CN109711174A - Data capture method, device, equipment and storage medium - Google Patents

Data capture method, device, equipment and storage medium Download PDF

Info

Publication number
CN109711174A
CN109711174A CN201811452521.5A CN201811452521A CN109711174A CN 109711174 A CN109711174 A CN 109711174A CN 201811452521 A CN201811452521 A CN 201811452521A CN 109711174 A CN109711174 A CN 109711174A
Authority
CN
China
Prior art keywords
block chain
chain node
data
node
numerical value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811452521.5A
Other languages
Chinese (zh)
Inventor
金玲玲
饶东升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lingtu Huishi Technology Co Ltd
Original Assignee
Shenzhen Lingtu Huishi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lingtu Huishi Technology Co Ltd filed Critical Shenzhen Lingtu Huishi Technology Co Ltd
Priority to CN201811452521.5A priority Critical patent/CN109711174A/en
Publication of CN109711174A publication Critical patent/CN109711174A/en
Pending legal-status Critical Current

Links

Abstract

This application discloses data capture method, device, equipment and storage medium, this method is applied to the first block chain node, comprising: determination is stored in the encryption data that the needs of block chain are decrypted, and the encryption data is obtained by the second block chain node encrytion;By intelligent contract, the encryption data is sent to the second block chain node, so that the encryption data is decrypted in the second block chain node;Receive the data that the second block chain node decryption obtains.This method ensure that the privacy of data, effectively prevents the leakage of data.

Description

Data capture method, device, equipment and storage medium
Technical field
This application involves information technology fields, in particular to data capture method, device, equipment and storage medium.
Background technique
Block chain is the storage and computing technique of a kind of decentralization, by folding encrypted data chunk sequentially in time The lasting not revisable record for adding and generating, and will be included in each node for being stored in block chain network, so that with The mode collective of decentralization safeguards an authentic data library.The system data in certain time is contained in each data block, And data fingerprint is generated for verifying the validity of its information and linking next database block.Therefore, block chain is in data There is technical advantage in terms of anti-tamper, transparent and decentralization.
In general, block chain passes through clear-text way storing data, that is, the data of any node will be total in deposit block chain All nodes in block chain network are enjoyed, thus other nodes can unconditionally obtain data content.In this way, energy Data sharing and the transparency in block chain network is enough effectively ensured, but the value of data can not be embodied.
Summary of the invention
In view of problem above, the embodiment of the present invention provides data capture method, device, equipment and storage medium, with solution Certainly existing data capture method unconditionally limits the problem of leading to valuable leaking data when obtaining data.
The data capture method of embodiment according to the invention is applied to the first block chain node, comprising: determination is stored in The encryption data that the needs of block chain are decrypted, the encryption data are obtained by the second block chain node encrytion;Pass through intelligence The encryption data is sent to the second block chain node, so that the second block chain node is to the encryption by contract Data are decrypted;Receive the data that the second block chain node decryption obtains.
The data acquisition facility of embodiment according to the invention is applied to the first block chain node, comprising: determining module, For determining the encryption data for being stored in the needs of block chain and decrypting, the encryption data is obtained by the second block chain node encrytion It arrives;First processing module, for by intelligent contract, the encryption data to be sent to the second block chain node, with The second block chain node is decrypted to the encryption data;Receiving module, for receiving the second block chain link The data that point decryption obtains.
The calculating equipment of embodiment according to the invention, including processor;And memory, it is stored thereon with executable finger It enables;Wherein, the processor is configured to execute the executable instruction to implement method above-mentioned.
The computer readable storage medium of embodiment according to the invention is stored thereon with computer program, the calculating Machine program includes executable instruction, when the executable instruction is executed by processor, implements method above-mentioned.
It can be seen from the above that sharing to the data in block chain network in the scheme of the embodiment of the present invention Be uploaded the block chain node encrytion of data, when other block chain nodes will obtain the data of decryption, need to by intelligent contract by The block chain link point of encryption data is decrypted, to ensure that the privacy of data, effectively prevents the leakage of data.
Detailed description of the invention
Fig. 1 is data capture method one embodiment flow chart in the embodiment of the present application;
Fig. 2 is another embodiment flow chart of data capture method in the embodiment of the present application;
Fig. 3 is the architecture diagram of data-acquisition system in the embodiment of the present application;
Fig. 4 is data acquisition facility one embodiment schematic diagram in the embodiment of the present application;
Fig. 5 is one embodiment structural schematic diagram that equipment is calculated in the embodiment of the present application.
Specific embodiment
Theme described herein is discussed referring now to example embodiment.It should be understood that discussing these embodiments only It is in order to enable those skilled in the art can better understand that being not to claim to realize theme described herein Protection scope, applicability or the exemplary limitation illustrated in book.It can be in the protection scope for not departing from present disclosure In the case of, the function and arrangement of the element discussed are changed.Each example can according to need, omit, substitute or Add various processes or component.For example, described method can be executed according to described order in a different order, with And each step can be added, omits or combine.In addition, feature described in relatively some examples is in other examples It can be combined.
As used in this article, term " includes " and its modification indicate open term, are meant that " including but not limited to ". Term "based" indicates " being based at least partially on ".Term " one embodiment " and " embodiment " expression " at least one implementation Example ".Term " another embodiment " expression " at least one other embodiment ".Term " first ", " second " etc. may refer to not Same or identical object.Here may include other definition, either specific or implicit.Unless bright in context It really indicates, otherwise the definition of a term is consistent throughout the specification.
In order to keep the technical solution of the application clearer, below in conjunction with concrete scene to provided by the embodiments of the present application Data capture method is introduced.
Fig. 1 is data capture method flow chart provided by the embodiments of the present application, and this method 100 is applied to the first block chain link Point, method 100 the following steps are included:
S102: determination is stored in the encryption data that the needs of block chain are decrypted.
Wherein, the encryption data is obtained by the second block chain node encrytion, specifically, the second block chain node exists Before data is stored in block chain, first clear data is encrypted to obtain encryption data, is then broadcasted encryption data, So that each block chain node is stored in block chain after being verified to encryption data common recognition, by the encryption data.
In the embodiment of the present application, the second block chain node can encrypt clear data using symmetric encipherment algorithm To obtain encryption data.
In the embodiment of the present application, be stored in block chain encryption data can have related abstract information, identification information or Keyword message etc., the first block chain node can determine the encryption data for needing to decrypt by above- mentioned information.
S104: by intelligent contract, the encryption data is sent to the second block chain node, so that described second The encryption data is decrypted in block chain node.
For block chain technical field, it is generally known that, intelligent contract is substantially the code of execution of being triggered, usually It is preset in block chain.And the intelligent contract stored in block chain is difficult to be tampered, thus intelligent contract just can be used for executing it is pre- If code logic, implementation procedure is not by block chain node intervention.In this specification embodiment, in multiple and different steps Different code logics is executed using intelligent contract, wherein different code logics can be executed by different intelligent contracts, It can also be executed by same intelligent contract, this specification is without limitation.In short, the effect of intelligent contract is to guarantee block Chain node executes preset code logic, prevents block chain node from doing evil.
In the embodiment of the present application, the mapping relations of the node identification of the second block chain node and encryption data can be advised Encryption data can be sent to by intelligent contract by the second block chain node due to intelligent contract, so that the second block chain link The encryption data is decrypted in point.
S106: the data that the second block chain node decryption obtains are received.
In this way, which the first block chain node has just got its required clear data.
In one embodiment, as shown in Fig. 2, method 100 is further comprising the steps of:
S103: by intelligent contract, judge whether the first block chain node has the power for decrypting the encryption data Limit;If so, S104 is thened follow the steps, if it is not, executing step S108.
In the embodiment of the present application, judge whether the first block chain node has the power for decrypting the encryption data Limit, can determine whether the first block chain node has decryption by the mapping relations between node identification and decrypted rights The permission of the ciphertext data, the mapping relations can provide among intelligent contract previously according to needs.For example, inspection mechanism Article to be detected is usually sent to detection service mechanism B1 and is detected by A1, and inspection mechanism A2 usually by article to be detected send to Detection service mechanism B2 is detected, then the service of inspection mechanism A1 and detection service mechanism B1 can be provided in intelligent contract The decrypted rights of detection data of the device with decryption detection service mechanism B1, and the clothes of inspection mechanism A2 and detection service mechanism B2 Business device does not have the decrypted rights of the detection data of decryption detection service device mechanism B1 then, and vice versa.
S108: refuse to send the encryption data to the second block chain node.
In another embodiment, on the basis of data capture method shown in fig. 1 or fig. 2, method 100 is also wrapped It includes: by intelligent contract, corresponding first numerical value of data decrypted and obtained is determined, by intelligent contract, by described first The node identification of block chain node and first numerical value are broadcasted so that each block chain node to the node identification and After the first numerical value common recognition is verified, the node identification and first numerical value are stored in block chain.
In the embodiment of the present application, first numerical value is reduced from the account of the first block chain node for characterizing Numerical value.That is, first numerical value can be considered as the expense that the first block chain node is paid because obtaining the data. Corresponding first numerical value of data is also required to determine by intelligent contract.The expense of first block chain node expenditure can be from its account Remaining sum in deduct, expense deduction can be recorded in block chain in the form of block.As it can be seen that not only being stored altogether on block chain The data enjoyed, also record of the publicity because obtaining data expenditure.
In yet another embodiment, on the basis of data capture method shown in fig. 1 or fig. 2, method 100 is also wrapped It includes: by intelligent contract, the corresponding second value of data decrypted and obtained is determined, by intelligent contract, by described second The node identification and the second value of block chain node are broadcasted so that each block chain node to the node identification and After the second value common recognition is verified, the node identification and the second value are stored in block chain.
In the embodiment of the present application, the second value increases for characterizing into the account of the second block chain node Numerical value.That is, the second value can be considered as the second block chain link when the first block chain node obtains the data The taken in expense of point.The corresponding second value of data is also required to determine by intelligent contract.Income expense can be with block Form is recorded in block chain.As it can be seen that going back the record taken in when publicity data are acquired on block chain.
By disclosed above it is found that first, forming block chain network by block chain node, block chain node is in shared data Preceding first to encrypt to data, other block chain nodes, need to be by the block chain node to data encryption when obtaining clear data Encryption data is decrypted, in this way, avoid the leaking data for being shared in block chain.Second, in optional embodiment In, other block chain nodes are wanted to obtain data, need to verify the permission of itself by intelligent contract, have the section with permission only Point can just check data.Third, in alternate embodiments, other block chain nodes obtain data and need to pay certain expense With, and/or, the block chain node of shared data can take in certain expense when data are acquired, in this way, block link network Block chain link point in network forms a mechanism of exchange, embodies the value of data.
Fig. 3 is the architecture diagram of data-acquisition system provided by the embodiments of the present application.As shown in figure 3, system 300 includes service Device 302, server 304 and server 306, server 302 and server 304 are the first block chain node, and server 306 is the Two block chain nodes, the first block chain node and the second block chain node form block chain network, and each server is safeguarded jointly Block chain, the first block chain node can obtain data from block chain, and the second block chain node can be to block chain storing data.It answers The understanding, the data of the block chain node in Fig. 3 are only schematical, according to actual needs, can have any amount Block chain node, it is of course possible to there is any number of first block chain node and the second block chain node.In addition, the firstth area The role of block chain node and the second block chain node is interchangeable.
Based on data capture method shown in FIG. 1, the embodiment of the present application also correspondence provides a kind of data acquisition facility, under Face will be introduced data acquisition facility provided by the embodiments of the present application from the angle of function modoularization.
Fig. 4 is one embodiment schematic diagram of data acquisition facility in the embodiment of the present application, which can use soft The mode of part, hardware or software and hardware combining is realized.Since the embodiment of device 400 is substantially similar to the embodiment of method, institute To describe fairly simple, the relevent part can refer to the partial explaination of embodiments of method.Fig. 4 is referred to, device 400 includes true Cover half block 402, first processing module 404 and receiving module 406.Determining module 402 is stored in the needs of block chain for determining The encryption data of decryption, the encryption data are obtained by the second block chain node encrytion.First processing module 404 is for leading to Intelligent contract is crossed, the encryption data is sent to the second block chain node, so that the second block chain node is to institute Encryption data is stated to be decrypted.Receiving module 406 is for receiving the data that the second block chain node decryption obtains.
In one aspect, device 400 further includes judging treatmenting module, for passing through intelligent contract, by the encryption number Before the step of being sent to the second block chain node, judge whether the first block chain node has decryption is described to add The permission of ciphertext data, if so, the encryption data is sent to by the second block chain node by intelligent contract, if it is not, Refuse to send the encryption data to the second block chain node.
On the other hand, device 400 further includes Second processing module, for determining described decrypt by intelligent contract Corresponding first numerical value of the data arrived, first numerical value are used to characterize to reduce from the account of the first block chain node Numerical value;By intelligent contract, the node identification of the first block chain node and first numerical value are broadcasted, so that respectively Block chain node is after being verified the node identification and first numerical value common recognition, by the node identification and described the One numerical value is stored in block chain.
In yet another aspect, device 400 further includes third processing module, for determining the decryption by intelligent contract The corresponding second value of obtained data, the second value increase for characterizing into the account of the second block chain node Numerical value;By intelligent contract, the node identification of the second block chain node and the second value are broadcasted, so that Each block chain node is after being verified the node identification and second value common recognition, by the node identification and described Second value is stored in block chain.
Above embodiments are that device provided by the embodiments of the present application is introduced from the angle of function modoularization, below will Device provided by the embodiments of the present application is illustrated from the angle of hardware entities.
In the embodiment of the present application, a kind of calculating equipment is also provided, which may include processor and be used for Store the memory of the executable instruction of the processor.Wherein, the processor is configured to via the execution executable finger It enables come the step of executing the data capture method in any one above-mentioned embodiment.
Person of ordinary skill in the field it is understood that various aspects of the disclosure can be implemented as system, method or Program product.Therefore, various aspects of the disclosure can be with specific implementation is as follows, it may be assumed that complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here Referred to as circuit, " module " or " system ".
Calculating equipment according to an embodiment of the present application is described referring to Fig. 5.For ease of description, illustrate only with The relevant part of the embodiment of the present application, it is disclosed by specific technical details, please refer to the embodiment of the present application method part.
It is showed in the form of universal computing device as shown in figure 5, calculating equipment 500.Calculating equipment 500 may include processing Device 502 and memory 504, wherein be stored with executable instruction on memory 504, wherein the executable instruction, which is worked as, to be performed When make processor 502 execute the data capture method in any one above-mentioned embodiment.
As shown in figure 5, calculating equipment 500 can also include connecting different system components (including processor 502 and memory 504) bus 506.Bus 506 indicates one of a few class bus structures or a variety of, including memory bus or memory Controller, peripheral bus, graphics acceleration port, processor or the local using any bus structures in a variety of bus structures Bus.For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel system knot Structure (MAC) bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) Bus.
It calculates equipment 500 and typically comprises a variety of computer system readable media.These media can be it is any can be by Calculate the usable medium that equipment 500 accesses, including volatile and non-volatile media, moveable and immovable medium.
Memory 504 may include the computer system readable media of form of volatile memory, such as arbitrary access is deposited Reservoir (RAM) 508 and and/or cache memory 510.Calculate equipment 500 may further include it is other it is removable/can not Mobile, volatile/non-volatile computer system storage medium.Only as an example, storage system 512 can be used for reading and writing not Movably, non-volatile magnetic media (Fig. 5 do not show, commonly referred to as " hard disk drive ").It, can be with although being not shown in Fig. 5 The disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") is provided, and non-volatile to moving The CD drive of CD (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driving Device can be connected by one or more data media interfaces with bus 506.Memory 504 may include at least one program Product, the program product have one group of (for example, at least one) program module, these program modules are configured to perform above-mentioned Data capture method in one embodiment of anticipating.
Program/utility 514 with one group of (at least one) program module 516, can store in such as memory In 504, such program module 516 includes but is not limited to operating system, one or more application program, other program modules And program data, it may include the realization of network environment in each of these examples or certain combination.Program module 516 Usually execute the data capture method in any one above-mentioned embodiment.
Calculating equipment 500 can also be with one or more external equipments 522 (such as keyboard, sensing equipment, display 524 Deng) communication, can also be enabled a user to one or more equipment interact with the calculating equipment 500 communicate, and/or with make Any equipment (such as network interface card, the modem that the calculating equipment 500 can be communicated with one or more of the other calculating equipment Etc.) communication.This communication can be carried out by input/output (I/O) interface 518.Also, calculating equipment 500 can also lead to Cross network adapter 520 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, example Such as internet) communication.As shown, network adapter 520 is communicated by bus 506 with the other modules for calculating equipment 500.It answers When understanding, although not shown in the drawings, other hardware and/or software module can be used in conjunction with equipment 500 is calculated, including but unlimited In: microcode, device driver, redundant processor, external disk drive array, RAID system, tape drive and data Backup storage system etc..
The program that processor 502 is stored in memory 504 by operation, thereby executing various function application and data Processing, such as realize the data capture method in any one above-mentioned embodiment.
A kind of computer readable storage medium is also provided in the embodiment of the present application, is stored thereon with computer program, it is described Computer program includes executable instruction, when the executable instruction is executed by processor, implements any one above-mentioned embodiment In data capture method the step of.In some possible embodiments, various aspects of the disclosure is also implemented as one The form of kind program product comprising program code, when described program product is run on the terminal device, said program code For executing the terminal device described in the data capture method of this specification according to the various exemplary implementations of the disclosure The step of example.
Program product according to an embodiment of the present disclosure for realizing the above method can be using portable compact disc only It reads memory (CD-ROM) and including program code, and can be run on terminal device, such as PC.However, this public affairs The program product opened is without being limited thereto, and in this document, readable storage medium storing program for executing can be any tangible Jie for including or store program Matter, the program can be commanded execution system, device or device use or in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the disclosure operation program Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
The specific embodiment illustrated above in conjunction with attached drawing describes exemplary embodiment, it is not intended that may be implemented Or fall into all embodiments of the protection scope of claims." exemplary " meaning of the term used in entire this specification Taste " be used as example, example or illustration ", be not meant to than other embodiments " preferably " or " there is advantage ".For offer pair The purpose of the understanding of described technology, specific embodiment include detail.However, it is possible in these no details In the case of implement these technologies.In some instances, public in order to avoid the concept to described embodiment causes indigestion The construction and device known is shown in block diagram form.
The foregoing description of present disclosure is provided so that any those of ordinary skill in this field can be realized or make Use present disclosure.To those skilled in the art, the various modifications carried out to present disclosure are apparent , also, can also answer generic principles defined herein in the case where not departing from the protection scope of present disclosure For other modifications.Therefore, present disclosure is not limited to examples described herein and design, but disclosed herein with meeting Principle and novel features widest scope it is consistent.

Claims (10)

1. data capture method is applied to the first block chain node, comprising:
Determination is stored in the encryption data that the needs of block chain are decrypted, and the encryption data is obtained by the second block chain node encrytion It arrives;
By intelligent contract, the encryption data is sent to the second block chain node, so that the second block chain link The encryption data is decrypted in point;
Receive the data that the second block chain node decryption obtains.
2. it is described by intelligent contract according to the method described in claim 1, wherein, the encryption data is sent to described Before the step of second block chain node, the method also includes:
By intelligent contract, judge whether the first block chain node has the permission for decrypting the encryption data;
If so, the encryption data is sent to the second block chain node by intelligent contract;
If it is not, refusing to send the encryption data to the second block chain node.
3. method according to claim 1 or 2, wherein the method also includes:
By intelligent contract, determine corresponding first numerical value of data decrypted and obtained, first numerical value for characterize from The numerical value reduced in the account of the first block chain node;
By intelligent contract, the node identification of the first block chain node and first numerical value are broadcasted, so that respectively Block chain node is after being verified the node identification and first numerical value common recognition, by the node identification and described the One numerical value is stored in block chain.
4. method according to claim 1 or 2, wherein the method also includes:
By intelligent contract, determine the corresponding second value of data decrypted and obtained, the second value for characterize to Increased numerical value in the account of the second block chain node;
By intelligent contract, the node identification of the second block chain node and the second value are broadcasted, so that respectively Block chain node is after being verified the node identification and second value common recognition, by the node identification and described the Two numerical value are stored in block chain.
5. data acquisition facility is applied to the first block chain node, comprising:
Determining module, for determining the encryption data for being stored in the needs of block chain and decrypting, the encryption data is by the secondth area Block chain node encrytion obtains;
First processing module, for by intelligent contract, the encryption data to be sent to the second block chain node, so that The encryption data is decrypted in the second block chain node;
Receiving module, the data obtained for receiving the second block chain node decryption.
6. device according to claim 5, wherein described device further include:
Judging treatmenting module, for by intelligent contract, the encryption data to be sent to the second block chain node Before step, judge whether the first block chain node has the permission for decrypting the encryption data, if so, passing through intelligence The encryption data is sent to the second block chain node by contract, if it is not, refusing to send to the second block chain node The encryption data.
7. device according to claim 5 or 6, wherein described device further include:
Second processing module, for by intelligent contract, determining corresponding first numerical value of data decrypted and obtained, described the One numerical value is for characterizing the numerical value reduced from the account of the first block chain node;By intelligent contract, by described first The node identification of block chain node and first numerical value are broadcasted so that each block chain node to the node identification and After the first numerical value common recognition is verified, the node identification and first numerical value are stored in block chain.
8. device according to claim 5 or 6, wherein described device further include:
Third processing module, for by intelligent contract, determining the corresponding second value of data decrypted and obtained, described the Two numerical value are for characterizing the increased numerical value into the account of the second block chain node;By intelligent contract, by described second The node identification and the second value of block chain node are broadcasted so that each block chain node to the node identification and After the second value common recognition is verified, the node identification and the second value are stored in block chain.
9. calculating equipment, comprising:
Processor;And
Memory is stored thereon with executable instruction;
Wherein, the processor is configured to execute the executable instruction to implement side as described in any one of claims 1-3 Method.
10. computer readable storage medium is stored thereon with computer program, the computer program includes executable instruction, When the executable instruction is executed by processor, implement the method according to claim 1.
CN201811452521.5A 2018-11-30 2018-11-30 Data capture method, device, equipment and storage medium Pending CN109711174A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811452521.5A CN109711174A (en) 2018-11-30 2018-11-30 Data capture method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811452521.5A CN109711174A (en) 2018-11-30 2018-11-30 Data capture method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109711174A true CN109711174A (en) 2019-05-03

Family

ID=66255404

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811452521.5A Pending CN109711174A (en) 2018-11-30 2018-11-30 Data capture method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109711174A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110401631A (en) * 2019-06-19 2019-11-01 深圳壹账通智能科技有限公司 System upgrade information acquisition method, device, storage medium and block chain node
CN111400328A (en) * 2020-03-12 2020-07-10 北京阿尔山金融科技有限公司 Data updating method and device and node server
CN112115498A (en) * 2020-09-28 2020-12-22 上海申铁信息工程有限公司 Block chain-based data access authority control method and device
CN114205093A (en) * 2021-12-15 2022-03-18 深圳前海微众银行股份有限公司 Block chain message transmission method, device, client and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106651346A (en) * 2016-11-28 2017-05-10 上海凯岸信息科技有限公司 Block chain-based credit investigation data sharing and trading system
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
CN107425982A (en) * 2017-07-07 2017-12-01 众安信息技术服务有限公司 A kind of method and block chain for realizing intelligent contract data encryption
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device
CN108090769A (en) * 2017-12-19 2018-05-29 苗放 A kind of data safety method of commerce and system based on ownership

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106651346A (en) * 2016-11-28 2017-05-10 上海凯岸信息科技有限公司 Block chain-based credit investigation data sharing and trading system
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
CN107425982A (en) * 2017-07-07 2017-12-01 众安信息技术服务有限公司 A kind of method and block chain for realizing intelligent contract data encryption
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device
CN108090769A (en) * 2017-12-19 2018-05-29 苗放 A kind of data safety method of commerce and system based on ownership

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110401631A (en) * 2019-06-19 2019-11-01 深圳壹账通智能科技有限公司 System upgrade information acquisition method, device, storage medium and block chain node
CN111400328A (en) * 2020-03-12 2020-07-10 北京阿尔山金融科技有限公司 Data updating method and device and node server
CN112115498A (en) * 2020-09-28 2020-12-22 上海申铁信息工程有限公司 Block chain-based data access authority control method and device
CN112115498B (en) * 2020-09-28 2023-12-01 上海申铁信息工程有限公司 Data access authority control method and device based on blockchain
CN114205093A (en) * 2021-12-15 2022-03-18 深圳前海微众银行股份有限公司 Block chain message transmission method, device, client and storage medium
CN114205093B (en) * 2021-12-15 2023-04-07 深圳前海微众银行股份有限公司 Block chain message transmission method, device, client and storage medium

Similar Documents

Publication Publication Date Title
Zamani et al. On the security risks of the blockchain
TWI706368B (en) Block chain-based service leasing method, device, system and electronic equipment
CN110766550B (en) Asset query method and device based on block chain and electronic equipment
Asharaf et al. Decentralized computing using blockchain technologies and smart contracts: Emerging research and opportunities: Emerging research and opportunities
CN109711174A (en) Data capture method, device, equipment and storage medium
Labazova Towards a framework for evaluation of blockchain implementations
CN104050416B (en) The safety drafting of display surface
JP2023062065A (en) Using contactless card to securely share personal data stored in blockchain
CN106941487A (en) A kind of data transmission method for uplink and device
CN109978688A (en) The access control method and its contract generator and server of distributed common recognition system
CN107480540B (en) Data access control system and method
CN111433797A (en) Block chain equipment control system and method based on composite key
Gomzin Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
De Andrés et al. Challenges of the market for initial coin offerings
US11516175B2 (en) Methods, systems, apparatuses, and devices for facilitating managing digital content
KR20210047311A (en) Verify that the transaction address is whitelisted prior to allowing the transfer of the self-regulatory token to the transaction address, which requires a whitelisted transaction address to withdraw the self-regulatory token.
CN109150513A (en) Private key storage method, computer equipment and storage medium based on block chain
US20220255969A1 (en) Reconciliation digital facilitators in a distributed network
CN112308236A (en) Method, device, electronic equipment and storage medium for processing user request
Pouwelse et al. Laws for creating trust in the blockchain age
CN109690516A (en) A kind of software-based switch for providing a user product and/or servicing without damaging its privacy
WO2022240883A1 (en) Smart contract-based project development using milestone based distribution
Datta et al. Sanskriti—a distributed e-commerce site implementation using blockchain
CN107844949A (en) Generation method, device, portable terminal device and the server of consumptive loan electronic contract
JP2022102062A (en) Method, apparatus and system for data privacy management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190503

RJ01 Rejection of invention patent application after publication