CN110046890A - A kind of block chain Rights Management System and method - Google Patents

A kind of block chain Rights Management System and method Download PDF

Info

Publication number
CN110046890A
CN110046890A CN201910262913.3A CN201910262913A CN110046890A CN 110046890 A CN110046890 A CN 110046890A CN 201910262913 A CN201910262913 A CN 201910262913A CN 110046890 A CN110046890 A CN 110046890A
Authority
CN
China
Prior art keywords
information
access
rights management
catenary system
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910262913.3A
Other languages
Chinese (zh)
Inventor
左然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Province Wo Sheng Electromechanical Technology Co Ltd
Original Assignee
Anhui Province Wo Sheng Electromechanical Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Province Wo Sheng Electromechanical Technology Co Ltd filed Critical Anhui Province Wo Sheng Electromechanical Technology Co Ltd
Priority to CN201910262913.3A priority Critical patent/CN110046890A/en
Publication of CN110046890A publication Critical patent/CN110046890A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of block chain Rights Management System and methods, two ports that the present invention is accessed using virtual backup cloud and permission, permission access is carried out for two different crowds respectively, for the data in virtual backup cloud, after confidential information is hidden, as long as carry out real-name authentication after can to the block catenary system can public information check, conducive to the public to the supervision of block catenary system and in it information study, popular style with information, for the data of permission access, it only obtains the approval at defined rights management and can access after getting the ciphertext about unique identity card, and it is also needed when accessing by being allowed for access after the corresponding fingerprint authentication of identity card and recognition of face verifying, information is efficiently protected and maintained secrecy, confidential information is prevented to be stolen by others, and it obtains at rights management Personnel of approval itself also belong to secrecy personnel, and sign confidentiality agreement, this just prevents criminal from impending to personnel.

Description

A kind of block chain Rights Management System and method
Technical field
The present invention relates to the management system related fields of block chain, specially a kind of block chain Rights Management System and side Method.
Background technique
Be to the definition of block chain on network: block chain is Distributed Storage, point-to-point transmission, common recognition mechanism, adds The new application mode of the computer technologies such as close algorithm.Block chain is a key concept of bit coin, it is substantially one The database of disintermediation, while the Floor layer Technology as bit coin are a string using the associated number generated of cryptography method According to block, the information of a bit coin network trading is contained in each data block, the validity for verifying its information is (anti- It is pseudo-) and the next block of generation.For narrow sense, block chain is a kind of side that data block is connected with sequence sequentially in time A kind of linked data structure that formula is combined into, and the distributed account that can not be distorted He can not forge guaranteed in a manner of cryptography This.Broadly, block chain technology is to verify to know together with storing data, using distributed node using block linked data structure Algorithm guarantees the safety of data transmission and access to generate, using by automation foot with more new data, in the way of cryptography The intelligent contract of this code composition programs the completely new distributed basis framework and calculation of one kind with operation data.
In the system of block chain, needs to access to block chain after authorizing, the safety of information is guaranteed with this and is looked into Inquiry property, in order to popularize public inquiry and supervision for block chain information, so, the part permission of block chain is open to public affairs It is many, it is only necessary to the information of block chain can be checked after carrying out real name verification, to obtain corresponding knowledge information.
Summary of the invention
The purpose of the present invention is to provide a kind of block chain Rights Management System and methods, to solve in above-mentioned background technique The problem of proposition.
To achieve the above object, the invention provides the following technical scheme: a kind of block chain Rights Management System, including block Catenary system, the block catenary system include distributed account book, asymmetric encryption and authoring system, common recognition mechanism and intelligent contract, The asymmetric encryption connects the top secret information of a storage account identity information, the block catenary system with authoring system Two virtual ports are developed, the respectively port in virtual backup cloud and permission access, the block catenary system passes through key A virtual backup cloud is connected, and the information of block catenary system itself is replicated in virtual backup cloud, it is described virtual standby By access cloud connected reference, the virtual backup cloud includes data encryption module and data disaply moudle, institute in part cloud The information for stating data disaply moudle is shown in query webpage, and the block catenary system connects a permission by exclusive webpage and visits It asks, can access to block catenary system after the verifying accessed by permission, include automatic cleaning modul in exclusive webpage, it is right Record after access is accessed automatically, and the permission access includes ciphertext, fingerprint authentication and the recognition of face verifying of identity card.
Preferably, the distributed account book includes the multiple accounting nodes for being distributed in different specified regions, each note Account node according to the block chained structured record of block catenary system and stores complete account.
Preferably, the asymmetric encryption and authoring system are for protecting account identity information, the only access of acquisition permission User the information can just be protected.
Preferably, the common recognition mechanism is a kind of recording rules specified for the accounting nodes of distributed account book, is had Independence.
Preferably, the intelligent contract is to be pre-defined based on some performed by the specified recording rules of accounting nodes Rule carry out automatic Verification a kind of mode.
Preferably, it is connected between the block catenary system and virtual backup cloud by data update module, the number Regularly permission access is carried out to block catenary system according to update module and is updated, and the information of update is passed through into the Internet transmission To data encryption module, top secret information is hidden after the analysis of data encryption module and Partial encryption, will exclude top-secret letter Information after breath is transmitted to data disaply moudle and shows in query webpage.
Preferably, the access cloud virtual goes out the port of user's login, password and real name verification, is stepped on by user The number in virtual backup cloud can be accessed after the authentication information of record and the login of password and real name verification by access cloud According to display module, the Copy Info about block catenary system in virtual backup cloud is checked by query webpage, and can not be right Information is distorted.
Preferably, the port that ciphertext, fingerprint authentication and the recognition of face of the permission access virtual identity card are verified, passes through The ciphertext that identity card is got at defined rights management, by the ciphertext of identity card and fingerprint authentication corresponding with identity and The exclusive webpage of information where the port that can be accessed by permission after the verifying of recognition of face verifying accesses block catenary system, should There is account identity information on exclusive webpage, belongs to highest permission.
A kind of method of block chain Rights Management System, including using step as follows: opening the port net of block catenary system Page is clicked the port in virtual backup cloud or permission access, is verified accordingly to it, if clicking virtual backup cloud Port, then need to be arranged user's login and corresponding password logs in, and the authentication information of real name verification is carried out after login The page for entering query webpage afterwards, by query webpage to block catenary system can public information access and check;If clicking power The port of access is limited, the ciphertext of identity card is got in input at defined rights management, then by opposite with the ciphertext of identity card After the verifying of the fingerprint authentication answered and recognition of face verifying, by exclusive webpage to the information and corresponding account of block catenary system Family identity information is checked.
Compared with prior art, the beneficial effects of the present invention are: what the present invention was accessed using virtual backup cloud and permission Two ports carry out permission access for two different crowds respectively, for the data in virtual backup cloud, by confidential information Hide after, as long as carry out real-name authentication after can to the block catenary system can public information check, be conducive to the public to area The supervision of block catenary system and the study of its interior information, the popular style with information are only obtained for the data of permission access Approval at defined rights management can simultaneously access after getting the ciphertext about unique identity card, and while accessing also needs It is allowed for access after being verified by the corresponding fingerprint authentication of identity card and recognition of face, information is efficiently protected and maintained secrecy, It prevents confidential information to be stolen by others, and obtains the personnel of approval itself at rights management and also belong to secrecy personnel, and sign Confidentiality agreement, this just prevents criminal from impending to personnel, is accessed and is looked into account identity information using exclusive webpage It after inquiry, carries the terminal devices such as the computer of webpage and the record is purged automatically, prevent other people from knowing by browsing record Corresponding clue.
Detailed description of the invention
Fig. 1 is integral frame structure schematic diagram of the invention;
Fig. 2 is the principle framework structural schematic diagram of block catenary system of the invention;
Fig. 3 is the principle framework structural schematic diagram in virtual backup cloud of the invention;
Fig. 4 is access cloud principle framework structural schematic diagram of the invention;
Fig. 5 is the principle framework structural schematic diagram that permission of the invention accesses;
Fig. 6 is the principle framework structural schematic diagram that the present invention accesses to account identity information.
In figure: 1, block catenary system;2, virtual backup cloud;3, cloud is accessed;4, permission accesses;5, data encryption mould Block;6, data disaply moudle;7, data update module;8, query webpage;9, user logs in;10, password;11, real name verification; 12, the ciphertext of identity card;13, fingerprint authentication;14, recognition of face is verified;15, at rights management;16, exclusive webpage;17, it is distributed Formula account book;18, asymmetric encryption and authoring system;19, common recognition mechanism;20, intelligent contract;21, account identity information.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1-6 is please referred to, the present invention provides a kind of technical solution: a kind of block chain Rights Management System, including block chain System 1, block catenary system 1 include distributed account book 17, asymmetric encryption and authoring system 18, common recognition mechanism 19 and intelligent contract 20, asymmetric encryption and authoring system 18 connect the top secret information for storing account identity information 21, block catenary system 1 Two virtual ports are developed, the respectively port in virtual backup cloud 2 and permission access 4, block catenary system 1 is connected by key A virtual backup cloud 2 is connect, and the information of block catenary system 1 itself is replicated in virtual backup cloud 2, virtual backup cloud By access 3 connected reference of cloud, virtual backup cloud 2 includes data encryption module 5 and data disaply moudle 6 at end 2, and data are aobvious Show that the information of module 6 is shown in query webpage 8, block catenary system 1 connects a permission access 4 by exclusive webpage 16, leads to It can access to block catenary system 1 after crossing the verifying of permission access 4, include automatic cleaning modul in exclusive webpage 16, it is right Record after access is accessed automatically, and permission access 4 includes ciphertext 12, fingerprint authentication 13 and the recognition of face verifying of identity card 14。
Further, distributed account book 17 includes the multiple accounting nodes for being distributed in different specified regions, each book keeping operation section Point according to the block chained structured record of block catenary system 1 and stores complete account.
Further, for protecting account identity information 21, only acquisition permission is visited for asymmetric encryption and authoring system 18 Ask that 4 user can just protect the information.
Further, common recognition mechanism 19 is a kind of recording rules specified for the accounting nodes of distributed account book 17, tool There is independence.
Further, intelligence and about 20 is to be pre-defined based on some performed by the specified recording rules of accounting nodes Rule carry out automatic Verification a kind of mode.
Further, it is connected between block catenary system 1 and virtual backup cloud 2 by data update module 7, data are more New module 7 carries out regularly permission access to block catenary system 1 and updates, and the information of update is passed through the Internet transmission extremely Data encryption module 5 hides top secret information after the analysis of data encryption module 5 and Partial encryption, will exclude top-secret letter Information after breath is transmitted to data disaply moudle 6 and shows in query webpage 8.
Further, access cloud 3 fictionalizes the port that a user logs in 9, password 10 and real name verification 11, passes through use After the authentication information of family login 9 and the login of password 10 and real name verification 11 virtual backup can be accessed by access cloud 3 Data disaply moudle 6 in cloud 2 checks the answering about block catenary system 1 in virtual backup cloud 2 by query webpage 8 Information processed, and information can not be distorted.
Further, permission accesses the end of the ciphertext 12 of 4 virtual identities card, fingerprint authentication 13 and recognition of face verifying 14 Mouthful, the ciphertext 12 for getting identity card by defined rights management 15, by the ciphertext 12 of identity card and corresponding with identity Fingerprint authentication 13 and recognition of face verifying 14 verifying after can pass through permission access 4 port access block catenary system 1 The exclusive webpage 16 of place information has account identity information 21 on the exclusive webpage 16, belongs to highest permission.
Working principle, including using step as follows: opening the port webpage of block catenary system 1, click virtual backup cloud 2 Or the port of permission access 4, it is verified accordingly, if clicking the port in virtual backup cloud 2, needs to be arranged one A user's login 9 and corresponding password 10 log in, and enter inquiry net after the authentication information of real name verification 11 is carried out after login The page of page 8, by query webpage 8 to block catenary system 1 can public information access and check;If clicking permission access 4 Port, inputs 15 ciphertext 12 for getting identity card at defined rights management, then by and identity card ciphertext 12 it is corresponding Fingerprint authentication 13 and recognition of face verifying 14 verifying after, by exclusive webpage 16 to the information of block catenary system 1 and right The account identity information 21 answered is checked.
The present invention using virtual backup cloud 2 and permission access 4 two ports, respectively for two different crowds into Row permission access, for the data in virtual backup cloud 2, after confidential information is hidden, as long as can be right after carrying out real-name authentication The block catenary system 1 can public information checked, conducive to the public to the supervision of block catenary system 1 and in it information It practises, the popular style with information, for the data of permission access 4, only obtains 15 approval and neck at defined rights management It also needs when can access, and access after taking the ciphertext 12 about unique identity card through the corresponding fingerprint authentication of identity card 13 and recognition of face verifying 14 after be allowed for access, information is efficiently protected and is maintained secrecy, prevents confidential information from being stolen by other people It takes, and 15 personnel of approval itself also belong to secrecy personnel at acquisition rights management, and sign confidentiality agreement, this is just prevented not Method molecule impends to personnel, is accessed after inquiry using exclusive webpage 16 to account identity information 21, carries webpage The terminal devices such as computer are automatically purged the record, prevent other people from knowing corresponding clue by browsing record.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (9)

1. a kind of block chain Rights Management System, including block catenary system (1), it is characterised in that: block catenary system (1) packet Distributed account book (17), asymmetric encryption and authoring system (18), common recognition mechanism (19) and intelligent contract (20) are included, it is described non-right Encryption and authoring system (18) is claimed to connect the top secret information of storage account identity information (21), the block catenary system (1) two virtual ports, the respectively port of virtual backup cloud (2) and permission access (4), the block catenary system are developed (1) a virtual backup cloud (2) is connected by key, and the information of block catenary system (1) itself is replicated in virtual backup In cloud (2), the virtual backup cloud (2) includes by access cloud (3) connected reference, the virtual backup cloud (2) The information of data encryption module (5) and data disaply moudle (6), the data disaply moudle (6) is shown in query webpage (8) On, the block catenary system (1) connects a permission access (4) by exclusive webpage (16), passes through the verifying of permission access (4) After can access to block catenary system (1), include automatic cleaning modul in exclusive webpage (16), to the record after access into The automatic access of row, interior exclusive webpage (16) includes automatic cleaning modul, is accessed automatically the record after access, the permission Access (4) includes ciphertext (12), fingerprint authentication (13) and the recognition of face verifying (14) of identity card.
2. a kind of block chain Rights Management System according to claim 1, it is characterised in that: the distribution account book (17) Multiple accounting nodes including being distributed in different specified regions, each accounting nodes are according to the block of block catenary system (1) Chained structured record and the complete account of storage.
3. a kind of block chain Rights Management System according to claim 1, it is characterised in that: the asymmetric encryption and award For protecting account identity information (21), the user of only acquisition permission access (4) can just carry out the information power system (18) Protection.
4. a kind of block chain Rights Management System according to claim 2, it is characterised in that: the common recognition mechanism (19) be For a kind of specified recording rules of the accounting nodes of distributed account book (17), there is independence.
5. a kind of block chain Rights Management System according to claim 4, it is characterised in that: it is described intelligence contract (20) be The one kind for the automatic Verification that some rules pre-defined carry out performed by the recording rules specified based on accounting nodes Mode.
6. a kind of block chain Rights Management System according to claim 1, it is characterised in that: the block catenary system (1) It is connected between virtual backup cloud (2) by data update module (7), the data update module (7) is to block linkwork Uniting, regularly permission is accessed and is updated for (1) progress, and the information of update is passed through the Internet transmission to data encryption module (5), top secret information is hidden after the analysis of data encryption module (5) and Partial encryption, by the letter after the top-secret information of exclusion Breath is transmitted to data disaply moudle (6) and shows in query webpage (8).
7. a kind of block chain Rights Management System according to claim 1, it is characterised in that: the access cloud (3) is empty The port that user logs in (9), password (10) and real name verification (11) is drawn up, user's login (9) and password (10) are passed through The number in access cloud (3) access virtual backup cloud (2) can be passed through after the authentication information of login and real name verification (11) According to display module (6), believed by the duplication about block catenary system (1) that query webpage (8) is checked in virtual backup cloud (2) Breath, and information can not be distorted.
8. a kind of block chain Rights Management System according to claim 1, it is characterised in that: the permission access (4) is empty The port of (14) is verified in ciphertext (12), fingerprint authentication (13) and the recognition of face of quasi- identity card, at defined rights management (15) ciphertext (12) for getting identity card, by identity card ciphertext (12) and fingerprint authentication corresponding with identity (13) and Information where port access block catenary system (1) of (4) can be accessed after the verifying of recognition of face verifying (14) by permission Exclusive webpage (16) has account identity information (21) on the exclusive webpage (16), belongs to highest permission.
9. the method for -8 any a kind of block chain Rights Management System according to claim 1, it is characterised in that: including such as It is lower to use step: to open the port webpage of block catenary system (1), click the end of virtual backup cloud (2) or permission access (4) Mouthful, it is verified accordingly, if clicking the port of virtual backup cloud (2), need to be arranged user log in (9) and Corresponding password (10) is logged in, and enters the page of query webpage (8) after login after the authentication information of progress real name verification (11) Face, by query webpage (8) to block catenary system (1) can public information access and check;If clicking the end of permission access (4) Mouthful, the ciphertext (12) that identity card is got at defined rights management (15) is inputted, then pass through ciphertext (12) phase with identity card After the verifying of corresponding fingerprint authentication (13) and recognition of face verifying (14), by exclusive webpage (16) to block catenary system (1) Information and corresponding account identity information (21) checked.
CN201910262913.3A 2019-04-02 2019-04-02 A kind of block chain Rights Management System and method Withdrawn CN110046890A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910262913.3A CN110046890A (en) 2019-04-02 2019-04-02 A kind of block chain Rights Management System and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910262913.3A CN110046890A (en) 2019-04-02 2019-04-02 A kind of block chain Rights Management System and method

Publications (1)

Publication Number Publication Date
CN110046890A true CN110046890A (en) 2019-07-23

Family

ID=67275967

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910262913.3A Withdrawn CN110046890A (en) 2019-04-02 2019-04-02 A kind of block chain Rights Management System and method

Country Status (1)

Country Link
CN (1) CN110046890A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110457931A (en) * 2019-08-19 2019-11-15 深圳利都科技有限公司 A kind of smart city information security application method and system based on block chain
CN110519297A (en) * 2019-09-17 2019-11-29 腾讯科技(深圳)有限公司 A kind of data processing method and equipment based on block chain private key
CN110580411A (en) * 2019-11-08 2019-12-17 支付宝(杭州)信息技术有限公司 permission query configuration method and device based on intelligent contract
CN111314369A (en) * 2020-02-27 2020-06-19 苏州市星际云通区块链科技有限公司 Resource sharing block chain network
CN111708657A (en) * 2020-06-04 2020-09-25 江苏荣泽信息科技股份有限公司 System backup and verification method based on block chain query
CN111885163A (en) * 2020-07-23 2020-11-03 北京好扑信息科技有限公司 Public inspection system based on block chain
CN111901335A (en) * 2020-07-27 2020-11-06 浙江永旗区块链科技有限公司 Block chain data transmission management method and system based on middle station
CN111967028A (en) * 2020-08-04 2020-11-20 中国科学院上海微系统与信息技术研究所 Data interaction system
CN112734429A (en) * 2021-01-19 2021-04-30 上海超链信息科技有限公司 Application system and method based on block chain DAPP
CN112905965A (en) * 2021-02-01 2021-06-04 胡文旭 Financial big data processing system based on block chain
CN113468588A (en) * 2021-09-06 2021-10-01 环球数科集团有限公司 Identity management system based on block chain

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110457931A (en) * 2019-08-19 2019-11-15 深圳利都科技有限公司 A kind of smart city information security application method and system based on block chain
CN110519297A (en) * 2019-09-17 2019-11-29 腾讯科技(深圳)有限公司 A kind of data processing method and equipment based on block chain private key
CN110580411A (en) * 2019-11-08 2019-12-17 支付宝(杭州)信息技术有限公司 permission query configuration method and device based on intelligent contract
CN111314369A (en) * 2020-02-27 2020-06-19 苏州市星际云通区块链科技有限公司 Resource sharing block chain network
CN111708657B (en) * 2020-06-04 2022-07-22 江苏荣泽信息科技股份有限公司 System backup and verification method based on block chain query
CN111708657A (en) * 2020-06-04 2020-09-25 江苏荣泽信息科技股份有限公司 System backup and verification method based on block chain query
CN111885163A (en) * 2020-07-23 2020-11-03 北京好扑信息科技有限公司 Public inspection system based on block chain
CN111901335A (en) * 2020-07-27 2020-11-06 浙江永旗区块链科技有限公司 Block chain data transmission management method and system based on middle station
CN111901335B (en) * 2020-07-27 2022-08-30 浙江永旗区块链科技有限公司 Block chain data transmission management method and system based on middle station
CN111967028B (en) * 2020-08-04 2021-05-25 中国科学院上海微系统与信息技术研究所 Data interaction system
CN111967028A (en) * 2020-08-04 2020-11-20 中国科学院上海微系统与信息技术研究所 Data interaction system
CN112734429A (en) * 2021-01-19 2021-04-30 上海超链信息科技有限公司 Application system and method based on block chain DAPP
CN112905965A (en) * 2021-02-01 2021-06-04 胡文旭 Financial big data processing system based on block chain
CN113468588A (en) * 2021-09-06 2021-10-01 环球数科集团有限公司 Identity management system based on block chain

Similar Documents

Publication Publication Date Title
CN110046890A (en) A kind of block chain Rights Management System and method
CN109690551A (en) Block chain data guard method, device, system and computer readable storage medium
Nagaraju et al. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway
CN104094573B (en) Dynamic pseudonymization method for user data profiling networks and user data profiling network implementing the method
CN103842984B (en) Parameter based key derivation
CN108306887A (en) Internet of Things safety based on block chain protects system with data-privacy
CN108389059A (en) Digital copyrighted work protection, transaction and distributing method based on ownership and system
CN114513533A (en) Classified and graded fitness and health big data sharing system and method
Spivey et al. Hadoop Security: Protecting your big data platform
Bai et al. Decentralized and self-sovereign identity in the era of blockchain: a survey
CN112487103B (en) Deep learning data set trusted sharing system based on blockchain intelligent contract
CN109962890A (en) A kind of the authentication service device and node access, user authen method of block chain
CN106850228A (en) A kind of foundation of portable intelligent password management system and operating method
CN108322468A (en) Identity authorization system
CN108831565A (en) Chinese medicine acupuncture information common recognition system based on block chain
CN111274569A (en) Research, development, operation and maintenance integrated system for unified login authentication and login authentication method thereof
Ramtohul et al. Information security governance for e-services in southern African developing countries e-Government projects
CN107070896A (en) A kind of safe and efficient block chain customization login method and security hardening system
Szymoniak Amelia—A new security protocol for protection against false links
CN109903046A (en) User data management and device based on block chain
CN110363025A (en) A kind of user data privacy management method, apparatus and electronic equipment
CN1409234A (en) Outward leakage preventing system for secrete information
Salini et al. Elicitation of security requirements for e-health system by applying Model Oriented Security Requirements Engineering (MOSRE) framework
CN101408955A (en) Method and system determining obligation base on tactic
Chen et al. BSPPF: Blockchain-based security and privacy preventing framework for Data Middle Platform in the era of IR 4.0

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190723