CN110990883A - Data access method, data access device, computer-readable storage medium and computer equipment - Google Patents

Data access method, data access device, computer-readable storage medium and computer equipment Download PDF

Info

Publication number
CN110990883A
CN110990883A CN201911155751.XA CN201911155751A CN110990883A CN 110990883 A CN110990883 A CN 110990883A CN 201911155751 A CN201911155751 A CN 201911155751A CN 110990883 A CN110990883 A CN 110990883A
Authority
CN
China
Prior art keywords
data
enterprise
enterprise data
access request
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911155751.XA
Other languages
Chinese (zh)
Inventor
何晟
陈桓
张良杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingdee Software China Co Ltd
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Priority to CN201911155751.XA priority Critical patent/CN110990883A/en
Publication of CN110990883A publication Critical patent/CN110990883A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The application relates to a data access method, a data access device, a computer readable storage medium and a computer device, wherein the method comprises the following steps: receiving data access requests sent by each terminal; determining a storage mode of enterprise data corresponding to the data access request through an intelligent contract; when the storage mode is data uplink storage, acquiring enterprise data from a block node on a block chain and managed by a data provider according to a data access request; when the storage mode is data address uplink storage, searching an access address corresponding to the data access request at the block node, and acquiring enterprise data from an enterprise database according to the access address; and sending the acquired enterprise data to the terminal. The scheme provided by the application can ensure the authenticity of the enterprise data.

Description

Data access method, data access device, computer-readable storage medium and computer equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data access method, an apparatus, a computer-readable storage medium, and a computer device.
Background
When the enterprise stores the data, the enterprise uploads the enterprise data to be stored to a data center of a core enterprise or a third-party service provider which cooperates with the enterprise according to a protocol, and then the core enterprise or the third-party service provider integrates the uploaded enterprise data. When other authorized enterprises need the enterprise data, the corresponding enterprise data is obtained from the data center of the core enterprise or the third-party service provider. However, uploading a large amount of enterprise data to a data center of a core enterprise or a third-party service provider makes the data center vulnerable to attack, which causes data to be tampered, so that other authorized enterprises have a problem of inaccurate data when acquiring the enterprise data.
Disclosure of Invention
Based on this, it is necessary to provide a data access method, an apparatus, a computer-readable storage medium, and a computer device for solving the technical problem that data acquired by an authorized enterprise is inaccurate due to an attack on a data center.
A method of data access, comprising:
receiving data access requests sent by each terminal;
determining a storage mode of enterprise data corresponding to the data access request through an intelligent contract;
when the storage mode is data uplink storage, acquiring enterprise data from a block node on a block chain and managed by a data provider according to a data access request;
when the storage mode is data address uplink storage, searching an access address corresponding to the data access request, and acquiring enterprise data from an enterprise database according to the access address;
and sending the acquired enterprise data to the terminal.
In one embodiment, before receiving the data access request sent by the terminal, the method further includes:
receiving enterprise data sent by a data provider;
and storing the enterprise data to the corresponding block node in the block chain.
In one embodiment, before receiving the data access request sent by the terminal, the method further includes:
the method comprises the steps of receiving enterprise data sent by a data provider, encrypting the enterprise data by adopting a key of the data provider, and storing the encrypted enterprise data to corresponding block nodes in a block chain; alternatively, the first and second electrodes may be,
and receiving enterprise data which is sent by a data provider and encrypted by adopting a key, and storing the received enterprise data to a corresponding block node in the block chain.
In one embodiment, before receiving the data access request sent by the terminal, the method further includes:
receiving an access address about enterprise data sent by a data provider;
the access address is stored to a corresponding block node in the block chain.
In one embodiment, after obtaining the corresponding enterprise data according to the access address, the method further includes:
storing the acquired enterprise data to corresponding block nodes in a block chain; alternatively, the first and second electrodes may be,
and encrypting the acquired enterprise data by adopting a key of a data provider, and storing the encrypted enterprise data to a corresponding block node in the block chain.
In one embodiment, further comprising:
extracting a user signature from the data access request;
and when the signature of the user is the signature of the authorized user, taking the time of receiving the data access request as the access time, saving the access time in the block chain historical account book, and executing the step of determining the storage mode of the enterprise data corresponding to the data access request through the intelligent contract.
In one embodiment, when the enterprise data is stored in the corresponding blockchain node or the enterprise database, the corresponding processing procedure information for the enterprise data is saved in a blockchain historical account book; the method further comprises the following steps:
when an inspection request is received, acquiring corresponding processing process information from the block chain historical account book;
and checking the enterprise data according to the processing process information.
In one embodiment, further comprising:
configuring a data format, a storage mode, a verification mode, an integration mode and an extraction mode of enterprise data;
constructing an intelligent contract according to the data format, the storage mode, the verification mode, the integration mode and the extraction mode;
intelligent contracts are deployed in blockchains.
In one embodiment, further comprising:
when enterprise data are acquired based on a data access request, performing hash operation on the acquired enterprise data to obtain a first hash value;
acquiring a second hash value from the block node according to the data access request;
judging whether the first hash value and the second hash value are the same or not, and obtaining a judgment result;
and sending the judgment result to the terminal.
A data access apparatus, the apparatus comprising:
the receiving module is used for receiving a data access request sent by a terminal;
the determining module is used for determining the storage mode of the enterprise data corresponding to the data access request through the intelligent contract;
the acquisition module is used for acquiring enterprise data from a block node on a block chain and managed by a data provider according to a data access request when the storage mode is data uplink storage;
the searching module is used for searching an access address corresponding to the data access request at the block node when the storage mode is uplink storage of the data address, and acquiring enterprise data from an enterprise database according to the access address;
and the sending module is used for sending the acquired enterprise data to the terminal.
In one embodiment, the apparatus further comprises: a storage module; wherein:
the receiving module is further used for receiving the enterprise data sent by the data provider before receiving the data access request sent by the terminal;
and the storage module is used for storing the enterprise data to the corresponding block node in the block chain.
In one embodiment, the receiving module is further configured to receive enterprise data sent by a data provider before receiving the data access request sent by the terminal;
the storage module is also used for encrypting the enterprise data by adopting a key of a data provider and storing the encrypted enterprise data to a corresponding block node in the block chain; alternatively, the first and second electrodes may be,
the receiving module is also used for receiving the enterprise data which is sent by the data provider and encrypted by adopting the key;
the storage module is further configured to store the received enterprise data to a corresponding block node in the block chain.
In one embodiment, the receiving module is further configured to receive an access address about the enterprise data sent by the data provider before receiving the data access request sent by the terminal;
and the storage module is also used for storing the access address to a corresponding block node in the block chain.
In one embodiment, the storage module is further configured to, after acquiring the corresponding enterprise data according to the access address, store the acquired enterprise data to the corresponding block node in the block chain; or encrypting the acquired enterprise data by adopting a key of the data provider, and storing the encrypted enterprise data to the corresponding block node in the block chain.
In one embodiment, the obtaining module is further configured to extract a user signature from the data access request;
and the storage module is also used for taking the time of receiving the data access request as the access time when the user signature is the signature of the authorized user, storing the access time in the block chain historical account book and executing the step of determining the storage mode of the enterprise data corresponding to the data access request through the intelligent contract.
In one embodiment, when the enterprise data is stored in the corresponding blockchain node or the enterprise database, the corresponding processing procedure information for the enterprise data is saved in a blockchain historical account book; the device still includes: an inspection module;
the checking module is used for acquiring corresponding processing process information from the block chain historical account book when a checking request is received; and checking the enterprise data according to the processing process information.
In one embodiment, the apparatus further comprises: a deployment module; wherein:
the deployment module is used for configuring the data format, the storage mode, the verification mode, the integration mode and the extraction mode of the enterprise data; constructing an intelligent contract according to the data format, the storage mode, the verification mode, the integration mode and the extraction mode; intelligent contracts are deployed in blockchains.
In one embodiment, the apparatus further comprises: a judgment module; wherein:
the judgment module is used for carrying out Hash operation on the acquired enterprise data to obtain a first Hash value when the enterprise data are acquired based on the data access request; acquiring a second hash value from the block node according to the data access request; judging whether the first hash value and the second hash value are the same or not, and obtaining a judgment result;
and the sending module is also used for sending the judgment result to the terminal.
A computer-readable storage medium, in which a computer program is stored which, when executed by a processor, causes the processor to carry out the steps of a data access method.
A computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of the data access method.
According to the data access method, the data access device, the computer-readable storage medium and the computer equipment, the enterprise data are stored on the block nodes corresponding to the block chains managed by the data access device, the enterprise data can be managed by the data provider, and the security of the enterprise data is ensured because the data on the block chains have non-tamper property, so that the authenticity of the enterprise data can be ensured when the enterprise data are acquired from the corresponding block nodes of the block chains. The access address of the enterprise data is stored in the corresponding block node of the block chain, the enterprise data is stored in the enterprise database, and the access address of the block chain cannot be tampered, so that the enterprise data can be effectively obtained from the enterprise database through the access address, the enterprise data is stored in the enterprise database, the enterprise can control the enterprise data, the enterprise data can be guaranteed not to be tampered, and the authenticity of the enterprise data is guaranteed.
Drawings
FIG. 1 is a diagram of an application environment of a data access method in one embodiment;
FIG. 2 is a schematic flow chart diagram illustrating a method for data access in one embodiment;
FIG. 3 is a schematic diagram of data upload and access in one embodiment;
FIG. 4 is a schematic flow chart diagram of a data access method in another embodiment;
FIG. 5 is a schematic diagram of data upload and access in another embodiment;
FIG. 6 is a block diagram showing the structure of a data access device according to an embodiment;
FIG. 7 is a block diagram showing the construction of a data access device according to another embodiment;
FIG. 8 is a block diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
FIG. 1 is a diagram of an application environment of a data access method in one embodiment. Referring to fig. 1, the data access method is applied to a data access system. The data access system includes a first terminal 110, a first block node 120, a second block node 130, and a second terminal 140. The first terminal 110, the first block node 120, the first block node 130, and the second terminal 140 are connected via a network.
The first terminal 110 is a terminal of a data access party, and may specifically be a desktop terminal or a mobile terminal, and the mobile terminal may specifically be at least one of a mobile phone, a tablet computer, a notebook computer, and the like.
When accessing enterprise data, first block node 120 may serve as a management node in a block chain, and may also serve as a block node of a data access party, which may be controlled by the data access party when serving as the block node of the data access party. When storing enterprise data, the first blocking node 120 may serve as a management node in a blocking chain and may also serve as a blocking node for a data provider, which may be controlled by the data provider when serving as the blocking node for the data provider. The first block node 120 may be implemented as a stand-alone server or a server cluster composed of a plurality of servers. If not specifically stated, in the following embodiments, the first block node 120 is taken as a management node for explanation.
The second blocknode 130 may act as a blocknode for the data provider when accessing and storing enterprise data. Wherein the data provider can control the tile node. The second block node 130 may also be implemented as a stand-alone server or a server cluster composed of a plurality of servers.
The first terminal 140 is a terminal of a data provider, and may specifically be a desktop terminal or a mobile terminal, and the mobile terminal may specifically be at least one of a mobile phone, a tablet computer, a notebook computer, and the like.
As shown in FIG. 2, in one embodiment, a method of data access is provided. This embodiment is mainly illustrated by applying the method to the first block node 120 (hereinafter referred to as a server) in fig. 1, where the server is a management node in a block chain. Referring to fig. 2, the data access method specifically includes the following steps:
s202, receives a data access request transmitted by each terminal.
Wherein, the terminal is the terminal of the data access party.
In one embodiment, when a terminal accesses enterprise data of a data provider, the terminal acquires an enterprise data identifier, generates a data access request according to the enterprise data identifier, and sends the data access request to a server.
For example, if a user of an enterprise a wants to access enterprise data of an enterprise B serving as a data provider, the terminal may obtain an enterprise data identifier according to an operation triggered by the user of the enterprise a, generate a data access request carrying the enterprise data identifier, and send the data access request to the server, so that the server obtains the enterprise data of the enterprise B from a corresponding block node according to the data access request.
In one embodiment, before S202, the server sends enterprise data of the data provider to the corresponding blocknode of the blockchain for storage. Specifically, the server receives enterprise data sent by a data provider, and stores the enterprise data to a corresponding block node in the block chain.
In one embodiment, when receiving enterprise data sent by a data provider, the server also receives a user signature sent by the data provider, verifies the user signature, and stores the enterprise data to a corresponding tile node in the tile chain when a verification result indicates that the user signature is a signature of an authorized user.
As shown in fig. 3, a user of an enterprise a uploads enterprise data and a user signature to a server through an enterprise information system a of the user, the server first verifies the user signature, and when the user signature passes the verification, the server stores the enterprise data into a block node a in a block chain.
In one embodiment, when enterprise data is received, the server invokes a trusted timestamp service interface; acquiring trusted time from a time service center according to the trusted timestamp service interface; and saving the credible time in a block chain historical account book.
In one embodiment, the data provider may send the user signature first, and when the server verifies the user signature as that of an authorized user, the data provider then sends the enterprise data.
In one embodiment, before the server stores the enterprise data, the enterprise data may be encrypted and then stored. Specifically, the server receives enterprise data sent by a data provider, encrypts the enterprise data by using a key of the data provider, and stores the encrypted enterprise data to a corresponding block node in a block chain.
In another embodiment, the server receives enterprise data which is sent by a data provider and encrypted by using a key, and stores the received enterprise data to a corresponding block node in the block chain.
As shown in fig. 3, a user of an enterprise a uploads enterprise data and a user signature to an enterprise information system a, which may be a software system installed in a server, the server first verifies the user signature, and when the user signature passes the verification, the server encrypts the enterprise data using a key of the enterprise a, and stores the encrypted enterprise data in a corresponding block node a in a block chain. Or the user of the enterprise A uploads the user signature and the enterprise data encrypted by the secret key of the enterprise A to the server through the enterprise information system A, the server firstly verifies the user signature, and when the user signature passes the verification, the enterprise data encrypted by the server is stored in the corresponding block node A in the block chain.
In one embodiment, the data provider may store the access address of the enterprise data in uplink in addition to the enterprise data in uplink. Specifically, the server receives an access address about enterprise data sent by a data provider, and stores the access address to a corresponding block node in a block chain. The access address is an address of the enterprise database and is used for acquiring corresponding enterprise data from the enterprise database.
In one embodiment, upon receiving enterprise data or an access address for the enterprise data, the server invokes a trusted timestamp service interface; acquiring trusted time from a time service center according to the trusted timestamp service interface; and saving the credible time in a block chain historical account book. The block chain historical account book is an account book maintained in the block chain and can be used for storing access time.
For example, the server executes a trusted timestamp service scheduler, calls a trusted timestamp service interface through the trusted timestamp service scheduler, then obtains a trusted timestamp (which may be accurate to seconds or accurate to milliseconds) of the time service center from the timestamp server, and then writes the trusted timestamp into the blockchain historical book.
In one embodiment, the data provider determines a storage mode according to the intelligent contract, and when the storage mode is uplink storage of the access address, the access address of the enterprise database is obtained, and the access address is sent to the server.
And S204, determining the storage mode of the enterprise data corresponding to the data access request through the intelligent contract.
The intelligent contract can be a special information-based protocol, and is a program which can automatically and strictly verify and execute preset conditions based on a block chain technology, so that trusted interaction is realized without a third party. Enterprise data may be all information and material related to enterprise operations, including but not limited to: enterprise profiles, product information, business data, research results, and the like. In addition, the enterprise data may also include enterprise service data, such as data generated by the core enterprise or a third-party service provider handling enterprise registration, accounting and tax return, various licenses, remittance and settlement, industrial and commercial change, tax annual review, enterprise logout, trademark patent and other services for the enterprise, and then the data is stored in the block node.
In one embodiment, the server configures data format, storage mode, verification mode, integration mode and extraction mode of enterprise data; constructing an intelligent contract according to the data format, the storage mode, the verification mode, the integration mode and the extraction mode; intelligent contracts are deployed in blockchains.
The data format may be any one of an XML (Extensible Markup Language) format, a JSON (JavaScript Object Notation) format, a TXT format, an Excel format, a Word format, and a PDF format. The storage method may be to store the enterprise data in the blockchain (i.e., enterprise data uplink storage), or may be to store the access address of the enterprise data in the blockchain (i.e., data address uplink storage). The verification method may be signature verification of the user signature, specifically, the server decrypts the user signature by using a public key, and then compares the decrypted user identifier with the original user identifier, if the user identifier is consistent with the original user identifier, the verification is passed, otherwise, the verification is not passed. The integration manner may be to integrate the enterprise data by category. The extraction mode corresponds to the storage mode,
in one embodiment, when the server receives the enterprise data sent by the data provider, the enterprise data is integrated according to the category, and then the integrated enterprise data is stored to the block node corresponding to the block chain.
In one embodiment, prior to S204, the server extracts the user signature from the data access request; and when the signature of the user is the signature of the authorized user, taking the time of receiving the data access request as the access time, saving the access time in the block chain historical account book, and executing the step of determining the storage mode of the enterprise data corresponding to the data access request through the intelligent contract.
For example, the server decrypts the user signature by using a public key, compares the decrypted user identifier with an original user identifier, if the user identifier is consistent with the original user identifier, the verification is passed, and then the time for receiving the data access request is taken as access time to be stored in the block chain historical account book; otherwise, the verification is not passed. The original user id may be sent to the server together with the user signature, or may be stored in the server in advance.
And S206, when the storage mode is data uplink storage, acquiring enterprise data from the block nodes on the block chain and managed by the data provider according to the data access request.
In one embodiment, when the storage mode is data uplink storage, the server extracts the enterprise data identifier from the data access request, and performs hash operation on the enterprise data identifier to obtain a corresponding index hash. The server obtains enterprise data from the blocknodes on the blockchain and managed by the data provider according to the index hash.
In one embodiment, when the enterprise data is stored at a blocknode of the blockchain, the server also stores the second hash value of the enterprise data at the blocknode along with the enterprise data. The second hash value may be obtained by the data provider performing a hash operation on the enterprise data by using a hash function, or may be obtained by the server performing a hash operation on the enterprise data by using a hash function when receiving the enterprise data.
In one embodiment, when enterprise data is acquired based on a data access request, a server performs a hash operation on the acquired enterprise data to obtain a first hash value; acquiring a second hash value from the block node according to the data access request; judging whether the first hash value and the second hash value are the same or not, and obtaining a judgment result; and sending the judgment result to the terminal.
And when the first hash value and the second hash value are judged to be the same, determining that the obtained enterprise data is not tampered and is real and effective data. And when the first hash value and the second hash value are judged to be different, determining that the obtained enterprise data is tampered and may not be real and valid data.
And S208, when the storage mode is data address uplink storage, searching an access address corresponding to the data access request, and acquiring enterprise data from the enterprise database according to the access address.
In one embodiment, when the storage mode is uplink storage of the data address, the server extracts the enterprise address identifier from the data access request, and performs hash operation on the enterprise address identifier to obtain a corresponding index hash. And the server acquires an access address from the corresponding block node of the block chain according to the index hash, and acquires enterprise data from the enterprise database according to the access address.
In one embodiment, after S208, the enterprise data acquired by the server is stored to the corresponding tile node in the tile chain; or encrypting the acquired enterprise data by adopting a key of the data provider, and storing the encrypted enterprise data to the corresponding block node in the block chain.
In an embodiment, the server may further record an access time in the blockchain history book, where the access time may be a time when a data access request is received, a time when an access address is obtained, a time when enterprise data is obtained, or a time when the enterprise data is stored in a blockchain node.
As an example, as shown in fig. 3, a user of enterprise a uploads enterprise data to enterprise information system a, which may be a software system installed in a server, together with a user signature, the server first verifies the user signature, and when the verification is passed, the server saves the access address of the enterprise data to a block node a in the block chain. When the user of the enterprise B sends a data acquisition request to the server through the enterprise information system B, the server extracts a user signature from the data acquisition request, verifies the user signature, and when the verification is passed, acquires an access address of the enterprise data from the block node a, and then acquires the corresponding enterprise data from the enterprise database according to the access address, and then S210 is performed. In addition, the acquired enterprise data may also be stored in block node a. In addition, the acquired enterprise data may be encrypted, and the encrypted enterprise data may be stored in the block node a.
In one embodiment, when the server receives an audit or inspection request of enterprise data, the server obtains access time from the block chain historical account book and obtains the enterprise data from the corresponding block node so as to audit or inspect the enterprise data.
In one embodiment, when enterprise data is acquired based on a data access request, a server performs a hash operation on the acquired enterprise data to obtain a first hash value; acquiring a second hash value from the block node according to the data access request; judging whether the first hash value and the second hash value are the same or not, and obtaining a judgment result; and sending the judgment result to the terminal.
And S210, sending the acquired enterprise data to a terminal.
In one embodiment, when enterprise data is stored in a corresponding blockchain node or an enterprise database, processing procedure information corresponding to the enterprise data is stored in a blockchain historical account book; the method further comprises the following steps: when an inspection request is received, acquiring corresponding processing process information from a block chain historical account book; and checking the enterprise data according to the processing process information.
Wherein, the processing procedure information includes but is not limited to: and storing, accessing and processing the enterprise data, wherein the processing operation information can be operation information such as addition, deletion and modification. For example, when an individual user or business accesses the business data of the data provider, the corresponding access information is saved in the blockchain history book. The checking of the enterprise data may be: enterprise data is reviewed or traced, for example, the enterprise data is reviewed for authenticity, correctness, compliance, legitimacy, and profitability.
In one embodiment, after the data provider stores the enterprise data at the corresponding blockchain node, if a data inspector needs to inspect the enterprise data, the server sends an inspection request for the enterprise data to the blockchain so as to inspect the enterprise data, for example, a data inspector (e.g., an inspection unit) inspects the financial, financial and business administration activities of the data provider (e.g., an enterprise) and the authenticity, correctness, compliance, legality and proficiency of the enterprise data.
In one embodiment, after the data provider stores the enterprise data in the corresponding blockchain node, if the data accessor accesses the enterprise data of the data provider, it can be determined whether the data accessor accesses the enterprise data according to the access information stored in the blockchain historical book.
In one embodiment, after the data provider stores the enterprise data in the corresponding blockchain node, if the data processor performs processing (including adding, deleting or modifying) on the enterprise data, corresponding processing information (including adding information, deleting information and modifying information) is saved in the blockchain history book. When other enterprises or users acquire the enterprise data, if the enterprise data is found to have problems, processing information can be acquired from the block chain historical account book, and whether the enterprise data has problems in the storage process or is modified by the data processing party is judged through the processing information, so that the source tracing of the enterprise data is realized. The processing information includes processing time and content, such as deleting part of content and deleting time in the enterprise data.
In the above embodiment, the enterprise data is stored in the corresponding block node of the block chain managed by the enterprise data provider, the enterprise data can be managed by the data provider, and the data on the block chain has non-tamper property, so that the security of the enterprise data is ensured. The access address of the enterprise data is stored in the corresponding block node of the block chain, the enterprise data is stored in the enterprise database, and the access address of the block chain cannot be tampered, so that the enterprise data can be effectively obtained from the enterprise database through the access address, the enterprise data is stored in the enterprise database, the enterprise can control the enterprise data, the enterprise data can be guaranteed not to be tampered, and the authenticity of the enterprise data is guaranteed.
In one embodiment, as shown in FIG. 4, another data access method is provided. The present embodiment is mainly illustrated by applying the method to the first block node 120 (hereinafter referred to as a server) in fig. 1, where the server is a block node of a data access side. Referring to fig. 2, the data access method specifically includes the following steps:
s402, receiving a data access request sent by each terminal.
In one embodiment, prior to S402, the method further comprises: the server receives enterprise data sent by a data provider; and storing the enterprise data to a block chain account book of the block node.
In one embodiment, prior to S402, the method further comprises: the server receives enterprise data sent by a data provider, encrypts the enterprise data by adopting a key of the data provider, and stores the encrypted enterprise data to a block chain account book of a local block node; or receiving enterprise data which is sent by a data provider and encrypted by adopting a key, and storing the received enterprise data to a block chain account book of the block node.
In one embodiment, prior to S402, the method further comprises: the server receives an access address about enterprise data sent by a data provider; and storing the access address to a block chain account book of the block node.
And S404, determining a storage mode of the enterprise data corresponding to the data access request through the intelligent contract.
In one embodiment, prior to S404, the method further comprises: the server extracts the user signature from the data access request; when the user signature is the signature of the authorized user, the time of receiving the data access request is taken as the access time, and is saved in the block chain history book, and S404 is executed.
In one embodiment, the step of deploying the smart contract comprises: the server configures data format, storage mode, verification mode, integration mode and extraction mode of enterprise data; constructing an intelligent contract according to the data format, the storage mode, the verification mode, the integration mode and the extraction mode; intelligent contracts are deployed in blockchains.
S406, when the storage mode is data uplink storage, acquiring enterprise data from the block chain account book of the block node according to the data access request.
In one embodiment, after S406, the method further comprises: the server stores the acquired enterprise data to a block chain account book of the block node; or encrypting the acquired enterprise data by adopting a key of the data provider, and storing the encrypted enterprise data to a block chain account book of the block node.
S408, when the storage mode is data address uplink storage, searching an access address corresponding to the data access request in the block node from the block chain account book of the block node, and acquiring enterprise data from the enterprise database according to the access address.
In one embodiment, upon receiving enterprise data or an access address for the enterprise data, the server invokes a trusted timestamp service interface; acquiring trusted time from a time service center according to the trusted timestamp service interface; and saving the credible time in a block chain historical account book.
In one embodiment, when enterprise data is acquired based on a data access request, a server performs a hash operation on the acquired enterprise data to obtain a first hash value; acquiring a second hash value from the block node according to the data access request; judging whether the first hash value and the second hash value are the same or not, and obtaining a judgment result; and sending the judgment result to the terminal.
And S410, sending the acquired enterprise data to a terminal.
The specific steps of S402-S410 can refer to S202-S210.
In the above embodiment, the enterprise data is stored in the corresponding block node of the block chain, and the data on the block chain has non-tamper property, so that the security of the enterprise data is ensured, and therefore, when the enterprise data is acquired from the corresponding block node of the block chain, the authenticity of the enterprise data can be ensured. The access address of the enterprise data is stored in the corresponding block node of the block chain, the enterprise data is stored in the enterprise database, and the access address of the block chain cannot be tampered, so that the enterprise data can be effectively obtained from the enterprise database through the access address, the enterprise data is stored in the enterprise database, the enterprise can control the enterprise data, the enterprise data can be guaranteed not to be tampered, and the authenticity of the enterprise data is guaranteed.
As an example, the present application is described by taking a server as a block node of a data provider, and first establishing a block chain of a federation of multiple enterprises, and then deploying and running an intelligent contract on the block chain. Therefore, the data interaction and communication of an enterprise information system (such as ERP) are completed in a standardized data format, and the interconnection and intercommunication of enterprise data and the service sharing cooperation are realized.
Each main enterprise participating in the cooperation deploys the block nodes, and the enterprise can master the block nodes. And then the operation format or the service method of one type or the same series of data is published to the blockchain in the form of the intelligent contract, and all the participating enterprises can evaluate the effectiveness, the safety and the like of the intelligent contract. For example, the intelligent contract may specify a standard format and an optional format of data, a storage manner of data, a verification manner of data, an integration manner of data, an extraction manner of data, and the like. All the calls need signature verification of the block chain digital identity, so that the identity uniqueness and authority can be confirmed, all the calls are automatically processed according to a flow set by an intelligent contract, the requirements of credibility, safety, privacy and the like are met, all the calls can be recorded on the block chain in a non-falsification manner, and the requirement of post audit is met.
In order to meet the requirements of different business scenarios, the enterprise data to be exchanged can be divided into the following ways for uplink. Each piece of data in the data warehouse (i.e., the enterprise database) or the basic unit of data during data exchange is called a data element, and uplink and other processing are performed in units of data elements.
(1) Data element clear text uplink: the data elements are recorded in the blockchain account book, and the processes of uploading and accessing the data elements are recorded in the blockchain historical account book. The uplink mode is mainly used for uplink of data meeting the requirement of complete public sharing among enterprises, such as public geographic information, enterprise basic information and the like. For data elements in the clear text chain, all participating enterprises can directly access through the intelligent contract, and an access record is kept in a block chain historical account book.
(2) Data element encrypted uplink: the data elements are recorded in the blockchain account book, and the processes of uploading and accessing the data elements are recorded in the blockchain historical account book. The data provider encrypts and links the data element by a key controlled by the data provider, and when other enterprises use the data element, the other enterprises need to obtain the authorization of the data provider through an intelligent contract on the blockchain. After obtaining authorization and obtaining data elements, the real validity of the original data can be directly checked through the block chain.
(3) Exchange data element uplink: the data elements are not recorded in the blockchain account book, the data provider only issues access addresses on the blockchain, processes of accessing and checking the data elements are recorded in the blockchain historical account book, and the exchange data elements (namely the data elements to be acquired through the access addresses) are recorded in the blockchain account book in a plaintext or encryption mode.
In this way, the data provider of the data element does not need to chain the data element in advance, but only needs to access the data warehouse through the block chain when data exchange occurs, and to chain the exchanged data element in a full or partial way after plaintext or encryption. Other enterprises can directly access the data elements of the plaintext uplink or access the data elements of the encrypted uplink after obtaining the authorization, and complete data auditing, checking and other items.
(4) Accessing the uplink of the address: the data elements are not recorded in the blockchain ledger, the data provider only issues data warehouse access addresses in the blockchain, the processes of accessing and checking the data elements and the like are recorded in the blockchain historical ledger, and the original data cannot be recorded in the blockchain ledger in a plaintext or encrypted mode all the time.
In the mode, the data provider chains the access address, when there is a data access demand, the blockchain acquires the required data element according to the access address and processes the data element, the data element only circulates in the blockchain but is not recorded in the blockchain account book, and only the history record of processing or accessing the data is stored in the blockchain account book and can be used for post audit and traceability.
As shown in fig. 5, for the data access process: when an enterprise has data requirements, a request is sent to a block chain through a block node of the enterprise, after signature verification is completed, a corresponding intelligent contract method is called by the block chain, access authority is verified according to intelligent contract setting strictly, then a block chain account book or a block chain historical account book where corresponding data are located is requested, and finally a response result is returned. For the data elements of the plaintext uplink of the (1) type and the (3) type, the data elements can be directly accessed after signature verification of an intelligent contract; for the data elements of the encrypted uplink of the type (2) and the type (3), after the authorization of the corresponding enterprise needs to be applied, access is carried out; for the data warehouse accessed by the blockchain in the data of the (3) type and the (4) type, the data provider sets an access rule, and if the access right is needed, the enterprise is required to apply for authorization again.
By adopting the scheme of the embodiment, the problems of information safety, data credibility, stability, high efficiency and the like which need to be met in an enterprise data interconnection and intercommunication scene can be effectively solved, and the capabilities and technical levels of resource sharing, service intercommunication and service cooperation among enterprises can be effectively improved.
Fig. 2 and 4 are schematic flow charts of a data access method in one embodiment. It should be understood that although the steps in the flowcharts of fig. 2 and 4 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2 and 4 may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least some of the sub-steps or stages of other steps.
As shown in fig. 6, in an embodiment, a data access apparatus is provided, which specifically includes: a receiving module 602, a determining module 604, an obtaining module 606, a searching module 608 and a sending module 610; wherein:
a receiving module 602, configured to receive a data access request sent by a terminal;
a determining module 604, configured to determine, through the intelligent contract, a storage manner of the enterprise data corresponding to the data access request;
an obtaining module 606, configured to, when the storage mode is uplink data storage, obtain enterprise data from a blocknode on the blockchain and managed by the data provider according to the data access request;
a searching module 608, configured to search, when the storage mode is uplink storage of the data address, an access address corresponding to the data access request at the block node, and obtain enterprise data from the enterprise database according to the access address;
a sending module 610, configured to send the acquired enterprise data to a terminal.
In one embodiment, as shown in fig. 7, the apparatus may further include: a storage module 612; wherein:
a receiving module 602, configured to receive enterprise data sent by a data provider before receiving a data access request sent by a terminal;
the storage module 612 is configured to store the enterprise data to a corresponding block node in the block chain.
In one embodiment, the receiving module 602 is further configured to receive enterprise data sent by a data provider before receiving a data access request sent by a terminal;
the storage module 612 is further configured to encrypt enterprise data using a key of a data provider, and store the encrypted enterprise data to a corresponding block node in a block chain; alternatively, the first and second electrodes may be,
the receiving module 602 is further configured to receive enterprise data sent by a data provider and encrypted by using a key;
the storage module 612 is further configured to store the received enterprise data to a corresponding block node in the block chain.
In one embodiment, the receiving module 602 is further configured to receive an access address about the enterprise data sent by the data provider before receiving the data access request sent by the terminal;
the storage module 612 is further configured to store the access address to a corresponding block node in the block chain.
In an embodiment, the storage module 612 is further configured to, after acquiring the corresponding enterprise data according to the access address, store the acquired enterprise data to the corresponding block node in the block chain; or encrypting the acquired enterprise data by adopting a key of the data provider, and storing the encrypted enterprise data to the corresponding block node in the block chain.
In one embodiment, the obtaining module 604 is further configured to extract a user signature from the data access request;
the storage module 612 is further configured to, when the user signature is a signature of an authorized user, take a time of receiving the data access request as an access time, store the access time in the block chain history book, and perform a step of determining, by using an intelligent contract, a storage manner of the enterprise data corresponding to the data access request.
In one embodiment, as shown in fig. 7, when enterprise data is stored in a corresponding blockchain node or an enterprise database, corresponding processing procedure information for the enterprise data is saved in a blockchain historical book; the device also includes: a verification module 614;
the checking module 614 is configured to, when a checking request is received, obtain corresponding processing procedure information from the block chain historical account book; and checking the enterprise data according to the processing process information.
In one embodiment, as shown in fig. 7, the apparatus further comprises: a deployment module 616; wherein:
a deployment module 616, configured to configure data format, storage mode, verification mode, integration mode, and extraction mode of the enterprise data; constructing an intelligent contract according to the data format, the storage mode, the verification mode, the integration mode and the extraction mode; intelligent contracts are deployed in blockchains.
In one embodiment, as shown in fig. 7, the apparatus further comprises: a decision block 618; wherein:
the determining module 618 is configured to, when enterprise data is acquired based on the data access request, perform hash operation on the acquired enterprise data to obtain a first hash value; acquiring a second hash value from the block node according to the data access request; judging whether the first hash value and the second hash value are the same or not, and obtaining a judgment result;
the sending module 610 is further configured to send the determination result to the terminal.
In the above embodiment, the enterprise data is stored in the corresponding block node of the block chain managed by the enterprise data provider, the enterprise data can be managed by the data provider, and the data on the block chain has non-tamper property, so that the security of the enterprise data is ensured. The access address of the enterprise data is stored in the corresponding block node of the block chain, the enterprise data is stored in the enterprise database, and the access address of the block chain cannot be tampered, so that the enterprise data can be effectively obtained from the enterprise database through the access address, the enterprise data is stored in the enterprise database, the enterprise can control the enterprise data, the enterprise data can be guaranteed not to be tampered, and the authenticity of the enterprise data is guaranteed.
FIG. 8 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may be specifically the first block node 120 (i.e., server) in fig. 1. As shown in fig. 8, the computer apparatus includes a processor, a memory, a network interface, an input device, and a display screen connected through a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement the data access method. The internal memory may also have stored therein a computer program that, when executed by the processor, causes the processor to perform a data access method.
Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the data access apparatus provided herein may be implemented in the form of a computer program that is executable on a computer device such as that shown in fig. 8. The memory of the computer device may store various program modules that make up the data access apparatus, such as the receiving module 602, determining module 604, obtaining module 606, finding module 608, and sending module 610 shown in FIG. 6. The computer program constituted by the respective program modules causes the processor to execute the steps in the data access method of the respective embodiments of the present application described in the present specification.
For example, the computer device shown in fig. 8 may execute S204 through the receiving module 602 in the data access apparatus shown in fig. 6. The computer device may perform S204 by the determination module 604. The computer device may perform S206 by the obtaining module 606. The computer device may perform S208 through the lookup module 608. The computer device may perform S210 through the transmission module 610.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of the data access method described above. The steps of the data access method herein may be steps in the data access methods of the various embodiments described above.
In one embodiment, a computer readable storage medium is provided, storing a computer program which, when executed by a processor, causes the processor to perform the steps of the above-described data access method. The steps of the data access method herein may be steps in the data access methods of the various embodiments described above.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, and the program can be stored in a non-volatile computer readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (12)

1. A method of data access, comprising:
receiving data access requests sent by each terminal;
determining a storage mode of enterprise data corresponding to the data access request through an intelligent contract;
when the storage mode is data uplink storage, acquiring enterprise data from a block node on a block chain and managed by a data provider according to a data access request;
when the storage mode is data address uplink storage, searching an access address corresponding to the data access request at the block node, and acquiring enterprise data from an enterprise database according to the access address;
and sending the acquired enterprise data to the terminal.
2. The method of claim 1, wherein before receiving the data access request sent by the terminal, further comprising:
receiving enterprise data sent by a data provider;
and storing the enterprise data to the corresponding block node in the block chain.
3. The method of claim 1, wherein before receiving the data access request sent by the terminal, further comprising:
the method comprises the steps of receiving enterprise data sent by a data provider, encrypting the enterprise data by adopting a key of the data provider, and storing the encrypted enterprise data to corresponding block nodes in a block chain; alternatively, the first and second electrodes may be,
and receiving enterprise data which is sent by a data provider and encrypted by adopting a key, and storing the received enterprise data to a corresponding block node in the block chain.
4. The method of claim 1, wherein before receiving the data access request sent by the terminal, further comprising:
receiving an access address about enterprise data sent by a data provider;
the access address is stored to a corresponding block node in the block chain.
5. The method of claim 4, after obtaining the corresponding enterprise data based on the access address, further comprising:
storing the acquired enterprise data to corresponding block nodes in a block chain; alternatively, the first and second electrodes may be,
and encrypting the acquired enterprise data by adopting a key of a data provider, and storing the encrypted enterprise data to a corresponding block node in the block chain.
6. The method according to any one of claims 1 to 5, further comprising:
extracting a user signature from the data access request;
and when the signature of the user is the signature of the authorized user, taking the time of receiving the data access request as the access time, saving the access time in the block chain historical account book, and executing the step of determining the storage mode of the enterprise data corresponding to the data access request through the intelligent contract.
7. The method according to any one of claims 1 to 5, wherein when the enterprise data is stored in the corresponding blockchain node or the enterprise database, the corresponding processing procedure information for the enterprise data is saved in a blockchain historical account book; the method further comprises the following steps:
when an inspection request is received, acquiring corresponding processing process information from the block chain historical account book;
and checking the enterprise data according to the processing process information.
8. The method according to any one of claims 2 to 5, further comprising:
configuring a data format, a storage mode, a verification mode, an integration mode and an extraction mode of enterprise data;
constructing an intelligent contract according to the data format, the storage mode, the verification mode, the integration mode and the extraction mode;
intelligent contracts are deployed in blockchains.
9. The method of any one of claims 2, 3 and 5, further comprising:
when enterprise data are acquired based on a data access request, performing hash operation on the acquired enterprise data to obtain a first hash value;
acquiring a second hash value from the block node according to the data access request;
judging whether the first hash value and the second hash value are the same or not, and obtaining a judgment result;
and sending the judgment result to the terminal.
10. A data access device, characterized in that the device comprises:
the receiving module is used for receiving a data access request sent by a terminal;
the determining module is used for determining the storage mode of the enterprise data corresponding to the data access request through the intelligent contract;
the acquisition module is used for acquiring enterprise data from a block node on a block chain and managed by a data provider according to a data access request when the storage mode is data uplink storage;
the searching module is used for searching an access address corresponding to the data access request at the block node when the storage mode is uplink storage of the data address, and acquiring enterprise data from an enterprise database according to the access address;
and the sending module is used for sending the acquired enterprise data to the terminal.
11. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, causes the processor to carry out the steps of the method according to any one of claims 1 to 9.
12. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method according to any one of claims 1 to 9.
CN201911155751.XA 2019-11-22 2019-11-22 Data access method, data access device, computer-readable storage medium and computer equipment Pending CN110990883A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911155751.XA CN110990883A (en) 2019-11-22 2019-11-22 Data access method, data access device, computer-readable storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911155751.XA CN110990883A (en) 2019-11-22 2019-11-22 Data access method, data access device, computer-readable storage medium and computer equipment

Publications (1)

Publication Number Publication Date
CN110990883A true CN110990883A (en) 2020-04-10

Family

ID=70085842

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911155751.XA Pending CN110990883A (en) 2019-11-22 2019-11-22 Data access method, data access device, computer-readable storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN110990883A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111861688A (en) * 2020-06-12 2020-10-30 方欣科技有限公司 Block chain-based electronic tax registration method and system
CN112819617A (en) * 2020-08-21 2021-05-18 支付宝(杭州)信息技术有限公司 Data uplink method and device, electronic equipment and storage medium
CN113052721A (en) * 2021-03-18 2021-06-29 国网北京市电力公司 Electric power data processing method and device
CN113098876A (en) * 2021-04-02 2021-07-09 中南大学 Product data chaining method and medium based on block chain and intelligent contract
CN113094394A (en) * 2021-03-19 2021-07-09 广东省重工建筑设计院有限公司 Data access method and device, computer equipment and storage medium
WO2021218177A1 (en) * 2020-04-30 2021-11-04 平安科技(深圳)有限公司 Page data generation method and apparatus, computer device, and storage medium
CN114615279A (en) * 2022-03-18 2022-06-10 中央财经大学 Credible multi-party data cooperation method and system based on block chain technology
CN114978664A (en) * 2022-05-18 2022-08-30 中银金融科技有限公司 Data sharing method and device and electronic equipment
WO2024001304A1 (en) * 2022-06-30 2024-01-04 华为云计算技术有限公司 Data processing method and related device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160261404A1 (en) * 2015-03-02 2016-09-08 Dell Products L.P. Methods and systems for obfuscating data and computations defined in a secure distributed transaction ledger
CN109670321A (en) * 2018-11-30 2019-04-23 深圳灵图慧视科技有限公司 Date storage method, data query method and device
CN110377239A (en) * 2018-04-27 2019-10-25 腾讯科技(深圳)有限公司 Data signature method, device, server, system and storage medium
CN110457303A (en) * 2019-08-08 2019-11-15 北京芯际科技有限公司 A kind of government data shared system based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160261404A1 (en) * 2015-03-02 2016-09-08 Dell Products L.P. Methods and systems for obfuscating data and computations defined in a secure distributed transaction ledger
CN110377239A (en) * 2018-04-27 2019-10-25 腾讯科技(深圳)有限公司 Data signature method, device, server, system and storage medium
CN109670321A (en) * 2018-11-30 2019-04-23 深圳灵图慧视科技有限公司 Date storage method, data query method and device
CN110457303A (en) * 2019-08-08 2019-11-15 北京芯际科技有限公司 A kind of government data shared system based on block chain

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021218177A1 (en) * 2020-04-30 2021-11-04 平安科技(深圳)有限公司 Page data generation method and apparatus, computer device, and storage medium
CN111861688B (en) * 2020-06-12 2024-01-12 金财互联智链研究院(青岛)有限公司 Electronic tax registration method and system based on blockchain
CN111861688A (en) * 2020-06-12 2020-10-30 方欣科技有限公司 Block chain-based electronic tax registration method and system
CN112819617A (en) * 2020-08-21 2021-05-18 支付宝(杭州)信息技术有限公司 Data uplink method and device, electronic equipment and storage medium
CN112819617B (en) * 2020-08-21 2022-06-07 支付宝(杭州)信息技术有限公司 Data uplink method and device, electronic equipment and storage medium
US11972414B2 (en) 2020-08-21 2024-04-30 Alipay (Hangzhou) Information Technology Co., Ltd. Data recording methods and apparatuses, electronic devices, and storage media
CN113052721A (en) * 2021-03-18 2021-06-29 国网北京市电力公司 Electric power data processing method and device
CN113052721B (en) * 2021-03-18 2024-04-30 国网北京市电力公司 Power data processing method and device
CN113094394A (en) * 2021-03-19 2021-07-09 广东省重工建筑设计院有限公司 Data access method and device, computer equipment and storage medium
CN113098876A (en) * 2021-04-02 2021-07-09 中南大学 Product data chaining method and medium based on block chain and intelligent contract
CN114615279B (en) * 2022-03-18 2023-06-20 中央财经大学 Trusted multiparty data collaboration method and system based on blockchain technology
CN114615279A (en) * 2022-03-18 2022-06-10 中央财经大学 Credible multi-party data cooperation method and system based on block chain technology
CN114978664A (en) * 2022-05-18 2022-08-30 中银金融科技有限公司 Data sharing method and device and electronic equipment
WO2024001304A1 (en) * 2022-06-30 2024-01-04 华为云计算技术有限公司 Data processing method and related device

Similar Documents

Publication Publication Date Title
CN110990883A (en) Data access method, data access device, computer-readable storage medium and computer equipment
CN110365670B (en) Blacklist sharing method and device, computer equipment and storage medium
US11122087B2 (en) Managing cybersecurity vulnerabilities using blockchain networks
CN110581860B (en) Identity authentication method, device, storage medium and equipment based on block chain
CN110213223B (en) Service management method, device, system, computer equipment and storage medium
CN110598446A (en) Block chain based test method and device, storage medium and computer equipment
US10142113B2 (en) Identifying and maintaining secure communications
CN110535971B (en) Interface configuration processing method, device, equipment and storage medium based on block chain
CN108881252B (en) Identity authentication data processing method and device, computer equipment and storage medium
CN110633963B (en) Electronic bill processing method, electronic bill processing device, computer readable storage medium and computer readable storage device
WO2021159606A1 (en) Organization node chaining method and system based on blockchain
CN112667748B (en) Block chain all-in-one machine facing audit service, data processing method and device
CN111241555B (en) Access method and device for simulating user login, computer equipment and storage medium
CN110597541B (en) Interface updating processing method, device, equipment and storage medium based on block chain
CN112861496A (en) Report generation display method and device, computer equipment and readable storage medium
CN112231284A (en) Block chain-based big data sharing system, method, device and storage medium
CN111651794A (en) Alliance chain-based electronic data management method and device and storage medium
CN111292174A (en) Tax payment information processing method and device and computer readable storage medium
CN112446780A (en) Account management method and device, computer equipment and storage medium
CN110611725B (en) Node access method, node access device, computer equipment and storage medium
Otta et al. Decentralized identity and access management of cloud for security as a service
CN111652720A (en) Cloud evidence obtaining method and device, computer equipment and storage medium
CN113742681B (en) Account management method and device, computer equipment and storage medium
CN109413200A (en) A kind of method, client, MES and electronic equipment that resource imports
CN116049322B (en) Data sharing platform and method based on privacy calculation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200410

RJ01 Rejection of invention patent application after publication