and a bus (bus)640, wherein the processor 610, the communication interface 620 and the memory 630 complete communication with each other through the bus 640. The processor 610 may call logic instructions in the memory 630 to perform the following method:
the data are issued on the block chain network platform for the first terminal to retrieve;
receiving a target data acquisition request sent by a first terminal through a block chain network platform;
and verifying the target data acquisition request, and sending target data access information to the first terminal through the block chain network platform after the target data acquisition request passes the verification so that the first terminal can acquire the target data.
In addition, the logic instructions in the memory may be implemented in the form of software functional units and may be stored in a computer readable storage medium when sold or used as a stand-alone product. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like.
Further, embodiments of the present invention disclose a computer program product comprising a computer program stored on a non-transitory computer-readable storage medium, the computer program comprising program instructions, which when executed by a computer, the computer is capable of performing the methods provided by the above-mentioned method embodiments, for example, comprising:
retrieving the data issued by the second terminal in the block chain network platform to determine target data;
sending a target data acquisition request to a second terminal through a block chain network platform;
and receiving the target data access information sent by the second terminal through the block chain network platform to acquire the target data.
Further, embodiments of the present invention disclose a computer program product comprising a computer program stored on a non-transitory computer-readable storage medium, the computer program comprising program instructions, which when executed by a computer, the computer is capable of performing the methods provided by the above-mentioned method embodiments, for example, comprising:
the data are issued on the block chain network platform for the first terminal to retrieve;
receiving a target data acquisition request sent by a first terminal through a block chain network platform;
and verifying the target data acquisition request, and sending target data access information to the first terminal through the block chain network platform after the target data acquisition request passes the verification so that the first terminal can acquire the target data.
In another aspect, an embodiment of the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform the transmission method provided in the foregoing embodiments when executed by a processor, and for example, the method includes:
retrieving the data issued by the second terminal in the block chain network platform to determine target data;
sending a target data acquisition request to a second terminal through a block chain network platform;
and receiving the target data access information sent by the second terminal through the block chain network platform to acquire the target data.
In another aspect, an embodiment of the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform the transmission method provided in the foregoing embodiments when executed by a processor, and for example, the method includes:
the data are issued on the block chain network platform for the first terminal to retrieve;
receiving a target data acquisition request sent by a first terminal through a block chain network platform;
and verifying the target data acquisition request, and sending target data access information to the first terminal through the block chain network platform after the target data acquisition request passes the verification so that the first terminal can acquire the target data.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. A method of data acquisition, comprising:
retrieving the data issued by the second terminal in the block chain network platform to determine target data;
sending a target data acquisition request to the second terminal through the block chain network platform;
receiving target data access information sent by the second terminal through the block chain network platform to acquire the target data;
and the target data access information is sent to the block chain network platform after the second terminal verifies the target data acquisition request.
2. The data acquisition method according to claim 1, further comprising, after receiving, by the blockchain network platform, target data access information sent by the second terminal:
acquiring a second terminal public key through the block chain network platform;
decrypting the target data access information based on the second terminal public key and a preset first terminal private key;
wherein the second terminal public key is published by the second terminal on the blockchain network platform.
3. The data acquisition method according to claim 1 or 2, further comprising, after the acquiring the target data:
and receiving the information of the interest deduction sent by the block chain network platform.
4. A method for data acquisition, comprising:
the data are issued on the block chain network platform for the first terminal to retrieve;
receiving a target data acquisition request sent by a first terminal through the block chain network platform;
verifying the target data acquisition request, and sending target data access information to the first terminal through the block chain network platform after the target data acquisition request passes the verification so that the first terminal can acquire the target data;
the target data acquisition request is sent to the blockchain network platform by the first terminal after the first terminal determines the target data by retrieving the data.
5. The data acquisition method according to claim 4, wherein before sending the target data access information to the first terminal through the blockchain network platform, the method further comprises:
acquiring a first terminal public key through the block chain network platform;
encrypting the target data access information based on the first terminal public key and a preset second terminal private key;
wherein the first terminal public key is published by the first terminal on the blockchain network platform.
6. A data acquisition apparatus, comprising: the device comprises a target data determining module, a sending and acquiring request module and a target data acquiring module;
the target data determining module is used for retrieving the data issued by the second terminal in the block chain network platform so as to determine the target data;
a sending and acquiring request module, configured to send a target data acquiring request to the second terminal through the blockchain network platform;
a target data acquisition module, configured to receive, through the blockchain network platform, target data access information sent by the second terminal, so as to acquire the target data;
and the target data access information is sent to the block chain network platform after the second terminal verifies the target data acquisition request.
7. A data acquisition apparatus, comprising: the system comprises a data issuing module, a receiving and acquiring request module and an access information sending module;
the data publishing module is used for publishing data on the block chain network platform for the first terminal to retrieve;
a receiving and acquiring request module, configured to receive, through the blockchain network platform, a target data acquiring request sent by a first terminal;
the access information sending module is used for verifying the target data acquisition request and sending target data access information to the first terminal through the block chain network platform after the target data acquisition request passes the verification so that the first terminal can acquire the target data;
the target data acquisition request is sent to the blockchain network platform by the first terminal after the first terminal determines the target data by retrieving the data.
8. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the data acquisition method according to any of claims 1 to 3 are implemented when the program is executed by the processor.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the data acquisition method according to any of claims 4 to 5 are implemented when the program is executed by the processor.
10. A non-transitory computer readable storage medium, having stored thereon a computer program, characterized in that the computer program, when being executed by a processor, is adapted to carry out the steps of the data acquisition method according to one of claims 1 to 3, or is adapted to carry out the steps of the data acquisition method according to one of claims 4 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011249713.3A CN112329037A (en) | 2020-11-10 | 2020-11-10 | Data acquisition method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011249713.3A CN112329037A (en) | 2020-11-10 | 2020-11-10 | Data acquisition method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112329037A true CN112329037A (en) | 2021-02-05 |
Family
ID=74317748
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011249713.3A Pending CN112329037A (en) | 2020-11-10 | 2020-11-10 | Data acquisition method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112329037A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2674775Y (en) * | 2004-02-20 | 2005-01-26 | 南京大学 | Domestic gateway access apparatus based on J2ME |
CN104796265A (en) * | 2015-05-06 | 2015-07-22 | 厦门大学 | Internet-of-things identity authentication method based on Bluetooth communication access |
CN105721146A (en) * | 2016-03-03 | 2016-06-29 | 江苏大学 | Big data sharing method for cloud storage based on SMC |
CN111010372A (en) * | 2019-11-20 | 2020-04-14 | 国家信息中心 | Block chain network identity authentication system, data processing method and gateway equipment |
CN111429134A (en) * | 2018-12-21 | 2020-07-17 | 北京京东尚科信息技术有限公司 | Data transaction method and device based on block chain |
CN111510282A (en) * | 2020-04-28 | 2020-08-07 | 刘佳 | Information encryption algorithm and device, information decryption algorithm and device and communication method |
-
2020
- 2020-11-10 CN CN202011249713.3A patent/CN112329037A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2674775Y (en) * | 2004-02-20 | 2005-01-26 | 南京大学 | Domestic gateway access apparatus based on J2ME |
CN104796265A (en) * | 2015-05-06 | 2015-07-22 | 厦门大学 | Internet-of-things identity authentication method based on Bluetooth communication access |
CN105721146A (en) * | 2016-03-03 | 2016-06-29 | 江苏大学 | Big data sharing method for cloud storage based on SMC |
CN111429134A (en) * | 2018-12-21 | 2020-07-17 | 北京京东尚科信息技术有限公司 | Data transaction method and device based on block chain |
CN111010372A (en) * | 2019-11-20 | 2020-04-14 | 国家信息中心 | Block chain network identity authentication system, data processing method and gateway equipment |
CN111510282A (en) * | 2020-04-28 | 2020-08-07 | 刘佳 | Information encryption algorithm and device, information decryption algorithm and device and communication method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220318907A1 (en) | Systems and methods for generating secure, encrypted communications across distributed computer networks for authorizing use of cryptography-based digital repositories in order to perform blockchain operations in decentralized applications | |
EP3404891B1 (en) | Method and system for distributing digital content in peer-to-peer network | |
US20230023857A1 (en) | Data processing method and apparatus, intelligent device, and storage medium | |
JP6873270B2 (en) | Handling of transaction activities based on smart contracts in the blockchain Caution Methods and devices for protecting data | |
CN107180350B (en) | Method, device and system for multi-party sharing transaction metadata based on block chain | |
US20190050854A1 (en) | Blockchain-based digital data exchange | |
JP2022003536A (en) | Method implemented by block chain for digital content control and distribution | |
US20230095123A1 (en) | Systems and Methods for Digitally Signed Contracts with Verifiable Credentials | |
US20170019392A1 (en) | Network resource access control methods and systems using transactional artifacts | |
US12034868B2 (en) | Systems and methods for generating secure, encrypted communications across distributed computer networks for authorizing use of cryptography-based digital repositories in order to perform blockchain operations in decentralized applications | |
WO2023005838A1 (en) | Data sharing method and electronic device | |
US11949671B2 (en) | Systems and methods for managing secure sharing of online data | |
EP4092984A1 (en) | Data processing method and apparatus, device and medium | |
US20230351035A1 (en) | System and method for user-controllable sharing of authorization for private data | |
CN109377220B (en) | Block chain-based media data transaction method and system and computer storage medium | |
JP2022532889A (en) | Multiple input transactions | |
WO2019175427A1 (en) | Method, device and medium for protecting work based on blockchain | |
US12081653B2 (en) | Systems and methods for providing secure, encrypted communications across distributed computer networks by coordinating cryptography-based digital repositories in order to perform blockchain operations in decentralized applications | |
US20230246817A1 (en) | Systems and methods for generating secure, encrypted communications across distributed computer networks for authorizing use of cryptography-based digital repositories in order to perform blockchain operations in decentralized applications | |
JP6293245B1 (en) | Transaction mutual monitoring system with enhanced security | |
US20230245111A1 (en) | Systems and methods for requesting secure, encrypted communications across distributed computer networks for authorizing use of cryptography-based digital repositories in order to perform blockchain operations in decentralized applications | |
CN113746621B (en) | Multi-chain architecture information sharing system based on block chain technology | |
US10853898B1 (en) | Method and apparatus for controlled messages | |
CN116894727A (en) | Data processing method and device based on block chain and related equipment | |
CN112329037A (en) | Data acquisition method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |