CN109711174A - Data capture method, device, equipment and storage medium - Google Patents
Data capture method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN109711174A CN109711174A CN201811452521.5A CN201811452521A CN109711174A CN 109711174 A CN109711174 A CN 109711174A CN 201811452521 A CN201811452521 A CN 201811452521A CN 109711174 A CN109711174 A CN 109711174A
- Authority
- CN
- China
- Prior art keywords
- block chain
- chain node
- data
- node
- numerical value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
This application discloses data capture method, device, equipment and storage medium, this method is applied to the first block chain node, comprising: determination is stored in the encryption data that the needs of block chain are decrypted, and the encryption data is obtained by the second block chain node encrytion;By intelligent contract, the encryption data is sent to the second block chain node, so that the encryption data is decrypted in the second block chain node;Receive the data that the second block chain node decryption obtains.This method ensure that the privacy of data, effectively prevents the leakage of data.
Description
Technical field
This application involves information technology fields, in particular to data capture method, device, equipment and storage medium.
Background technique
Block chain is the storage and computing technique of a kind of decentralization, by folding encrypted data chunk sequentially in time
The lasting not revisable record for adding and generating, and will be included in each node for being stored in block chain network, so that with
The mode collective of decentralization safeguards an authentic data library.The system data in certain time is contained in each data block,
And data fingerprint is generated for verifying the validity of its information and linking next database block.Therefore, block chain is in data
There is technical advantage in terms of anti-tamper, transparent and decentralization.
In general, block chain passes through clear-text way storing data, that is, the data of any node will be total in deposit block chain
All nodes in block chain network are enjoyed, thus other nodes can unconditionally obtain data content.In this way, energy
Data sharing and the transparency in block chain network is enough effectively ensured, but the value of data can not be embodied.
Summary of the invention
In view of problem above, the embodiment of the present invention provides data capture method, device, equipment and storage medium, with solution
Certainly existing data capture method unconditionally limits the problem of leading to valuable leaking data when obtaining data.
The data capture method of embodiment according to the invention is applied to the first block chain node, comprising: determination is stored in
The encryption data that the needs of block chain are decrypted, the encryption data are obtained by the second block chain node encrytion;Pass through intelligence
The encryption data is sent to the second block chain node, so that the second block chain node is to the encryption by contract
Data are decrypted;Receive the data that the second block chain node decryption obtains.
The data acquisition facility of embodiment according to the invention is applied to the first block chain node, comprising: determining module,
For determining the encryption data for being stored in the needs of block chain and decrypting, the encryption data is obtained by the second block chain node encrytion
It arrives;First processing module, for by intelligent contract, the encryption data to be sent to the second block chain node, with
The second block chain node is decrypted to the encryption data;Receiving module, for receiving the second block chain link
The data that point decryption obtains.
The calculating equipment of embodiment according to the invention, including processor;And memory, it is stored thereon with executable finger
It enables;Wherein, the processor is configured to execute the executable instruction to implement method above-mentioned.
The computer readable storage medium of embodiment according to the invention is stored thereon with computer program, the calculating
Machine program includes executable instruction, when the executable instruction is executed by processor, implements method above-mentioned.
It can be seen from the above that sharing to the data in block chain network in the scheme of the embodiment of the present invention
Be uploaded the block chain node encrytion of data, when other block chain nodes will obtain the data of decryption, need to by intelligent contract by
The block chain link point of encryption data is decrypted, to ensure that the privacy of data, effectively prevents the leakage of data.
Detailed description of the invention
Fig. 1 is data capture method one embodiment flow chart in the embodiment of the present application;
Fig. 2 is another embodiment flow chart of data capture method in the embodiment of the present application;
Fig. 3 is the architecture diagram of data-acquisition system in the embodiment of the present application;
Fig. 4 is data acquisition facility one embodiment schematic diagram in the embodiment of the present application;
Fig. 5 is one embodiment structural schematic diagram that equipment is calculated in the embodiment of the present application.
Specific embodiment
Theme described herein is discussed referring now to example embodiment.It should be understood that discussing these embodiments only
It is in order to enable those skilled in the art can better understand that being not to claim to realize theme described herein
Protection scope, applicability or the exemplary limitation illustrated in book.It can be in the protection scope for not departing from present disclosure
In the case of, the function and arrangement of the element discussed are changed.Each example can according to need, omit, substitute or
Add various processes or component.For example, described method can be executed according to described order in a different order, with
And each step can be added, omits or combine.In addition, feature described in relatively some examples is in other examples
It can be combined.
As used in this article, term " includes " and its modification indicate open term, are meant that " including but not limited to ".
Term "based" indicates " being based at least partially on ".Term " one embodiment " and " embodiment " expression " at least one implementation
Example ".Term " another embodiment " expression " at least one other embodiment ".Term " first ", " second " etc. may refer to not
Same or identical object.Here may include other definition, either specific or implicit.Unless bright in context
It really indicates, otherwise the definition of a term is consistent throughout the specification.
In order to keep the technical solution of the application clearer, below in conjunction with concrete scene to provided by the embodiments of the present application
Data capture method is introduced.
Fig. 1 is data capture method flow chart provided by the embodiments of the present application, and this method 100 is applied to the first block chain link
Point, method 100 the following steps are included:
S102: determination is stored in the encryption data that the needs of block chain are decrypted.
Wherein, the encryption data is obtained by the second block chain node encrytion, specifically, the second block chain node exists
Before data is stored in block chain, first clear data is encrypted to obtain encryption data, is then broadcasted encryption data,
So that each block chain node is stored in block chain after being verified to encryption data common recognition, by the encryption data.
In the embodiment of the present application, the second block chain node can encrypt clear data using symmetric encipherment algorithm
To obtain encryption data.
In the embodiment of the present application, be stored in block chain encryption data can have related abstract information, identification information or
Keyword message etc., the first block chain node can determine the encryption data for needing to decrypt by above- mentioned information.
S104: by intelligent contract, the encryption data is sent to the second block chain node, so that described second
The encryption data is decrypted in block chain node.
For block chain technical field, it is generally known that, intelligent contract is substantially the code of execution of being triggered, usually
It is preset in block chain.And the intelligent contract stored in block chain is difficult to be tampered, thus intelligent contract just can be used for executing it is pre-
If code logic, implementation procedure is not by block chain node intervention.In this specification embodiment, in multiple and different steps
Different code logics is executed using intelligent contract, wherein different code logics can be executed by different intelligent contracts,
It can also be executed by same intelligent contract, this specification is without limitation.In short, the effect of intelligent contract is to guarantee block
Chain node executes preset code logic, prevents block chain node from doing evil.
In the embodiment of the present application, the mapping relations of the node identification of the second block chain node and encryption data can be advised
Encryption data can be sent to by intelligent contract by the second block chain node due to intelligent contract, so that the second block chain link
The encryption data is decrypted in point.
S106: the data that the second block chain node decryption obtains are received.
In this way, which the first block chain node has just got its required clear data.
In one embodiment, as shown in Fig. 2, method 100 is further comprising the steps of:
S103: by intelligent contract, judge whether the first block chain node has the power for decrypting the encryption data
Limit;If so, S104 is thened follow the steps, if it is not, executing step S108.
In the embodiment of the present application, judge whether the first block chain node has the power for decrypting the encryption data
Limit, can determine whether the first block chain node has decryption by the mapping relations between node identification and decrypted rights
The permission of the ciphertext data, the mapping relations can provide among intelligent contract previously according to needs.For example, inspection mechanism
Article to be detected is usually sent to detection service mechanism B1 and is detected by A1, and inspection mechanism A2 usually by article to be detected send to
Detection service mechanism B2 is detected, then the service of inspection mechanism A1 and detection service mechanism B1 can be provided in intelligent contract
The decrypted rights of detection data of the device with decryption detection service mechanism B1, and the clothes of inspection mechanism A2 and detection service mechanism B2
Business device does not have the decrypted rights of the detection data of decryption detection service device mechanism B1 then, and vice versa.
S108: refuse to send the encryption data to the second block chain node.
In another embodiment, on the basis of data capture method shown in fig. 1 or fig. 2, method 100 is also wrapped
It includes: by intelligent contract, corresponding first numerical value of data decrypted and obtained is determined, by intelligent contract, by described first
The node identification of block chain node and first numerical value are broadcasted so that each block chain node to the node identification and
After the first numerical value common recognition is verified, the node identification and first numerical value are stored in block chain.
In the embodiment of the present application, first numerical value is reduced from the account of the first block chain node for characterizing
Numerical value.That is, first numerical value can be considered as the expense that the first block chain node is paid because obtaining the data.
Corresponding first numerical value of data is also required to determine by intelligent contract.The expense of first block chain node expenditure can be from its account
Remaining sum in deduct, expense deduction can be recorded in block chain in the form of block.As it can be seen that not only being stored altogether on block chain
The data enjoyed, also record of the publicity because obtaining data expenditure.
In yet another embodiment, on the basis of data capture method shown in fig. 1 or fig. 2, method 100 is also wrapped
It includes: by intelligent contract, the corresponding second value of data decrypted and obtained is determined, by intelligent contract, by described second
The node identification and the second value of block chain node are broadcasted so that each block chain node to the node identification and
After the second value common recognition is verified, the node identification and the second value are stored in block chain.
In the embodiment of the present application, the second value increases for characterizing into the account of the second block chain node
Numerical value.That is, the second value can be considered as the second block chain link when the first block chain node obtains the data
The taken in expense of point.The corresponding second value of data is also required to determine by intelligent contract.Income expense can be with block
Form is recorded in block chain.As it can be seen that going back the record taken in when publicity data are acquired on block chain.
By disclosed above it is found that first, forming block chain network by block chain node, block chain node is in shared data
Preceding first to encrypt to data, other block chain nodes, need to be by the block chain node to data encryption when obtaining clear data
Encryption data is decrypted, in this way, avoid the leaking data for being shared in block chain.Second, in optional embodiment
In, other block chain nodes are wanted to obtain data, need to verify the permission of itself by intelligent contract, have the section with permission only
Point can just check data.Third, in alternate embodiments, other block chain nodes obtain data and need to pay certain expense
With, and/or, the block chain node of shared data can take in certain expense when data are acquired, in this way, block link network
Block chain link point in network forms a mechanism of exchange, embodies the value of data.
Fig. 3 is the architecture diagram of data-acquisition system provided by the embodiments of the present application.As shown in figure 3, system 300 includes service
Device 302, server 304 and server 306, server 302 and server 304 are the first block chain node, and server 306 is the
Two block chain nodes, the first block chain node and the second block chain node form block chain network, and each server is safeguarded jointly
Block chain, the first block chain node can obtain data from block chain, and the second block chain node can be to block chain storing data.It answers
The understanding, the data of the block chain node in Fig. 3 are only schematical, according to actual needs, can have any amount
Block chain node, it is of course possible to there is any number of first block chain node and the second block chain node.In addition, the firstth area
The role of block chain node and the second block chain node is interchangeable.
Based on data capture method shown in FIG. 1, the embodiment of the present application also correspondence provides a kind of data acquisition facility, under
Face will be introduced data acquisition facility provided by the embodiments of the present application from the angle of function modoularization.
Fig. 4 is one embodiment schematic diagram of data acquisition facility in the embodiment of the present application, which can use soft
The mode of part, hardware or software and hardware combining is realized.Since the embodiment of device 400 is substantially similar to the embodiment of method, institute
To describe fairly simple, the relevent part can refer to the partial explaination of embodiments of method.Fig. 4 is referred to, device 400 includes true
Cover half block 402, first processing module 404 and receiving module 406.Determining module 402 is stored in the needs of block chain for determining
The encryption data of decryption, the encryption data are obtained by the second block chain node encrytion.First processing module 404 is for leading to
Intelligent contract is crossed, the encryption data is sent to the second block chain node, so that the second block chain node is to institute
Encryption data is stated to be decrypted.Receiving module 406 is for receiving the data that the second block chain node decryption obtains.
In one aspect, device 400 further includes judging treatmenting module, for passing through intelligent contract, by the encryption number
Before the step of being sent to the second block chain node, judge whether the first block chain node has decryption is described to add
The permission of ciphertext data, if so, the encryption data is sent to by the second block chain node by intelligent contract, if it is not,
Refuse to send the encryption data to the second block chain node.
On the other hand, device 400 further includes Second processing module, for determining described decrypt by intelligent contract
Corresponding first numerical value of the data arrived, first numerical value are used to characterize to reduce from the account of the first block chain node
Numerical value;By intelligent contract, the node identification of the first block chain node and first numerical value are broadcasted, so that respectively
Block chain node is after being verified the node identification and first numerical value common recognition, by the node identification and described the
One numerical value is stored in block chain.
In yet another aspect, device 400 further includes third processing module, for determining the decryption by intelligent contract
The corresponding second value of obtained data, the second value increase for characterizing into the account of the second block chain node
Numerical value;By intelligent contract, the node identification of the second block chain node and the second value are broadcasted, so that
Each block chain node is after being verified the node identification and second value common recognition, by the node identification and described
Second value is stored in block chain.
Above embodiments are that device provided by the embodiments of the present application is introduced from the angle of function modoularization, below will
Device provided by the embodiments of the present application is illustrated from the angle of hardware entities.
In the embodiment of the present application, a kind of calculating equipment is also provided, which may include processor and be used for
Store the memory of the executable instruction of the processor.Wherein, the processor is configured to via the execution executable finger
It enables come the step of executing the data capture method in any one above-mentioned embodiment.
Person of ordinary skill in the field it is understood that various aspects of the disclosure can be implemented as system, method or
Program product.Therefore, various aspects of the disclosure can be with specific implementation is as follows, it may be assumed that complete hardware embodiment, complete
The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here
Referred to as circuit, " module " or " system ".
Calculating equipment according to an embodiment of the present application is described referring to Fig. 5.For ease of description, illustrate only with
The relevant part of the embodiment of the present application, it is disclosed by specific technical details, please refer to the embodiment of the present application method part.
It is showed in the form of universal computing device as shown in figure 5, calculating equipment 500.Calculating equipment 500 may include processing
Device 502 and memory 504, wherein be stored with executable instruction on memory 504, wherein the executable instruction, which is worked as, to be performed
When make processor 502 execute the data capture method in any one above-mentioned embodiment.
As shown in figure 5, calculating equipment 500 can also include connecting different system components (including processor 502 and memory
504) bus 506.Bus 506 indicates one of a few class bus structures or a variety of, including memory bus or memory
Controller, peripheral bus, graphics acceleration port, processor or the local using any bus structures in a variety of bus structures
Bus.For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel system knot
Structure (MAC) bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI)
Bus.
It calculates equipment 500 and typically comprises a variety of computer system readable media.These media can be it is any can be by
Calculate the usable medium that equipment 500 accesses, including volatile and non-volatile media, moveable and immovable medium.
Memory 504 may include the computer system readable media of form of volatile memory, such as arbitrary access is deposited
Reservoir (RAM) 508 and and/or cache memory 510.Calculate equipment 500 may further include it is other it is removable/can not
Mobile, volatile/non-volatile computer system storage medium.Only as an example, storage system 512 can be used for reading and writing not
Movably, non-volatile magnetic media (Fig. 5 do not show, commonly referred to as " hard disk drive ").It, can be with although being not shown in Fig. 5
The disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") is provided, and non-volatile to moving
The CD drive of CD (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driving
Device can be connected by one or more data media interfaces with bus 506.Memory 504 may include at least one program
Product, the program product have one group of (for example, at least one) program module, these program modules are configured to perform above-mentioned
Data capture method in one embodiment of anticipating.
Program/utility 514 with one group of (at least one) program module 516, can store in such as memory
In 504, such program module 516 includes but is not limited to operating system, one or more application program, other program modules
And program data, it may include the realization of network environment in each of these examples or certain combination.Program module 516
Usually execute the data capture method in any one above-mentioned embodiment.
Calculating equipment 500 can also be with one or more external equipments 522 (such as keyboard, sensing equipment, display 524
Deng) communication, can also be enabled a user to one or more equipment interact with the calculating equipment 500 communicate, and/or with make
Any equipment (such as network interface card, the modem that the calculating equipment 500 can be communicated with one or more of the other calculating equipment
Etc.) communication.This communication can be carried out by input/output (I/O) interface 518.Also, calculating equipment 500 can also lead to
Cross network adapter 520 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, example
Such as internet) communication.As shown, network adapter 520 is communicated by bus 506 with the other modules for calculating equipment 500.It answers
When understanding, although not shown in the drawings, other hardware and/or software module can be used in conjunction with equipment 500 is calculated, including but unlimited
In: microcode, device driver, redundant processor, external disk drive array, RAID system, tape drive and data
Backup storage system etc..
The program that processor 502 is stored in memory 504 by operation, thereby executing various function application and data
Processing, such as realize the data capture method in any one above-mentioned embodiment.
A kind of computer readable storage medium is also provided in the embodiment of the present application, is stored thereon with computer program, it is described
Computer program includes executable instruction, when the executable instruction is executed by processor, implements any one above-mentioned embodiment
In data capture method the step of.In some possible embodiments, various aspects of the disclosure is also implemented as one
The form of kind program product comprising program code, when described program product is run on the terminal device, said program code
For executing the terminal device described in the data capture method of this specification according to the various exemplary implementations of the disclosure
The step of example.
Program product according to an embodiment of the present disclosure for realizing the above method can be using portable compact disc only
It reads memory (CD-ROM) and including program code, and can be run on terminal device, such as PC.However, this public affairs
The program product opened is without being limited thereto, and in this document, readable storage medium storing program for executing can be any tangible Jie for including or store program
Matter, the program can be commanded execution system, device or device use or in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or
System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only
Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory
(CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed
Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism
Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing
Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or
Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet
Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the disclosure operation program
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network
(WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP
To be connected by internet).
The specific embodiment illustrated above in conjunction with attached drawing describes exemplary embodiment, it is not intended that may be implemented
Or fall into all embodiments of the protection scope of claims." exemplary " meaning of the term used in entire this specification
Taste " be used as example, example or illustration ", be not meant to than other embodiments " preferably " or " there is advantage ".For offer pair
The purpose of the understanding of described technology, specific embodiment include detail.However, it is possible in these no details
In the case of implement these technologies.In some instances, public in order to avoid the concept to described embodiment causes indigestion
The construction and device known is shown in block diagram form.
The foregoing description of present disclosure is provided so that any those of ordinary skill in this field can be realized or make
Use present disclosure.To those skilled in the art, the various modifications carried out to present disclosure are apparent
, also, can also answer generic principles defined herein in the case where not departing from the protection scope of present disclosure
For other modifications.Therefore, present disclosure is not limited to examples described herein and design, but disclosed herein with meeting
Principle and novel features widest scope it is consistent.
Claims (10)
1. data capture method is applied to the first block chain node, comprising:
Determination is stored in the encryption data that the needs of block chain are decrypted, and the encryption data is obtained by the second block chain node encrytion
It arrives;
By intelligent contract, the encryption data is sent to the second block chain node, so that the second block chain link
The encryption data is decrypted in point;
Receive the data that the second block chain node decryption obtains.
2. it is described by intelligent contract according to the method described in claim 1, wherein, the encryption data is sent to described
Before the step of second block chain node, the method also includes:
By intelligent contract, judge whether the first block chain node has the permission for decrypting the encryption data;
If so, the encryption data is sent to the second block chain node by intelligent contract;
If it is not, refusing to send the encryption data to the second block chain node.
3. method according to claim 1 or 2, wherein the method also includes:
By intelligent contract, determine corresponding first numerical value of data decrypted and obtained, first numerical value for characterize from
The numerical value reduced in the account of the first block chain node;
By intelligent contract, the node identification of the first block chain node and first numerical value are broadcasted, so that respectively
Block chain node is after being verified the node identification and first numerical value common recognition, by the node identification and described the
One numerical value is stored in block chain.
4. method according to claim 1 or 2, wherein the method also includes:
By intelligent contract, determine the corresponding second value of data decrypted and obtained, the second value for characterize to
Increased numerical value in the account of the second block chain node;
By intelligent contract, the node identification of the second block chain node and the second value are broadcasted, so that respectively
Block chain node is after being verified the node identification and second value common recognition, by the node identification and described the
Two numerical value are stored in block chain.
5. data acquisition facility is applied to the first block chain node, comprising:
Determining module, for determining the encryption data for being stored in the needs of block chain and decrypting, the encryption data is by the secondth area
Block chain node encrytion obtains;
First processing module, for by intelligent contract, the encryption data to be sent to the second block chain node, so that
The encryption data is decrypted in the second block chain node;
Receiving module, the data obtained for receiving the second block chain node decryption.
6. device according to claim 5, wherein described device further include:
Judging treatmenting module, for by intelligent contract, the encryption data to be sent to the second block chain node
Before step, judge whether the first block chain node has the permission for decrypting the encryption data, if so, passing through intelligence
The encryption data is sent to the second block chain node by contract, if it is not, refusing to send to the second block chain node
The encryption data.
7. device according to claim 5 or 6, wherein described device further include:
Second processing module, for by intelligent contract, determining corresponding first numerical value of data decrypted and obtained, described the
One numerical value is for characterizing the numerical value reduced from the account of the first block chain node;By intelligent contract, by described first
The node identification of block chain node and first numerical value are broadcasted so that each block chain node to the node identification and
After the first numerical value common recognition is verified, the node identification and first numerical value are stored in block chain.
8. device according to claim 5 or 6, wherein described device further include:
Third processing module, for by intelligent contract, determining the corresponding second value of data decrypted and obtained, described the
Two numerical value are for characterizing the increased numerical value into the account of the second block chain node;By intelligent contract, by described second
The node identification and the second value of block chain node are broadcasted so that each block chain node to the node identification and
After the second value common recognition is verified, the node identification and the second value are stored in block chain.
9. calculating equipment, comprising:
Processor;And
Memory is stored thereon with executable instruction;
Wherein, the processor is configured to execute the executable instruction to implement side as described in any one of claims 1-3
Method.
10. computer readable storage medium is stored thereon with computer program, the computer program includes executable instruction,
When the executable instruction is executed by processor, implement the method according to claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811452521.5A CN109711174A (en) | 2018-11-30 | 2018-11-30 | Data capture method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811452521.5A CN109711174A (en) | 2018-11-30 | 2018-11-30 | Data capture method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109711174A true CN109711174A (en) | 2019-05-03 |
Family
ID=66255404
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811452521.5A Pending CN109711174A (en) | 2018-11-30 | 2018-11-30 | Data capture method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109711174A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110401631A (en) * | 2019-06-19 | 2019-11-01 | 深圳壹账通智能科技有限公司 | System upgrade information acquisition method, device, storage medium and block chain node |
CN111400328A (en) * | 2020-03-12 | 2020-07-10 | 北京阿尔山金融科技有限公司 | Data updating method and device and node server |
CN112115498A (en) * | 2020-09-28 | 2020-12-22 | 上海申铁信息工程有限公司 | Block chain-based data access authority control method and device |
CN114205093A (en) * | 2021-12-15 | 2022-03-18 | 深圳前海微众银行股份有限公司 | Block chain message transmission method, device, client and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106651346A (en) * | 2016-11-28 | 2017-05-10 | 上海凯岸信息科技有限公司 | Block chain-based credit investigation data sharing and trading system |
CN107294709A (en) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, apparatus and system |
CN107425982A (en) * | 2017-07-07 | 2017-12-01 | 众安信息技术服务有限公司 | A kind of method and block chain for realizing intelligent contract data encryption |
CN107862215A (en) * | 2017-09-29 | 2018-03-30 | 阿里巴巴集团控股有限公司 | A kind of date storage method, data query method and device |
CN108090769A (en) * | 2017-12-19 | 2018-05-29 | 苗放 | A kind of data safety method of commerce and system based on ownership |
-
2018
- 2018-11-30 CN CN201811452521.5A patent/CN109711174A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106651346A (en) * | 2016-11-28 | 2017-05-10 | 上海凯岸信息科技有限公司 | Block chain-based credit investigation data sharing and trading system |
CN107294709A (en) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, apparatus and system |
CN107425982A (en) * | 2017-07-07 | 2017-12-01 | 众安信息技术服务有限公司 | A kind of method and block chain for realizing intelligent contract data encryption |
CN107862215A (en) * | 2017-09-29 | 2018-03-30 | 阿里巴巴集团控股有限公司 | A kind of date storage method, data query method and device |
CN108090769A (en) * | 2017-12-19 | 2018-05-29 | 苗放 | A kind of data safety method of commerce and system based on ownership |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110401631A (en) * | 2019-06-19 | 2019-11-01 | 深圳壹账通智能科技有限公司 | System upgrade information acquisition method, device, storage medium and block chain node |
CN111400328A (en) * | 2020-03-12 | 2020-07-10 | 北京阿尔山金融科技有限公司 | Data updating method and device and node server |
CN112115498A (en) * | 2020-09-28 | 2020-12-22 | 上海申铁信息工程有限公司 | Block chain-based data access authority control method and device |
CN112115498B (en) * | 2020-09-28 | 2023-12-01 | 上海申铁信息工程有限公司 | Data access authority control method and device based on blockchain |
CN114205093A (en) * | 2021-12-15 | 2022-03-18 | 深圳前海微众银行股份有限公司 | Block chain message transmission method, device, client and storage medium |
CN114205093B (en) * | 2021-12-15 | 2023-04-07 | 深圳前海微众银行股份有限公司 | Block chain message transmission method, device, client and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zamani et al. | On the security risks of the blockchain | |
TWI706368B (en) | Block chain-based service leasing method, device, system and electronic equipment | |
CN110766550B (en) | Asset query method and device based on block chain and electronic equipment | |
Asharaf et al. | Decentralized computing using blockchain technologies and smart contracts: Emerging research and opportunities: Emerging research and opportunities | |
CN109711174A (en) | Data capture method, device, equipment and storage medium | |
Labazova | Towards a framework for evaluation of blockchain implementations | |
CN104050416B (en) | The safety drafting of display surface | |
JP2023062065A (en) | Using contactless card to securely share personal data stored in blockchain | |
CN106941487A (en) | A kind of data transmission method for uplink and device | |
CN109978688A (en) | The access control method and its contract generator and server of distributed common recognition system | |
CN107480540B (en) | Data access control system and method | |
CN111433797A (en) | Block chain equipment control system and method based on composite key | |
Gomzin | Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions | |
De Andrés et al. | Challenges of the market for initial coin offerings | |
US11516175B2 (en) | Methods, systems, apparatuses, and devices for facilitating managing digital content | |
KR20210047311A (en) | Verify that the transaction address is whitelisted prior to allowing the transfer of the self-regulatory token to the transaction address, which requires a whitelisted transaction address to withdraw the self-regulatory token. | |
CN109150513A (en) | Private key storage method, computer equipment and storage medium based on block chain | |
US20220255969A1 (en) | Reconciliation digital facilitators in a distributed network | |
CN112308236A (en) | Method, device, electronic equipment and storage medium for processing user request | |
Pouwelse et al. | Laws for creating trust in the blockchain age | |
CN109690516A (en) | A kind of software-based switch for providing a user product and/or servicing without damaging its privacy | |
WO2022240883A1 (en) | Smart contract-based project development using milestone based distribution | |
Datta et al. | Sanskriti—a distributed e-commerce site implementation using blockchain | |
CN107844949A (en) | Generation method, device, portable terminal device and the server of consumptive loan electronic contract | |
JP2022102062A (en) | Method, apparatus and system for data privacy management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190503 |
|
RJ01 | Rejection of invention patent application after publication |