CN110266696A - A kind of evaluation data cochain method and its equipment applied to block chain - Google Patents

A kind of evaluation data cochain method and its equipment applied to block chain Download PDF

Info

Publication number
CN110266696A
CN110266696A CN201910547004.4A CN201910547004A CN110266696A CN 110266696 A CN110266696 A CN 110266696A CN 201910547004 A CN201910547004 A CN 201910547004A CN 110266696 A CN110266696 A CN 110266696A
Authority
CN
China
Prior art keywords
client
evaluation data
evaluation
public key
cochain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910547004.4A
Other languages
Chinese (zh)
Inventor
杨慧
吉建勋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ai Morui Strategic Technology Co Ltd
Original Assignee
Beijing Ai Morui Strategic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ai Morui Strategic Technology Co Ltd filed Critical Beijing Ai Morui Strategic Technology Co Ltd
Priority to CN201910547004.4A priority Critical patent/CN110266696A/en
Publication of CN110266696A publication Critical patent/CN110266696A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0623Item investigation
    • G06Q30/0625Directed, with specific intent or strategy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of evaluation data cochain method and its equipment applied to block chain, block chain node receives the evaluation data cochain request that the first client is sent;Triggering verifies intelligent contract, the intelligent contract of the verification verifies the identity of first client, after verification passes through, the evaluation data are encrypted with first client public key, and execute the cochain process of the evaluation data of the first client public key encryption;The block chain node receives the inquiry request of the evaluation data of the second client, and the inquiry request of the evaluation data includes the second client public key;Triggering verifies intelligent contract, the intelligent contract of the verification verifies the identity of second client, after verification passes through, the evaluation data are encrypted with second client public key, and execute the cochain process of the evaluation data of the second client public key encryption.The application can will evaluate data cochain, disclose credible.

Description

A kind of evaluation data cochain method and its equipment applied to block chain
Technical field
This application involves block chain technical field more particularly to a kind of evaluation data cochain method applied to block chain and Its equipment.
Background technique
Currently, block chain technology is the peer-to-peer network based on decentralization, with open source software Cryptography Principles, when ordinal number It is combined according to common recognition mechanism, to ensure the coherent of each node in distributed data base and continue, so that information is verified immediately, can Retrospect, but be difficult to tamper with and can not shield, to create a set of privacy, shareable value system efficiently, safe.
Existing evaluation platform is all the database using centralization, saves the evaluation number of commodity, and evaluation time is used The contents such as the mobile phone that the evaluation at family uses;However, the database of evaluation platform, there is data to be tampered, the authenticity of data The problems such as operation platform that cannot be guaranteed, and evaluate modifies the evaluation number of certain commodity, deletes situations such as user's difference is commented.Especially To some small evaluation platforms, the Information Security and authenticity of commodity all be cannot be guaranteed: and commodity or service Evaluation content it is untrue, can mislead to user, influence the experience of user.
Therefore, how can not distort based on block chain, the data of evaluation platform are stored in block chain by believable mode On, become urgent problem to be solved.
Above content is only used for the technical solution that auxiliary understands the application, does not represent and recognizes that above content is existing skill Art.
Summary of the invention
To solve the above-mentioned problems, the application provides a kind of evaluation data cochain method applied to block chain and its sets Standby, this method can allow the data cochain of evaluation, so that the evaluation data on chain are credible, it is open and clear.
The application first aspect provides a kind of evaluation data cochain method applied to block chain, which comprises
Block chain node receives the evaluation data cochain request that the first client is sent, the evaluation data cochain request packet Include first client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, verifies By rear, the evaluation data are encrypted with first client public key, and execute first client public key and add The cochain process of close evaluation data;
The block chain node receives the inquiry request of the evaluation data of the second client, and the evaluation data are looked into Asking request includes the second client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client, verifies By rear, the evaluation data are encrypted with second client public key, and execute second client public key and add The cochain process of close evaluation data.
In a kind of possible embodiment, the method also includes: the block chain node receives second client End sends evaluation data inquiry request;
The block chain node sends evaluation data query and responds to second client, and the evaluation data query is rung It should include the evaluation data of the second client public key encryption, in order to which the second client own private key is to second visitor The evaluation data of family end public key encryption are decrypted.
In a kind of possible embodiment, the evaluation data are that the corresponding user of first client is flat in evaluation The operation data of platform, including evaluation number, evaluation time, evaluation content and evaluation type.
In a kind of possible embodiment, the first client own public key is to the evaluation data encryption, tool Body are as follows: first client carries out the encryption of preset ratio with own public key to the evaluation data.
In a kind of possible embodiment, the evaluation data include relating attribute and dereferenced attribute;Wherein, described The attribute value of evaluation data relating attribute is superimposed automatically.
The application second aspect provides a kind of evaluation data cochain equipment applied to block chain, and the equipment is block chain Node, the equipment include receiving unit and processing unit;Wherein,
The receiving unit, receives the evaluation data cochain request that the first client is sent, and the evaluation data cochain is asked It asks including first client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client It is verified, after verification passes through, the evaluation data is encrypted with first client public key, and execute described first The cochain process of the evaluation data of client public key encryption;
The receiving unit, receives the inquiry request of the evaluation data of the second client, and the evaluation data are looked into Asking request includes the second client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of second client It is verified, after verification passes through, the evaluation data is encrypted with second client public key, and execute described second The cochain process of the evaluation data of client public key encryption.
In a kind of possible embodiment, the equipment includes transmission unit;The receiving unit receives described second Client sends evaluation data inquiry request;
The transmission unit sends evaluation data query and responds to second client, and the evaluation data query is rung It should include the evaluation data of the second client public key encryption, in order to which the second client own private key is to second visitor The evaluation data of family end public key encryption are decrypted.
In a kind of possible embodiment, the evaluation data are that the corresponding user of first client is flat in evaluation The operation data of platform, including evaluation number, evaluation time, evaluation content and evaluation type.
In a kind of possible embodiment, the first client own public key is to the evaluation data encryption, tool Body are as follows: first client carries out the encryption of preset ratio with own public key to the evaluation data.
In a kind of possible embodiment, the evaluation data include relating attribute and dereferenced attribute;Wherein, commentary Valence mumber is superimposed automatically according to the attribute value of relating attribute.
The application can allow the data cochain of evaluation, so that the evaluation data on chain are credible, it is open and clear.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 is a kind of evaluation data cochain method flow schematic diagram applied to block chain provided by the embodiments of the present application;
Fig. 2 is that another evaluation data cochain method flow for being applied to block chain provided by the embodiments of the present application is illustrated Figure;
Fig. 3 is a kind of evaluation data cochain device structure schematic diagram applied to block chain provided by the embodiments of the present application.
Specific embodiment
For the clearer general idea for illustrating the application, carry out in an illustrative manner with reference to the accompanying drawings of the specification detailed It describes in detail bright.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Similar object, without being used to describe a particular order or precedence order.It should be understood that the sequence used in this way is in appropriate feelings It can be interchanged under condition, so that the embodiment of the present invention described herein can be other than those of illustrating or describing herein Sequence implement.
In addition, term " includes " and " having " and their any deformation, it is intended that covering non-exclusive includes example Such as, the process, method, system, product or equipment for containing a series of steps or units those of are not necessarily limited to be clearly listed Step or unit, but may include being not clearly listed or intrinsic for these process, methods, product or equipment other Step or unit.
So-called block chain node and client in the embodiment of the present application, it can be understood as respond extraneous certain trigger item Part, and the abstract machine that state is converted is done by certain rule, it can be mobile phone, tablet computer, palm PC, individual's PC computer etc. It can be according to application software and the equipment that can be networked.
As shown in Figure 1, a kind of evaluation data cochain method applied to block chain, the method includes the steps S101- S104。
S101, block chain node receive the evaluation data cochain request that the first client is sent, the evaluation data cochain Request includes first client public key.
S102, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of first client, After verification passes through, the evaluation data are encrypted with first client public key, and it is public to execute first client The cochain process of the evaluation data of key encryption.
S103, the block chain node receive the inquiry request of the evaluation data of the second client, the review number According to inquiry request include the second client public key.
S104, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of second client, After verification passes through, the evaluation data are encrypted with second client public key, and it is public to execute second client The cochain process of the evaluation data of key encryption.
In one example, the method also includes: the block chain node receives second client and sends evaluation Data inquiry request;
The block chain node sends evaluation data query and responds to second client, and the evaluation data query is rung It should include the evaluation data of the second client public key encryption, in order to which the second client own private key is to second visitor The evaluation data of family end public key encryption are decrypted.
In one example, the evaluation data are operand of the corresponding user of first client in evaluation platform According to, including evaluation number, evaluation time, evaluation content and evaluation type.
In one example, the first client own public key is to the evaluation data encryption, specifically: described One client carries out the encryption of preset ratio with own public key to the evaluation data.
In one example, the evaluation data include relating attribute and dereferenced attribute;Wherein, the evaluation data are closed Attribute attribute value is superimposed automatically.
In above-mentioned example, operator of first client as evaluation data, the second client is looked into as evaluation data Inquiry person;For some specific evaluation platform, every user either evaluation data operator, be also possible to evaluate data Inquiry.
Below by taking Fig. 2 as an example, the cochain method flow for the evaluation data of the application being applied on block chain is said Bright, this method includes S201-S209.
S201, the first client send evaluation data cochain and request to give block chain node, in evaluation data cochain request Including the first client public key.
S202, triggers the verification intelligence contract on block chain, the verification intelligence contract to the identity of first client into Row verification, and the evaluation data are encrypted with first client public key, and commenting first client public key encryption Valence mumber is according to execution cochain process.
Block chain node encrypts evaluation data with the first client public key, which can be that will to evaluate data complete Portion's field is encrypted, and is also possible to encrypt the part field of the evaluation data, such as: only to the comment content of privacy It is encrypted;It is also possible to not encrypt the evaluation data.
In addition, the evaluation data include being divided into two attribute, relating attribute and dereferenced attribute.Such as: when user's evaluation Between, belong to dereferenced attribute, the evaluation time of every user may be stored on block chain;Such as: the quantity of user's evaluation, It is exactly relating attribute, includes evaluation quantity in the data format of a commodity, as long as there is user to evaluate the commodity, the quotient The evaluation number of product can be superimposed automatically.
The verification refer to judge first client whether be the evaluation platform user, the only user of the evaluation platform It can just have permission and the evaluation data are subjected to cochain.
It should be noted that upper chain process is the conventional process of this field, without being described in detail.Such as: in workload It proves to be packaged data under PoW common recognition mode, verify, the block chain node for getting book keeping operation power can be by the packing block It is placed on next block of current block, as new block cochain.
Evaluation type includes commodity evaluation, personal preference evaluation, clothes dress appraisal etc.;Such as: individual is to season Hobby evaluation, likes evaluation to the collocation of clothes, likes evaluation to the style of clothes, the moulding hobby evaluation etc. to hair.
S203, the block chain node send evaluation data cochain and respond to first client.
S204, the second client send the evaluation data inquiry request and give block chain node, the evaluation data inquiry request Including second client public key.
At this point, the corresponding user of the second client can be after seeing the evaluation data, which is looked into It askes.The first client and the second client are all the terminal devices for being equipped with decentralization application software in the application, all may be used It is interacted with directly clicking through row information with the block chain link on block chain.
S205, triggers the verification intelligence contract on block chain, which carries out the identity of the second client Verification encrypts the evaluation data with second client public key, and second client public key is added after verification passes through Close evaluation data execute cochain process.
After verification passes through, process is performed the next step;Verification does not pass through, Flow ends.
S206, block chain node hair evaluation data query respond to the second client.
S207, the second client send evaluation data inquiry request and give block chain node.
S208, the block chain node send evaluation data query and respond to second client, which rings It should include the evaluation data of the second client public key encryption.
S209, the second client are decrypted with the evaluation data that own private key encrypts second client public key, are obtained To the evaluation data.
The application can allow the data cochain of evaluation, and the cochain process is open and clear, any user of same evaluation platform It can check the evaluation data;It ensure that the authenticity of evaluation data.
It should be noted that client is directly to carry out the interaction of information, block chain with the node of block chain in the application Information is stored directly on block chain by node, not the server of centralization, so that it is credible to allow evaluation data more to disclose;And It is not that the server of existing client and centralization interacts.
As shown in figure 3, a kind of evaluation data cochain equipment applied to block chain, the equipment is block chain node, institute Stating equipment includes receiving unit and processing unit.
The receiving unit, receives the evaluation data cochain request that the first client is sent, and the evaluation data cochain is asked It asks including first client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client It is verified, after verification passes through, the evaluation data is encrypted with first client public key, and execute described first The cochain process of the evaluation data of client public key encryption;
The receiving unit, receives the inquiry request of the evaluation data of the second client, and the evaluation data are looked into Asking request includes the second client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of second client It is verified, after verification passes through, the evaluation data is encrypted with second client public key, and execute described second The cochain process of the evaluation data of client public key encryption.
In one example, the equipment includes transmission unit;The receiving unit receives second client and sends Evaluate data inquiry request;
The transmission unit sends evaluation data query and responds to second client, and the evaluation data query is rung It should include the evaluation data of the second client public key encryption, in order to which the second client own private key is to second visitor The evaluation data of family end public key encryption are decrypted.
In one example, the evaluation data are operand of the corresponding user of first client in evaluation platform According to, including evaluation number, evaluation time, evaluation content and evaluation type.
In one example, the first client own public key is to the evaluation data encryption, specifically: described One client carries out the encryption of preset ratio with own public key to the evaluation data.
In one example, the evaluation data include relating attribute and dereferenced attribute;Wherein, the evaluation data are closed Attribute attribute value is superimposed automatically.
The application can allow the data cochain of evaluation, and the cochain process is open and clear, any user of same evaluation platform It can check the evaluation data;It ensure that the authenticity of evaluation data.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description. These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution. Professional technician can use different methods to achieve the described function each specific application, but this realization It is not considered that exceeding scope of the present application.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (10)

1. a kind of evaluation data cochain method applied to block chain, which is characterized in that the described method includes:
Block chain node receives the evaluation data cochain request that the first client is sent, and the evaluation data cochain request includes institute State the first client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and verification passes through Afterwards, the evaluation data are encrypted with first client public key, and executes the first client public key encryption Evaluate the cochain process of data;
The block chain node receives the inquiry request of the evaluation data of the second client, and the inquiry of the evaluation data is asked It asks including the second client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client, and verification passes through Afterwards, the evaluation data are encrypted with second client public key, and executes the second client public key encryption Evaluate the cochain process of data.
2. the method according to claim 1, wherein the method also includes:
The block chain node receives second client and sends evaluation data inquiry request;
The block chain node sends evaluation data query and responds to second client, the evaluation data query response bag The evaluation data of the second client public key encryption are included, in order to which the second client own private key is to second client The evaluation data of public key encryption are decrypted.
3. the method according to claim 1, wherein the evaluation data are the corresponding use of first client Family evaluation platform operation data, including evaluation number, evaluation time, evaluation content and evaluation type.
4. the method according to claim 1, wherein the first client own public key is to the review number According to encryption, specifically:
First client carries out the encryption of preset ratio with own public key to the evaluation data.
5. the method according to claim 1, wherein the evaluation data include relating attribute and dereferenced category Property;Wherein,
The attribute value of the evaluation data relating attribute is superimposed automatically.
6. a kind of evaluation data cochain equipment applied to block chain, which is characterized in that the equipment is block chain node, described Equipment includes receiving unit and processing unit;Wherein,
The receiving unit receives the evaluation data cochain request that the first client is sent, the evaluation data cochain request packet Include first client public key;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of first client Verification encrypts the evaluation data with first client public key, and execute first client after verification passes through Hold the cochain process of the evaluation data of public key encryption;
The receiving unit, receives the inquiry request of the evaluation data of the second client, and the inquiry of the evaluation data is asked It asks including the second client public key;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of second client Verification encrypts the evaluation data with second client public key, and execute second client after verification passes through Hold the cochain process of the evaluation data of public key encryption.
7. equipment according to claim 6, which is characterized in that the equipment includes transmission unit;
The receiving unit receives second client and sends evaluation data inquiry request;
The transmission unit sends evaluation data query and responds to second client, the evaluation data query response bag The evaluation data of the second client public key encryption are included, in order to which the second client own private key is to second client The evaluation data of public key encryption are decrypted.
8. equipment according to claim 6, which is characterized in that the evaluation data are the corresponding use of first client Family evaluation platform operation data, including evaluation number, evaluation time, evaluation content and evaluation type.
9. equipment according to claim 6, which is characterized in that the first client own public key is to the review number According to encryption, specifically:
First client carries out the encryption of preset ratio with own public key to the evaluation data.
10. equipment according to claim 6, which is characterized in that the evaluation data include relating attribute and dereferenced category Property;Wherein,
The attribute value of the evaluation data relating attribute is superimposed automatically.
CN201910547004.4A 2019-06-24 2019-06-24 A kind of evaluation data cochain method and its equipment applied to block chain Pending CN110266696A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910547004.4A CN110266696A (en) 2019-06-24 2019-06-24 A kind of evaluation data cochain method and its equipment applied to block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910547004.4A CN110266696A (en) 2019-06-24 2019-06-24 A kind of evaluation data cochain method and its equipment applied to block chain

Publications (1)

Publication Number Publication Date
CN110266696A true CN110266696A (en) 2019-09-20

Family

ID=67920735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910547004.4A Pending CN110266696A (en) 2019-06-24 2019-06-24 A kind of evaluation data cochain method and its equipment applied to block chain

Country Status (1)

Country Link
CN (1) CN110266696A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110597841A (en) * 2019-09-29 2019-12-20 腾讯科技(深圳)有限公司 Application comment information processing method and device based on block chain network
CN111488343A (en) * 2020-04-08 2020-08-04 北京瑞策科技有限公司 E-commerce data uplink method and device based on business data block chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110597841A (en) * 2019-09-29 2019-12-20 腾讯科技(深圳)有限公司 Application comment information processing method and device based on block chain network
CN110597841B (en) * 2019-09-29 2021-09-14 腾讯科技(深圳)有限公司 Application comment information processing method and device based on block chain network
CN111488343A (en) * 2020-04-08 2020-08-04 北京瑞策科技有限公司 E-commerce data uplink method and device based on business data block chain

Similar Documents

Publication Publication Date Title
US20180218168A1 (en) Establishing a link between identifiers without disclosing specific identifying information
CN106789227B (en) A kind of internet behavior analysis method and internet behavior analytical equipment
US9577988B2 (en) Data encryption, transport, and storage service for carrier-grade networks
CN110232286A (en) A kind of electric quotient data cochain method and its equipment for applying intelligent contract
CN110247918A (en) Number cochain method and its equipment are shaken applied to block chain
CN110247923A (en) Number cochain method and its equipment are shaken based on block chain
CN110266696A (en) A kind of evaluation data cochain method and its equipment applied to block chain
CN112804354A (en) Method and device for data transmission across chains, computer equipment and storage medium
CN110247921A (en) A kind of polled data cochain method and its equipment for applying intelligent contract
CN114598671A (en) Session message processing method, device, storage medium and electronic equipment
CN110264206A (en) A kind of electric quotient data cochain method and its equipment based on block chain
CN110278270A (en) A kind of polled data cochain method and its equipment based on block chain
EP3381166A1 (en) Systems and methods for cross-channel device binding
CN110263529A (en) Number cochain method and its equipment are shaken using intelligent contract
CN110263100A (en) Using the shared economic data cochain method and its equipment of intelligent contract
CN110263563A (en) By means of the ad click data cochain method and its equipment of block chain
CN110232287A (en) Pass through the shared economic data cochain method and its equipment of block chain
CN110225056A (en) A kind of evaluation data cochain method and its equipment for applying intelligent contract
CN110263562A (en) A kind of evaluation data cochain method and its equipment based on block chain
CN110233853A (en) It is a kind of to thumb up data cochain method and its equipment applied to block chain
CN110264205A (en) A kind of electric quotient data cochain method and its equipment applied to block chain
CN110245512A (en) Lottery data cochain method and its equipment applied to block chain
CN110213294A (en) By means of the community data cochain method and its equipment of block chain
CN110266699A (en) Prize drawing data cochain method and its equipment applied to block chain
CN110266695A (en) Using the lottery data cochain method and its equipment of intelligent contract

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information

Address after: No.108, 1 / F, No.9, shangdijiu street, Haidian District, Beijing 100085

Applicant after: Beijing ruice Technology Co.,Ltd.

Address before: No.108, 1 / F, No.9, shangdijiu street, Haidian District, Beijing 100085

Applicant before: BEIJING AIMORECE TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination