CN106534317A - Disaster recovery cloud storage system construction method based on block chain technology - Google Patents
Disaster recovery cloud storage system construction method based on block chain technology Download PDFInfo
- Publication number
- CN106534317A CN106534317A CN201611025145.2A CN201611025145A CN106534317A CN 106534317 A CN106534317 A CN 106534317A CN 201611025145 A CN201611025145 A CN 201611025145A CN 106534317 A CN106534317 A CN 106534317A
- Authority
- CN
- China
- Prior art keywords
- data
- index data
- cloud storage
- block
- storage system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Abstract
The invention discloses a disaster recovery cloud storage system construction method based on a block chain technology. The block chain technology is introduced in a cloud storage system construction process. The characteristics of decentration and de-trust of the block chain technology are used to realize the distribution autonomy of storage nodes in a cloud storage system and data exchange and data sharing between the storage nodes based on a consensus algorithm. Compared with the current mainstream centralized cloud service system, the method has the advantages that network nodes can establish many-to-many rather than one-to-many contact relationship, which can greatly improve the transmission efficiency of data; and in the processes of data storage, exchange, upload and download, data block packaging and anonymous exchange and an asymmetric encryption algorithm are used, which greatly guarantees the safety and reliability of the entire ecological chain of data cloud storage. Compared with the current mainstream centralized cloud service system, the method provided by the invention has the advantages that on the basis of improved data safety, the operation efficiency of the system is greatly improved, and the operating cost of a cloud storage service is reduced.
Description
Technical field
The invention belongs to cloud storage technical field, and in particular to a kind of calamity based on block chain technology is for cloud storage system structure
Construction method.
Background technology
Cloud storage is the once extension of cloud computing concept, and similar with cloud computing, cloud storage is referred to by cluster application, grid
A large amount of different types of storage devices in network are gathered collaboration by virtualization software by technology or distributed file system
Work, it is common that data storage and Operational Visit function are externally provided, it is the management to virtualized memory resource and use.
In recent years, many Internet firms are by cloud storage service commercialization, such as it is domestic it is well-known have Baidu's cloud disk,
360 cloud disks etc..The cloud storage system being widely used at present is typical centralized system, i.e., built by corresponding Internet firm
Software platform, a large amount of servers of configuration and virtualization software carry out the bridge of numerous storage devices and storage demand in communication network
Beam.The cloud storage service of this centralization is easily achieved and promotes, but which is the drawbacks of also have more obvious, its centralization platform
Building needs to expend substantial amounts of manpower and materials, and operating cost is higher, and as the increase centralization of network medium cloud storage demand is put down
Platform needs constantly to extend reinforcing to meet data exchange and shared rate requirement.The cloud storage system of this centralization is not
There is the marrow of realization " cloud ", more preferable cloud storage system should be decentration, independently can transport autonomous mechanism in a distributed manner
Capable data storage management system.
The appearance of block chain technology largely solves the technical barrier that distributed cloud storage system builds.Block chain
Technology has natural decentration feature, can realize the intercommunication mutual trust between each network node by algorithm of knowing together.Can
With, it is envisioned that by block chain technology be applied to calamity for cloud storage field can realize numerous network storage equipments and storage demand it
Between directly set up the communication relationship of multi-to-multi, unified management platform need not be built, so as to building, transporting for system is greatly reduced
Row, management cost.
The content of the invention
In view of it is above-mentioned, the invention provides a kind of calamity based on block chain technology is for cloud storage system construction method, can
Realize the structure of Distributed Autonomous formula cloud storage system.
A kind of calamity based on block chain technology comprises the steps for cloud storage system construction method:
(1) distributed autonomous calamity is built for cloud storage system operation frame;
(2) blocking encapsulation is carried out to the index data of client data to be stored by network storage node, and will encapsulation
After the completion of independent blocks connect into block chain;
(3) it is that the block for being packaged with index data carries Merkle tree check additions, to verify client depositing in systems
Whether storage data completely can use;If there is shortage of data, network storage node alarm user carries out corresponding completion or secondary upload
Backup;
(4) protection is encrypted using rivest, shamir, adelman to index data.
The concrete methods of realizing of the step (1) is:The centralization platform being widely present in cancelling current cloud storage system,
To realize client and network storage node direct interaction, whole cloud storage system is made to reach the distributed autonomy of decentration;Visitor
Data to be stored are divided into data text and index data two parts when calamity is carried out for cloud storage by family end, and locally and extremely
Backup Data text in few two network storage nodes, by index data split into multiple index data bags it is encrypted after be stored in
In multiple network storage nodes.
The index data is one group the keyword of obvious characteristic or distinguishing feature, therefore, to assure that by complete index
Data can find the group of the fields such as data text, " data name " " setup time " " modification time " " author " like clockwork
Conjunction can be used as index data.
In the step (2), network storage node carries out the adopted block structure of blocking encapsulation by area to index data
Build and block body composition, block head is the essential information hurdle of independent blocks, and its enclosed inside has a upper block and next block
Address information, the reflection timestamp of block packaging time, the file cryptographic Hash of index data and its for system extension
His data meta file;The multiple index data packet numbers of correspondence same data text, all indexes are encapsulated in block body then
Package number finds Merkle tree roots by Hash processes and the Merkle tree roots are credited in block head.
In the step (2), the sequencing that each independent blocks is temporally stabbed is connected into block chain by network storage node
As main chain, if current network memory node there are multiple index data blocks of the same data text of correspondence, by which
In the index data block H of earliest encapsulation be connected on main chain, other index data blocks are sequentially connected to by packaging time
A shorter side chain is formed on index data block H.
In the step (3) Merkle tree check additions to implement process as follows:Between each network storage node mutually
The numbering of each deposited index data bag is sent, network storage node compiles adjacent two index data bag after collecting numbering
New character string number is formed after a Hash procedure, and then makes two adjacent new character strings Hash mistake be carried out again after merging
Journey forms new character string, by that analogy, until Merkle tree roots are obtained, and the index that will be encapsulated in Merkle tree roots and block head
Data file cryptographic Hash is compared, to verify whether client data storage in systems completely can use.
In the step (3), all index data packet numbers are found what is obtained by Hash processes by network storage node
In Merkle tree root blocks head, the index data file cryptographic Hash of encapsulation is compared:If identical, by verification;If it is different,
Alarm is sent then, requesting client is repaired corresponding data or uploads again partial data;Persistently keep if client is without response
Alarm reaches upper limit threshold until alerting number of times, if client has carried out data modification in time or has uploaded again partial data,
Duplication check process is until by verification.
Process is implemented such as using what rivest, shamir, adelman was encrypted protection to index data in the step (4)
Under:Index data is split into multiple index data bags and is encrypted using private key when index data is uploaded by client;When
When client needs to download its data storage in systems, confirmation is wanted the index of downloading data and submits public key to, has index
The network storage node of data is decrypted the storage for obtaining data text after all index data bags are collected using public key
Location is downloaded.
The generating process of the public key and private key is:It is 128 random by calling random number generator to generate digit
Count, and then the random number is converted into by private key by hash algorithm SHA256 and Base58 and be supplied to client;Described public key
It is the random number by elliptic curve encryption algorithm according to 40 character length of original private keys text string generation, then through hash algorithm
The random number is converted to by SHA256 and Base58.
The present invention can set up decentration, each network node Distributed Autonomous calamity for cloud storage system, can be significantly
Reduce data cloud carrying cost;Due to present invention utilizes in block chain technology node common recognition algorithm and data upload and under
Rivest, shamir, adelman is adopted during load, the safety of data storage can be greatly improved, effectively prevent leaking data or illegal
Distort.
Description of the drawings
Fig. 1 is the block encapsulation schematic diagram of index data in block chain technology of the present invention.
Fig. 2 is the structural representation of block chain in the present invention.
Fig. 3 is the complete availability verification of index data bag and the schematic flow sheet for alerting.
Fig. 4 is the process schematic that index data packet encryption is uploaded.
Fig. 5 is the generating process schematic diagram of public key and private key.
Fig. 6 is principle schematic diagram. of the Distributed Autonomous formula calamity of the present invention for cloud storage system.
Specific embodiment
In order to more specifically describe the present invention, below in conjunction with the accompanying drawings and specific embodiment is to technical scheme
It is described in detail.
Calamity of the present invention based on block chain technology implements process as follows for cloud storage system construction method:
(1) the Distributed Autonomous formula calamity based on block chain technology is built for cloud storage system operation frame, cancel current cloud and deposit
The centralization platform being widely present in storage system, realizes the direct friendship of storage demand node (client) and network storage node
Mutually so that whole cloud storage system can reach decentration and distributed autonomy.
Exist in network substantial amounts of data storage requirement (client) and random distribution be ready sell depositing for memory space
Data to be stored are divided into data text and index data two parts when calamity is carried out for cloud storage by storage equipment, client first.
Wherein, the keyword of index data to be one group have obvious characteristic or distinguishing feature, therefore, to assure that by complete index data energy
It is enough to find data text like clockwork.The combination of fields such as " data name " " setup time " " modification time " " authors " can be with
As index data.
For data text, client Backup Data text in local and x network storage node, x be more than etc.
In 1 integer, x means that only 1 network node has data text when being equal to 1, if the network node has an accident will lead
Cause the unavailable of stored data text or lose;X values mean that more greatly the network node for having data text is more, client
When cloud storage data are downloaded, response and speed of download are faster, but will cause the wave of quite a few storage device memory capacity
Take, the value of x is set to into 2 in the present invention.
For index data, client is split into multiple packets and multiple network nodes is stored in Jing after private key encryption
In.The relevant information of index data is carried out blocking encapsulation by each network storage node, and there will be numerous data of this node
The index data block of file is linked into block chain and is managed.Node in network is deposited by the verification of Merkle trees check addition
The integrity of packet, if find data-bag lost or it is unavailable if send alarm to client, request reparation or upload again
Data.
(2) index data of data to be stored is carried out into blocking encapsulation, and block is set up in each network storage node
Chain is easily and safely managing data storage.
After network storage node receives the index data bag of client upload, blocking encapsulation, block structure are carried out
As shown in Figure 1.Each block is divided into block head and block body two parts, and the address information of the block is encapsulated in block head
" previous block " and " latter block ", reflects " timestamp " of block packaging time, " index data file cryptographic Hash " and uses
With " other data meta files " that system extends.Merkle tree check addition is encapsulated in block body then, to verify institute in network
The integrity and availability of deposit data, is verified the Merkle roots for obtaining and is compared with the file cryptographic Hash in block head, if two
Person is identical, proves that data are complete available.
For convenience of managing, numerous blocks is linked into block chain by each networking memory node, and numerous blocks are according to encapsulation
The priority of time is linked into the main chain of, if the node has multiple index data bags of same data text, earliest
One block of encapsulation is linked on main chain, the block of its post package be consecutively connected on first block to be formed one it is shorter
Side chain, as shown in Figure 2.
(3) it is that the block for being packaged with data storage carries Merkle tree check additions, whether verification network stored data bag is complete
It is whole available.
The cloud storage system of Distributed Autonomous need the bag for proving storage on network be it is complete, it is available.This means every
The individual node for having index data bag needs to prove this section to other nodes for having same textual data residue index data bag
Point possesses certain or multiple index data encrypted packets.The operation principle of Merkle tree check additions is:Between each memory node mutually
Index data packet number is sent, two adjacent index data packet numbers form new character string after a Hash procedure,
Two adjacent new character strings carry out Hash procedure again after merging and form new character strings, by that analogy, until Merkle roots are obtained,
By Merkle with comparing with the file cryptographic Hash that encapsulates in block, if identical, by verification, if it is different, alarm is sent,
Requesting client is repaired corresponding data or re-starts the upload for completing.
(4) when finding that network stored data bag surprisingly lacks or be unavailable, alarm user is accordingly supplemented or secondary
Upload backup.
As shown in figure 3, each node timing for having index data bag mutually sends the index data bag each having
Numbering, is verified by Merkle tree processes after node collects left and right index data packet number, if verifying successfully, is proved
Packet in network is complete available;If verification failure is sending alarm, client is reminded to repair in time or upload again number
According to if user is without response, persistently holding alarm reaches the upper limit of system definition until alerting number of times;If client is carried out in time
The repairing of data uploads then duplication check process again until by verification.
(5) cloud storage data are encrypted using rivest, shamir, adelman, it is ensured that the safety of data storage.
Client is encrypted using private key after index data bag is split when index data bag is uploaded, and the process is such as
Shown in Fig. 4.When client needs to download the data of storage, confirmation is wanted the index of downloading data and submits decryption public key to, has rope
The all index data bags of network node of argument evidence are decrypted the storage address for obtaining data text after collecting, carry out down
Carry.
As shown in figure 5, the generating process of public key and private key is:It it is 128 by calling random number generator to generate digit
Private key, the theoretical quantity of private key is up to great 2128, it is ensured that private data is cryptography safety.For ease of identification,
It is converted to by hash algorithm SHA256 and Base58;Public key is by using this asymmetric arithmetic root of elliptic curve encryption algorithm
According to 40 character length random number of original private keys text string generation, then it is converted to through hash algorithm SHA256 and Base58.
We construct a small-sized base for including two storage demand nodes (client), 8 network storage nodes below
In block chain technology calamity for cloud storage system, system structure is as shown in Figure 6.Within the system, storage demand 1 is by textual data
In node 1 and node 6, its index data packet is stored in 1,2,3,5,6 nodes after encryption for backup;Storage demand 2 will
Textual data back up in node 3 and node 8, its index data bag is stored in 3,4,7,8 nodes after encryption, other arrange or
Method is arranged with reference to the content of the invention, and Jing tests the cloud storage work(that the mini system can smoothly realize the Distributed Autonomous of decentration
Energy.
The above-mentioned description to embodiment is to be understood that for ease of those skilled in the art and apply the present invention.
Person skilled in the art obviously easily can make various modifications to above-described embodiment, and described herein general
Principle is applied in other embodiment without through performing creative labour.Therefore, the invention is not restricted to above-described embodiment, ability
Field technique personnel announcement of the invention, the improvement made for the present invention and modification all should be in protection scope of the present invention
Within.
Claims (8)
1. a kind of calamity based on block chain technology comprises the steps for cloud storage system construction method:
(1) distributed autonomous calamity is built for cloud storage system operation frame;
(2) blocking encapsulation is carried out to the index data of client data to be stored by network storage node, and encapsulation is completed
Independent blocks afterwards connect into block chain;
(3) it is that the block for being packaged with index data carries Merkle tree check additions, to verify client storage number in systems
According to whether completely available;If there is shortage of data, network storage node alarm user carries out corresponding completion or secondary upload backup;
(4) protection is encrypted using rivest, shamir, adelman to index data.
2. calamity according to claim 1 is for cloud storage system construction method, it is characterised in that:The step (1) it is concrete
Implementation method is:The centralization platform being widely present in cancelling current cloud storage system, to realize client and network storage section
Point direct interaction, makes whole cloud storage system reach the distributed autonomy of decentration;Client will when calamity is carried out for cloud storage
Data to be stored are divided into data text and index data two parts, and back up in local and at least two network storage nodes
Data text, by index data split into multiple index data bags it is encrypted after be stored in multiple network storage nodes.
3. calamity according to claim 1 is for cloud storage system construction method, it is characterised in that:Network in the step (2)
Memory node carries out the adopted block structure of blocking encapsulation and is made up of block head and block body to index data, and block head is
The essential information hurdle of independent blocks, when its enclosed inside has the address information of a upper block and next block, reflection block to encapsulate
Between timestamp, the file cryptographic Hash of index data and for system extension other data meta files;Then seal in block body
Multiple index data packet numbers of the same data text of correspondence are filled, all index data packet numbers are found by Hash processes
The Merkle tree roots and Merkle tree roots are credited in block head.
4. calamity according to claim 3 is for cloud storage system construction method, it is characterised in that:Network in the step (2)
The sequencing that each independent blocks is temporally stabbed is connected into block chain as main chain for memory node, if current network storage section
Point there are multiple index data blocks of the same data text of correspondence, then the index data block H that wherein will be encapsulated earliest
It is connected on main chain, other index data blocks is sequentially connected to into formation one on index data block H by packaging time shorter
Side chain.
5. calamity according to claim 3 is for cloud storage system construction method, it is characterised in that:In the step (3)
Merkle tree check additions to implement process as follows:Each deposited index data bag is sent between each network storage node mutually
Numbering, network storage node collect numbering after make adjacent two index data packet number shape after a Hash procedure
The character string of Cheng Xin, and then make two adjacent new character strings carry out Hash procedure again after merging to form new character string, with this
Analogize, until obtain Merkle tree roots, the index data file cryptographic Hash encapsulated in Merkle tree roots and block head is compared
It is right, to verify whether client data storage in systems completely can use.
6. calamity according to claim 5 is for cloud storage system construction method, it is characterised in that:Network in the step (3)
All index data packet numbers are found the rope encapsulated in the Merkle tree root block heads for obtaining by Hash processes by memory node
Draw data file cryptographic Hash to compare:If identical, by verification;If it is different, then sending alarm, requesting client repairs phase
Answer data or upload again partial data;If client is without response, persistently keep alarm to reach upper limit threshold until alerting number of times
Value, if client has carried out data modification in time or uploaded again partial data, duplication check process is until by verification.
7. calamity according to claim 1 is for cloud storage system construction method, it is characterised in that:Adopt in the step (4)
Rivest, shamir, adelman index data is encrypted protection to implement process as follows:Client is uploading index data
When, index data is split into into multiple index data bags and is encrypted using private key;When client needs to download which in system
In data storage when, confirmation is wanted the index of downloading data and submits public key to, has the network storage node of index data by institute
The storage address that acquisition data text is decrypted using public key after having index data bag to collect is downloaded.
8. calamity according to claim 7 is for cloud storage system construction method, it is characterised in that:The life of the public key and private key
Into process it is:Be the random number of 128 by calling random number generator to generate digit, so by hash algorithm SHA256 and
The random number is converted into private key and is supplied to client by Base58;Described public key is according to original private by elliptic curve encryption algorithm
The random number of 40 character length of key text string generation, then the random number is changed through hash algorithm SHA256 and Base58
Arrive.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611025145.2A CN106534317B (en) | 2016-11-17 | 2016-11-17 | A kind of calamity based on block chain technology is for cloud storage system construction method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611025145.2A CN106534317B (en) | 2016-11-17 | 2016-11-17 | A kind of calamity based on block chain technology is for cloud storage system construction method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106534317A true CN106534317A (en) | 2017-03-22 |
CN106534317B CN106534317B (en) | 2019-09-03 |
Family
ID=58353109
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611025145.2A Active CN106534317B (en) | 2016-11-17 | 2016-11-17 | A kind of calamity based on block chain technology is for cloud storage system construction method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534317B (en) |
Cited By (65)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106991165A (en) * | 2017-03-31 | 2017-07-28 | 北京京东金融科技控股有限公司 | Method, device and the electronic equipment of processing financial data based on block chain |
CN107103087A (en) * | 2017-05-02 | 2017-08-29 | 成都中远信电子科技有限公司 | Block chain big data analysis of market conditions system |
CN107122477A (en) * | 2017-05-02 | 2017-09-01 | 成都中远信电子科技有限公司 | A kind of block chain storage system |
CN107122682A (en) * | 2017-04-20 | 2017-09-01 | 杭州铜板街互联网金融信息服务有限公司 | The data processing method and system stored based on block chain |
CN107196934A (en) * | 2017-05-18 | 2017-09-22 | 电子科技大学 | A kind of cloud data managing method based on block chain |
CN107203344A (en) * | 2017-05-31 | 2017-09-26 | 郑州云海信息技术有限公司 | A kind of date storage method and data-storage system |
CN107222482A (en) * | 2017-06-01 | 2017-09-29 | 黑龙江卓亚科技有限公司 | A kind of data management system and method based on compound block chain network |
CN107249046A (en) * | 2017-08-15 | 2017-10-13 | 李俊庄 | A kind of distributed cloud storage system construction method based on block chain |
CN107273410A (en) * | 2017-05-03 | 2017-10-20 | 上海点融信息科技有限责任公司 | Distributed storage based on block chain |
CN107273455A (en) * | 2017-05-31 | 2017-10-20 | 深圳前海微众银行股份有限公司 | Block chain data access method and device |
CN107451011A (en) * | 2017-03-24 | 2017-12-08 | 北京瑞卓喜投科技发展有限公司 | The corrigenda method and system of the block chain of parallel increase block |
CN107480559A (en) * | 2017-08-25 | 2017-12-15 | 北京中星仝创科技有限公司 | Safe storage system and method for a kind of block chain from chain data |
CN107659410A (en) * | 2017-08-30 | 2018-02-02 | 湖南众享政联科技有限公司 | Based on the anti-tamper official document transmission of block chain and storage method |
CN107734021A (en) * | 2017-09-30 | 2018-02-23 | 上海壹账通金融科技有限公司 | block chain data uploading method, system, computer system and storage medium |
CN108062202A (en) * | 2017-12-15 | 2018-05-22 | 中链科技有限公司 | A kind of file block storage method and system |
CN108270874A (en) * | 2018-02-05 | 2018-07-10 | 武汉斗鱼网络科技有限公司 | The update method and device of application program |
CN108323232A (en) * | 2017-05-16 | 2018-07-24 | 北京大学深圳研究生院 | The maintaining method of index and chain topological structure between a kind of multi-layer block catenary system |
CN108401026A (en) * | 2018-02-26 | 2018-08-14 | 深圳智乾区块链科技有限公司 | Date storage method, system based on block chain and computer readable storage medium |
CN108462582A (en) * | 2018-02-09 | 2018-08-28 | 北京欧链科技有限公司 | Feedback method for treating in block chain and device |
CN108549654A (en) * | 2018-03-09 | 2018-09-18 | 史玉成 | A kind of big data analysis method based on image procossing |
WO2018177235A1 (en) * | 2017-03-28 | 2018-10-04 | 阿里巴巴集团控股有限公司 | Block chain consensus method and device |
CN108647230A (en) * | 2018-03-29 | 2018-10-12 | 深圳市网心科技有限公司 | Distributed storage method, electronic device and storage medium |
CN108681760A (en) * | 2018-05-15 | 2018-10-19 | 浙江鲸腾网络科技有限公司 | Data transmission method for uplink, method of reseptance and device |
CN108712409A (en) * | 2018-05-09 | 2018-10-26 | 梧州市兴能农业科技有限公司 | A kind of e bill transaction system based on privately owned block chain |
CN108764902A (en) * | 2018-05-23 | 2018-11-06 | 北京京东尚科信息技术有限公司 | Method, node and block catenary system for storing data |
CN109165122A (en) * | 2018-08-13 | 2019-01-08 | 浙商银行股份有限公司 | A method of the application system realized based on block chain technology is promoted with the more garden deployment calamities in city for ability |
CN109271283A (en) * | 2018-09-06 | 2019-01-25 | 北京云测信息技术有限公司 | A kind of data back up method based on block chain |
CN109274717A (en) * | 2018-08-22 | 2019-01-25 | 泰康保险集团股份有限公司 | Shared storage method, device, medium and electronic equipment based on block chain |
CN109284625A (en) * | 2018-09-03 | 2019-01-29 | 佛山科学技术学院 | A kind of Data Access Security method and device based on block chain |
CN109408523A (en) * | 2018-10-10 | 2019-03-01 | 罗克佳华科技集团股份有限公司 | Data sharing method, device, data sharing platform, electronic equipment |
CN109493017A (en) * | 2018-11-05 | 2019-03-19 | 江苏大学 | Credible outsourcing storage method based on block chain |
CN109583899A (en) * | 2018-12-20 | 2019-04-05 | 鸿秦(北京)科技有限公司 | Data storage and management method and system based on cloud storage service device |
CN109660493A (en) * | 2017-10-11 | 2019-04-19 | 南京南瑞继保电气有限公司 | A kind of new energy collection control cloud storage method based on block chain |
CN109727135A (en) * | 2019-01-23 | 2019-05-07 | 昧来网络科技(上海)有限公司 | Promote method, the computer-readable medium of the operation of block chain information and processing capacity |
CN109739927A (en) * | 2018-12-12 | 2019-05-10 | 北京世纪互联宽带数据中心有限公司 | Date storage method and its device, electronic equipment, computer-readable medium |
CN109753823A (en) * | 2018-12-11 | 2019-05-14 | 烨链(上海)科技有限公司 | A kind of block chain data monitoring and managing method, system and computer storage medium |
CN109753810A (en) * | 2018-12-12 | 2019-05-14 | 北京世纪互联宽带数据中心有限公司 | Data classification storage and its device, electronic equipment, computer-readable medium |
CN109766723A (en) * | 2018-12-11 | 2019-05-17 | 烨链(上海)科技有限公司 | A kind of block chain data framework, regulatory framework, monitoring and managing method and computer readable storage medium |
CN109788060A (en) * | 2019-01-22 | 2019-05-21 | 曲阜师范大学 | Cloud data sharing and update method based on block chain |
CN109889504A (en) * | 2019-01-23 | 2019-06-14 | 北京航空航天大学 | Decentralization data access rights method of commerce and system |
WO2019114096A1 (en) * | 2017-12-15 | 2019-06-20 | 成都链一网络科技有限公司 | Blockchain-based storage system |
WO2019114097A1 (en) * | 2017-12-15 | 2019-06-20 | 成都链一网络科技有限公司 | Blockchain-based distributed storage method |
CN109918874A (en) * | 2019-03-14 | 2019-06-21 | 上海优扬新媒信息技术有限公司 | A kind of material object information storage means and device, information searching method in kind and device |
CN109936620A (en) * | 2019-01-21 | 2019-06-25 | 中国联合网络通信集团有限公司 | Storage method and device, system and storage medium based on block chain |
CN110321723A (en) * | 2019-07-08 | 2019-10-11 | 白静 | A kind of block chain security information processing system and method, electronic equipment, medium |
CN110958285A (en) * | 2018-09-27 | 2020-04-03 | 北京云雾链网络科技有限公司 | Data storage system based on block chain |
CN110989934A (en) * | 2019-12-05 | 2020-04-10 | 达闼科技成都有限公司 | Block chain link point data storage method, block chain system and block chain link point |
CN111104686A (en) * | 2019-09-10 | 2020-05-05 | 腾讯科技(深圳)有限公司 | Block chain network control method, device, equipment and storage medium |
US10649520B2 (en) | 2017-05-12 | 2020-05-12 | Alibaba Group Holding Limited | Method and device for inputting password in virtual reality scene |
CN111159741A (en) * | 2019-12-30 | 2020-05-15 | 深圳探科技术有限公司 | Block chain intelligent contract information safety system |
CN111368333A (en) * | 2020-03-26 | 2020-07-03 | 国金公用通链(海南)信息科技有限公司 | Universal block chain key encapsulation technology |
CN111400751A (en) * | 2020-03-12 | 2020-07-10 | 厦门区块链云科技有限公司 | Disaster recovery cloud storage system construction method based on block chain technology |
CN111427965A (en) * | 2020-06-10 | 2020-07-17 | 浙江和达科技股份有限公司 | Management method and management system for water affair data |
CN111586109A (en) * | 2020-04-17 | 2020-08-25 | 上海坤仪金科信息技术有限公司 | Block chain cloud storage user data deduplication solution |
CN111614655A (en) * | 2017-03-24 | 2020-09-01 | 创新先进技术有限公司 | Consensus checking method and device |
CN111723071A (en) * | 2020-06-18 | 2020-09-29 | 江苏优网智能科技有限公司 | Distributed dynamic point cloud storage technology |
CN111831743A (en) * | 2020-06-05 | 2020-10-27 | 广东科学技术职业学院 | Block chain data storage system and method based on cloud storage |
CN112019330A (en) * | 2020-08-04 | 2020-12-01 | 广东省科技基础条件平台中心 | Intranet security audit data storage method and system based on alliance chain |
CN112152981A (en) * | 2019-06-29 | 2020-12-29 | 华为技术有限公司 | Communication method, node and communication system |
CN112750514A (en) * | 2021-01-30 | 2021-05-04 | 云知声智能科技股份有限公司 | Medical record management method and system based on block chain technology |
CN112948856A (en) * | 2021-03-03 | 2021-06-11 | 电信科学技术第五研究所有限公司 | Tamper-proof credible network collaborative control system and implementation method |
CN114244856A (en) * | 2020-09-09 | 2022-03-25 | 中国联合网络通信集团有限公司 | Block chain based network storage method, device and system and operator platform |
CN115052008A (en) * | 2022-05-26 | 2022-09-13 | 南京邮电大学 | Block chain data link down-link storage method based on cloud storage |
US11888976B2 (en) | 2017-12-13 | 2024-01-30 | Nchain Licensing Ag | System and method for multi-party generation of blockchain-based smart contract |
CN114244856B (en) * | 2020-09-09 | 2024-05-10 | 中国联合网络通信集团有限公司 | Block chain-based network storage method, device and system and operator platform |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106022681A (en) * | 2016-05-13 | 2016-10-12 | 杭州云象网络技术有限公司 | Logistics tracking method based on block chain |
US20160321654A1 (en) * | 2011-04-29 | 2016-11-03 | Stephen Lesavich | Method and system for storage and retrieval of blockchain blocks using galois fields |
CN106130779A (en) * | 2016-07-18 | 2016-11-16 | 布比(北京)网络技术有限公司 | A kind of Internet of Things equipment and with the Internet of Things construction method of this equipment |
-
2016
- 2016-11-17 CN CN201611025145.2A patent/CN106534317B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160321654A1 (en) * | 2011-04-29 | 2016-11-03 | Stephen Lesavich | Method and system for storage and retrieval of blockchain blocks using galois fields |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106022681A (en) * | 2016-05-13 | 2016-10-12 | 杭州云象网络技术有限公司 | Logistics tracking method based on block chain |
CN106130779A (en) * | 2016-07-18 | 2016-11-16 | 布比(北京)网络技术有限公司 | A kind of Internet of Things equipment and with the Internet of Things construction method of this equipment |
Cited By (102)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11334888B2 (en) | 2017-03-24 | 2022-05-17 | Advanced New Technologies Co., Ltd. | Method and apparatus for consensus verification |
CN111614655A (en) * | 2017-03-24 | 2020-09-01 | 创新先进技术有限公司 | Consensus checking method and device |
CN107451011A (en) * | 2017-03-24 | 2017-12-08 | 北京瑞卓喜投科技发展有限公司 | The corrigenda method and system of the block chain of parallel increase block |
CN107451011B (en) * | 2017-03-24 | 2020-12-25 | 北京瑞卓喜投科技发展有限公司 | Error correction method and system for block chain of parallel added blocks |
US10797886B2 (en) | 2017-03-28 | 2020-10-06 | Alibaba Group Holding Limited | Blockchain consensus method and device |
US10887112B2 (en) | 2017-03-28 | 2021-01-05 | Advanced New Technologies Co., Ltd. | Blockchain consensus method and device |
WO2018177235A1 (en) * | 2017-03-28 | 2018-10-04 | 阿里巴巴集团控股有限公司 | Block chain consensus method and device |
US10785039B2 (en) | 2017-03-28 | 2020-09-22 | Alibaba Group Holding Limited | Blockchain consensus method and device |
CN106991165A (en) * | 2017-03-31 | 2017-07-28 | 北京京东金融科技控股有限公司 | Method, device and the electronic equipment of processing financial data based on block chain |
CN106991165B (en) * | 2017-03-31 | 2020-07-31 | 京东数字科技控股有限公司 | Method and device for processing financial data based on block chain and electronic equipment |
WO2018176966A1 (en) * | 2017-03-31 | 2018-10-04 | 北京京东金融科技控股有限公司 | Method and apparatus for processing financial data based on blockchain, and electronic device |
CN107122682A (en) * | 2017-04-20 | 2017-09-01 | 杭州铜板街互联网金融信息服务有限公司 | The data processing method and system stored based on block chain |
CN107122682B (en) * | 2017-04-20 | 2019-02-05 | 杭州铜板街互联网金融信息服务有限公司 | Data processing method and system based on the storage of block chain |
CN107122477A (en) * | 2017-05-02 | 2017-09-01 | 成都中远信电子科技有限公司 | A kind of block chain storage system |
CN107103087A (en) * | 2017-05-02 | 2017-08-29 | 成都中远信电子科技有限公司 | Block chain big data analysis of market conditions system |
CN107273410A (en) * | 2017-05-03 | 2017-10-20 | 上海点融信息科技有限责任公司 | Distributed storage based on block chain |
WO2018201797A1 (en) * | 2017-05-03 | 2018-11-08 | 上海点融信息科技有限责任公司 | Block chain-based distributed storage |
CN107273410B (en) * | 2017-05-03 | 2020-07-07 | 上海点融信息科技有限责任公司 | Block chain based distributed storage |
US10649520B2 (en) | 2017-05-12 | 2020-05-12 | Alibaba Group Holding Limited | Method and device for inputting password in virtual reality scene |
US10788891B2 (en) | 2017-05-12 | 2020-09-29 | Alibaba Group Holding Limited | Method and device for inputting password in virtual reality scene |
US11061468B2 (en) | 2017-05-12 | 2021-07-13 | Advanced New Technologies Co., Ltd. | Method and device for inputting password in virtual reality scene |
US10901498B2 (en) | 2017-05-12 | 2021-01-26 | Advanced New Technologies Co., Ltd. | Method and device for inputting password in virtual reality scene |
CN108323232A (en) * | 2017-05-16 | 2018-07-24 | 北京大学深圳研究生院 | The maintaining method of index and chain topological structure between a kind of multi-layer block catenary system |
WO2018209543A1 (en) * | 2017-05-16 | 2018-11-22 | 北京大学深圳研究生院 | Method for maintaining indexes and chain topology between multi-level blockchain systems |
CN107196934A (en) * | 2017-05-18 | 2017-09-22 | 电子科技大学 | A kind of cloud data managing method based on block chain |
CN107196934B (en) * | 2017-05-18 | 2019-05-10 | 电子科技大学 | A kind of cloud data managing method based on block chain |
CN107273455A (en) * | 2017-05-31 | 2017-10-20 | 深圳前海微众银行股份有限公司 | Block chain data access method and device |
CN107203344A (en) * | 2017-05-31 | 2017-09-26 | 郑州云海信息技术有限公司 | A kind of date storage method and data-storage system |
CN107222482A (en) * | 2017-06-01 | 2017-09-29 | 黑龙江卓亚科技有限公司 | A kind of data management system and method based on compound block chain network |
CN107249046A (en) * | 2017-08-15 | 2017-10-13 | 李俊庄 | A kind of distributed cloud storage system construction method based on block chain |
CN107480559A (en) * | 2017-08-25 | 2017-12-15 | 北京中星仝创科技有限公司 | Safe storage system and method for a kind of block chain from chain data |
CN107480559B (en) * | 2017-08-25 | 2019-08-20 | 北京中星仝创科技有限公司 | A kind of safe storage system and method for the block chain from chain data |
CN107659410A (en) * | 2017-08-30 | 2018-02-02 | 湖南众享政联科技有限公司 | Based on the anti-tamper official document transmission of block chain and storage method |
CN107734021B (en) * | 2017-09-30 | 2020-04-07 | 深圳壹账通智能科技有限公司 | Block chain data uploading method and system, computer system and storage medium |
US11146384B2 (en) | 2017-09-30 | 2021-10-12 | One Connect Smart Technology Co., Ltd. (Shenzhen) | Method, system, computer system and storage medium of uploading blockchain data |
CN107734021A (en) * | 2017-09-30 | 2018-02-23 | 上海壹账通金融科技有限公司 | block chain data uploading method, system, computer system and storage medium |
CN109660493B (en) * | 2017-10-11 | 2020-12-18 | 南京南瑞继保电气有限公司 | New energy centralized control cloud storage method based on block chain |
CN109660493A (en) * | 2017-10-11 | 2019-04-19 | 南京南瑞继保电气有限公司 | A kind of new energy collection control cloud storage method based on block chain |
US11888976B2 (en) | 2017-12-13 | 2024-01-30 | Nchain Licensing Ag | System and method for multi-party generation of blockchain-based smart contract |
WO2019114097A1 (en) * | 2017-12-15 | 2019-06-20 | 成都链一网络科技有限公司 | Blockchain-based distributed storage method |
CN108062202A (en) * | 2017-12-15 | 2018-05-22 | 中链科技有限公司 | A kind of file block storage method and system |
WO2019114096A1 (en) * | 2017-12-15 | 2019-06-20 | 成都链一网络科技有限公司 | Blockchain-based storage system |
CN108270874B (en) * | 2018-02-05 | 2021-04-23 | 武汉斗鱼网络科技有限公司 | Application program updating method and device |
CN108270874A (en) * | 2018-02-05 | 2018-07-10 | 武汉斗鱼网络科技有限公司 | The update method and device of application program |
CN108462582A (en) * | 2018-02-09 | 2018-08-28 | 北京欧链科技有限公司 | Feedback method for treating in block chain and device |
CN108401026A (en) * | 2018-02-26 | 2018-08-14 | 深圳智乾区块链科技有限公司 | Date storage method, system based on block chain and computer readable storage medium |
CN108549654B (en) * | 2018-03-09 | 2023-09-05 | 浙江昕微电子科技有限公司 | Big data analysis method based on image processing |
CN108549654A (en) * | 2018-03-09 | 2018-09-18 | 史玉成 | A kind of big data analysis method based on image procossing |
CN108647230A (en) * | 2018-03-29 | 2018-10-12 | 深圳市网心科技有限公司 | Distributed storage method, electronic device and storage medium |
CN108647230B (en) * | 2018-03-29 | 2021-10-08 | 深圳市网心科技有限公司 | Distributed storage method, electronic device, and storage medium |
CN108712409A (en) * | 2018-05-09 | 2018-10-26 | 梧州市兴能农业科技有限公司 | A kind of e bill transaction system based on privately owned block chain |
CN108681760B (en) * | 2018-05-15 | 2021-09-14 | 恒生电子股份有限公司 | Data sending method, receiving method and device |
CN108681760A (en) * | 2018-05-15 | 2018-10-19 | 浙江鲸腾网络科技有限公司 | Data transmission method for uplink, method of reseptance and device |
CN108764902A (en) * | 2018-05-23 | 2018-11-06 | 北京京东尚科信息技术有限公司 | Method, node and block catenary system for storing data |
CN108764902B (en) * | 2018-05-23 | 2020-12-22 | 北京京东尚科信息技术有限公司 | Method, node and blockchain system for storing data |
CN109165122A (en) * | 2018-08-13 | 2019-01-08 | 浙商银行股份有限公司 | A method of the application system realized based on block chain technology is promoted with the more garden deployment calamities in city for ability |
CN109274717A (en) * | 2018-08-22 | 2019-01-25 | 泰康保险集团股份有限公司 | Shared storage method, device, medium and electronic equipment based on block chain |
CN109274717B (en) * | 2018-08-22 | 2021-08-24 | 泰康保险集团股份有限公司 | Block chain based shared storage method, device, medium and electronic equipment |
CN109284625A (en) * | 2018-09-03 | 2019-01-29 | 佛山科学技术学院 | A kind of Data Access Security method and device based on block chain |
CN109271283A (en) * | 2018-09-06 | 2019-01-25 | 北京云测信息技术有限公司 | A kind of data back up method based on block chain |
CN110958285A (en) * | 2018-09-27 | 2020-04-03 | 北京云雾链网络科技有限公司 | Data storage system based on block chain |
CN110958285B (en) * | 2018-09-27 | 2023-03-31 | 安徽华峪文化科技有限公司 | Data storage system based on block chain |
CN109408523B (en) * | 2018-10-10 | 2020-06-02 | 罗克佳华科技集团股份有限公司 | Data sharing method and device, data sharing platform and electronic equipment |
CN109408523A (en) * | 2018-10-10 | 2019-03-01 | 罗克佳华科技集团股份有限公司 | Data sharing method, device, data sharing platform, electronic equipment |
CN109493017B (en) * | 2018-11-05 | 2021-11-23 | 江苏大学 | Trusted outsourcing storage method based on block chain |
CN109493017A (en) * | 2018-11-05 | 2019-03-19 | 江苏大学 | Credible outsourcing storage method based on block chain |
CN109753823A (en) * | 2018-12-11 | 2019-05-14 | 烨链(上海)科技有限公司 | A kind of block chain data monitoring and managing method, system and computer storage medium |
CN109766723A (en) * | 2018-12-11 | 2019-05-17 | 烨链(上海)科技有限公司 | A kind of block chain data framework, regulatory framework, monitoring and managing method and computer readable storage medium |
CN109753810A (en) * | 2018-12-12 | 2019-05-14 | 北京世纪互联宽带数据中心有限公司 | Data classification storage and its device, electronic equipment, computer-readable medium |
CN109739927A (en) * | 2018-12-12 | 2019-05-10 | 北京世纪互联宽带数据中心有限公司 | Date storage method and its device, electronic equipment, computer-readable medium |
CN109583899A (en) * | 2018-12-20 | 2019-04-05 | 鸿秦(北京)科技有限公司 | Data storage and management method and system based on cloud storage service device |
CN109936620A (en) * | 2019-01-21 | 2019-06-25 | 中国联合网络通信集团有限公司 | Storage method and device, system and storage medium based on block chain |
CN109788060B (en) * | 2019-01-22 | 2021-05-07 | 曲阜师范大学 | Cloud data sharing and updating method based on block chain |
CN109788060A (en) * | 2019-01-22 | 2019-05-21 | 曲阜师范大学 | Cloud data sharing and update method based on block chain |
CN109889504A (en) * | 2019-01-23 | 2019-06-14 | 北京航空航天大学 | Decentralization data access rights method of commerce and system |
CN109727135A (en) * | 2019-01-23 | 2019-05-07 | 昧来网络科技(上海)有限公司 | Promote method, the computer-readable medium of the operation of block chain information and processing capacity |
CN109918874A (en) * | 2019-03-14 | 2019-06-21 | 上海优扬新媒信息技术有限公司 | A kind of material object information storage means and device, information searching method in kind and device |
CN112152981B (en) * | 2019-06-29 | 2021-11-19 | 华为技术有限公司 | Communication method, node and communication system |
CN112152981A (en) * | 2019-06-29 | 2020-12-29 | 华为技术有限公司 | Communication method, node and communication system |
CN110321723A (en) * | 2019-07-08 | 2019-10-11 | 白静 | A kind of block chain security information processing system and method, electronic equipment, medium |
CN110321723B (en) * | 2019-07-08 | 2021-11-09 | 环玺信息科技(上海)有限公司 | Block chain safety information processing system and method, electronic equipment and medium |
CN111104686B (en) * | 2019-09-10 | 2021-07-30 | 腾讯科技(深圳)有限公司 | Block chain network control method, device, equipment and storage medium |
CN111104686A (en) * | 2019-09-10 | 2020-05-05 | 腾讯科技(深圳)有限公司 | Block chain network control method, device, equipment and storage medium |
CN110989934B (en) * | 2019-12-05 | 2023-08-25 | 达闼机器人股份有限公司 | Block chain link point data storage method, block chain system and block chain node |
CN110989934A (en) * | 2019-12-05 | 2020-04-10 | 达闼科技成都有限公司 | Block chain link point data storage method, block chain system and block chain link point |
CN111159741A (en) * | 2019-12-30 | 2020-05-15 | 深圳探科技术有限公司 | Block chain intelligent contract information safety system |
CN111400751A (en) * | 2020-03-12 | 2020-07-10 | 厦门区块链云科技有限公司 | Disaster recovery cloud storage system construction method based on block chain technology |
CN111368333A (en) * | 2020-03-26 | 2020-07-03 | 国金公用通链(海南)信息科技有限公司 | Universal block chain key encapsulation technology |
CN111586109A (en) * | 2020-04-17 | 2020-08-25 | 上海坤仪金科信息技术有限公司 | Block chain cloud storage user data deduplication solution |
CN111831743A (en) * | 2020-06-05 | 2020-10-27 | 广东科学技术职业学院 | Block chain data storage system and method based on cloud storage |
CN111831743B (en) * | 2020-06-05 | 2023-11-14 | 广东科学技术职业学院 | Block chain data storage system and method based on cloud storage |
CN111427965A (en) * | 2020-06-10 | 2020-07-17 | 浙江和达科技股份有限公司 | Management method and management system for water affair data |
CN111723071A (en) * | 2020-06-18 | 2020-09-29 | 江苏优网智能科技有限公司 | Distributed dynamic point cloud storage technology |
CN112019330A (en) * | 2020-08-04 | 2020-12-01 | 广东省科技基础条件平台中心 | Intranet security audit data storage method and system based on alliance chain |
CN112019330B (en) * | 2020-08-04 | 2024-03-29 | 广东省科技基础条件平台中心 | Intranet security audit data storage method and system based on alliance chain |
CN114244856A (en) * | 2020-09-09 | 2022-03-25 | 中国联合网络通信集团有限公司 | Block chain based network storage method, device and system and operator platform |
CN114244856B (en) * | 2020-09-09 | 2024-05-10 | 中国联合网络通信集团有限公司 | Block chain-based network storage method, device and system and operator platform |
CN112750514A (en) * | 2021-01-30 | 2021-05-04 | 云知声智能科技股份有限公司 | Medical record management method and system based on block chain technology |
CN112948856B (en) * | 2021-03-03 | 2022-11-15 | 电信科学技术第五研究所有限公司 | Tamper-proof credible network collaborative control system and implementation method |
CN112948856A (en) * | 2021-03-03 | 2021-06-11 | 电信科学技术第五研究所有限公司 | Tamper-proof credible network collaborative control system and implementation method |
CN115052008A (en) * | 2022-05-26 | 2022-09-13 | 南京邮电大学 | Block chain data link down-link storage method based on cloud storage |
CN115052008B (en) * | 2022-05-26 | 2023-07-25 | 南京邮电大学 | Block chain data under-chain storage method based on cloud storage |
Also Published As
Publication number | Publication date |
---|---|
CN106534317B (en) | 2019-09-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106534317A (en) | Disaster recovery cloud storage system construction method based on block chain technology | |
Kushch et al. | Blockchain for dynamic nodes in a smart city | |
CN106936589B (en) | Centerless license chain parallel fragmentation method and transaction method | |
CN107249046A (en) | A kind of distributed cloud storage system construction method based on block chain | |
CN110069345A (en) | Crowdsourcing resource distribution formula anonymity dispensing method and its allocating system based on block chain | |
CN108683747A (en) | Resource acquisition, distribution, method for down loading, device, equipment and storage medium | |
CN110830235B (en) | Intelligent vehicle networking trusted data encryption method and system based on block chain | |
CN113783836A (en) | Internet of things data access control method and system based on block chain and IBE algorithm | |
CN110677241B (en) | Quantum network virtualization architecture method and device | |
CN104102714A (en) | Outsourcing data inquiry and verification method and system based on accumulator and Bloom filter | |
CN109272316A (en) | A kind of block realization method and system under the chain network based on block | |
CN110110552A (en) | A kind of electronics license data sharing method and system based on block chain | |
CN110690961A (en) | Quantum network function virtualization method and device | |
CN112367163A (en) | Quantum network virtualization method and device | |
CN110225012A (en) | The ownership inspection and update method of one outer bag data based on alliance's chain | |
CN105119719B (en) | A kind of key management method of safe storage system | |
CN112380179A (en) | Block chain-based steel supply chain information secret sharing method and system | |
CN114124956A (en) | Block chain edge calculation system | |
CN112019338A (en) | Lightweight safety smart power grid communication method and system based on block chain | |
CN113315753A (en) | Block data credibility recovery method based on coding technology | |
CN113159766A (en) | Data protection method, device, system, electronic device and storage medium | |
Zhang et al. | A master-slave chain architecture model for cross-domain trusted and authentication of power services | |
CN110071966A (en) | The networking of block chain and data processing method based on cloud platform | |
CN114615006A (en) | Edge layer data security protection method and system for power distribution Internet of things and storage medium | |
CN103888477B (en) | A kind of data transmission method suitable for credible connection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |