CN111415157A - Block chain-based data asset safety circulation method - Google Patents
Block chain-based data asset safety circulation method Download PDFInfo
- Publication number
- CN111415157A CN111415157A CN202010232727.8A CN202010232727A CN111415157A CN 111415157 A CN111415157 A CN 111415157A CN 202010232727 A CN202010232727 A CN 202010232727A CN 111415157 A CN111415157 A CN 111415157A
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- circulation
- information
- layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000012544 monitoring process Methods 0.000 claims abstract description 8
- 238000012795 verification Methods 0.000 claims description 8
- 230000006855 networking Effects 0.000 claims description 3
- 238000010200 validation analysis Methods 0.000 claims description 3
- 238000013523 data management Methods 0.000 abstract 1
- 238000005516 engineering process Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a block chain-based data asset safety circulation method, and particularly relates to the technical field of data resource transaction, wherein the method comprises the following steps: the data supplier records the data ownership information to the block chain; and a second process: generating a data right identification in the block chain and transmitting the data right identification to a data supplier; and a third process: the data demander records the information of the required data to the block chain; and (4) a fourth process: recording data circulation information to a block chain in a data circulation process; and a fifth process: the whole data circulation process is monitored by the data management and control module, the monitoring result is recorded in the block chain, and a data demand party can perform source tracing query according to the data identification. According to the invention, the right information of the data, the description information of the data and the circulation information of the data are respectively recorded in the block chain, so that the transaction tracing is realized, the data source can be checked, and the safety and the privacy of data circulation are ensured.
Description
Technical Field
The invention relates to the technical field of data resource transaction, in particular to a safe data asset circulation method based on a block chain.
Background
Data distribution refers to the behavior of data as an object between a data provider and a data consumer according to a certain distribution rule. In this case, the data is separated from the original usage scenario, and the usage purpose is changed. With the gradually accepted resource value of data and the increasingly complete structure of big data industry chain, the demand of data circulation in China is increasingly urgent. Data circulation enables data to be transferred from a data generation end to a data application end no matter sharing or trading, resource allocation is optimized, and the data circulation becomes an important link for releasing data value. Data circulation in China, particularly data circulation in the transaction industry, still faces serious problems, such as extremely outstanding data privacy protection problem, accurate definition of data right problem, lack of unified consensus in standards of all links of data circulation, rampant data transaction and the like.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention records the right information of the data, the description information of the data and the circulation information of the data to the block chain respectively, thereby realizing transaction tracing and ensuring the data source to be searchable, thereby ensuring the safety and the privacy of data circulation.
The invention relates to a block chain-based data asset safety circulation method, which comprises the following flows:
the first process is as follows: the data supplier records the data ownership information to the block chain, encrypts the data ownership information to obtain a private key signature and creates an intelligent contract;
and a second process: generating a data right identification in the block chain and transmitting the data right identification to a data supplier;
and a third process: the data demand side records the information of the required data to a block chain, fills in a contract for applying for using the data and acquires a secret key;
and (4) a fourth process: the data supplier verifies the request of the data demander, if the verification is successful, the data demander can use the data, if the verification is unsuccessful, the data demander cannot use the data, and data circulation information is recorded to the block chain in the data circulation process;
and a fifth process: the whole process of the first process, the second process, the third process and the fourth process is monitored by the data control module, and the monitoring result is recorded in the block chain, so that the data demand side can perform source tracing query according to the data identification.
Further, the data right information generates a hash value of the data right through a hash algorithm, and the hash value of the data right is stored on the block chain.
Further, the validation token for the blockchain includes a digital certificate record number, data description information, a data digest, and a data provider digital signature.
Furthermore, the data supplier and the data demander are self-growing nodes, and both the data supplier and the data demander keep a set of independent data accounts, and the data of each client is consistent.
Further, the logic layer of the circulation method is divided into a circulation layer, a block layer, a consensus layer and a network layer;
the circulation layer encrypts and transmits the data assets and is mainly used for determining data rights, recording data circulation information and monitoring transaction traceability;
the block layer adopts a block chain structure, asymmetric encryption and a model based on transaction to continuously track each data of transaction data;
the consensus layer adopts a consensus algorithm to encrypt and decrypt data, so that a data demand party and a data supply party achieve consensus;
the network layer encapsulates a CA authentication mechanism, a peer-to-peer network mechanism and a distributed networking mechanism, identity authentication and access control are carried out on data users, all the data users can form peer-to-peer network nodes, and the stability and the safety of the operation of the whole system cannot be influenced by the invalidation, exit and addition of a plurality of nodes in the system and even the existence of malicious nodes.
Further, the circulation information includes information of a data supplier and a data demander
The invention has the beneficial effects that: the invention discloses a data asset safety circulation method based on a block chain, which can improve the key problems of data circulation such as data asset registration, data traceability and the like through the block chain technology, and the characteristics of openness, autonomy and decentralization of the block chain technology are suitable for data transaction traceability.
Drawings
The invention is further described below with reference to the following figures and examples:
FIG. 1 is a schematic illustration of a data asset circulation flow diagram;
FIG. 2 is a diagram of a data flow logical layer analysis.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention relates to a block chain-based data asset safety circulation method, which comprises the following flows:
the first process is as follows: the data supplier records the data ownership information to the block chain, encrypts the data ownership information to obtain a private key signature and creates an intelligent contract;
and a second process: generating a data right identification in the block chain and transmitting the data right identification to a data supplier;
and a third process: the data demand side records the information of the required data to a block chain, fills in a contract for applying for using the data and acquires a secret key;
and (4) a fourth process: the data supplier verifies the request of the data demander, if the verification is successful, the data demander can use the data, if the verification is unsuccessful, the data demander cannot use the data, and data circulation information is recorded to the block chain in the data circulation process;
and a fifth process: the whole process of the first process, the second process, the third process and the fourth process is monitored by the data control module, and the monitoring result is recorded in the block chain, so that the data demand side can perform source tracing query according to the data identification.
According to the invention, ownership information, description information and circulation information of data in data asset circulation are respectively recorded in the block chain, real-time monitoring is carried out on the whole process of data asset circulation, and all information of data transaction is linked, so that transaction tracing is realized, the data source is searchable, and the safety and privacy of data circulation are ensured.
In this embodiment of the present application, the data right information generates a hash value of the data right through a hash algorithm, and the hash value of the data right is stored on the block chain.
In an embodiment of the present application, the validation token of the blockchain includes a digital certificate record number, data description information, a data digest, and a data provider digital signature.
In the embodiment of the application, the data supplier and the data demander are self-growing nodes, and both maintain a set of independent data accounts, and the data of each client is consistent.
In the embodiment of the application, the logic layer of the circulation method is divided into a circulation layer, a block layer, a consensus layer and a network layer;
the circulation layer is used for encrypting and transmitting data assets and is mainly used for determining data rights, recording data circulation information and monitoring transaction traceability, and a data provider is used for encrypting and transmitting own data more easily and conveniently realizing the right-determining management of the data by relying on a network layer, a consensus layer and a block layer compared with a traditional data circulation platform. The data circulation platform faces the encrypted data, so that self-verification clearing is easier, and the flooding copying of the circulating data is avoided. By means of the traceability function of the block chain system, the data owner can track the current circulation situation of the data, authorization verification of the data owner is required for each use of the data, autonomous control over owned data by a data provider is achieved, the data demander can trace the source of the data, authenticity of data analysis is guaranteed, and accuracy and effectiveness of the data analysis are improved;
the block layer adopts a block chain structure, asymmetric encryption and a transaction-based model to continuously track each data of transaction data, adopts a compound accounting method model different from a common commercial bank, namely a transaction-based model, namely a unspent transaction output (UTXO) model, and is more suitable for the control and tracing of data transaction. Besides, the historical transaction information buckled by the ring is realized through a block chain type data structure, and the encryption and decryption of a public key and a private key are realized through an asymmetric cryptography technology, so that the operations of data authentication, data chain linking and the like before data transaction are facilitated;
the consensus layer adopts a consensus algorithm to encrypt and decrypt data, so that a data demand party and a data supply party achieve consensus;
the network layer encapsulates a CA authentication mechanism, a peer-to-peer network mechanism and a distributed networking mechanism, identity authentication and access control are carried out on data users, all the data users can form peer-to-peer network nodes, the stability and the safety of the operation of the whole system cannot be influenced by the invalidation, exit and addition of a plurality of nodes in the system and even the existence of malicious nodes, and the network layer is deployed in a mode of a permission chain. In the aspect of identity authentication, an industry-class or regional-class electronic commerce authentication and authorization mechanism is used for identity authentication and access control. The whole network is a peer-to-peer network, and the failure, exit and join of a plurality of nodes in the system, even the existence of malicious nodes, can not influence the stability and the safety of the operation of the whole system.
In the embodiment of the application, the circulation information comprises information of a data supplier and a data demander, so that data tracing is facilitated.
Finally, the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made to the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention, and all of them should be covered in the claims of the present invention.
Claims (6)
1. A safe circulation method of data assets based on a block chain is characterized in that the circulation method flow comprises the following steps:
the first process is as follows: the data supplier records the data ownership information to the block chain, encrypts the data ownership information to obtain a private key signature and creates an intelligent contract;
and a second process: generating a data right identification in the block chain and transmitting the data right identification to a data supplier;
and a third process: the data demand side records the information of the required data to a block chain, fills in a contract for applying for using the data and acquires a secret key;
and (4) a fourth process: the data supplier verifies the request of the data demander, if the verification is successful, the data demander can use the data, if the verification is unsuccessful, the data demander cannot use the data, and data circulation information is recorded to the block chain in the data circulation process;
and a fifth process: the whole process of the first process, the second process, the third process and the fourth process is monitored by the data control module, and the monitoring result is recorded in the block chain, so that the data demand side can perform source tracing query according to the data identification.
2. The block chain-based data asset secure circulation method according to claim 1, characterized in that: and the data right information generates a hash value of the data right through a hash algorithm, and the hash value of the data right is stored on the block chain.
3. The block chain-based data asset secure circulation method according to claim 1, characterized in that: the validation token for the blockchain includes a digital certificate record number, data description information, a data digest, and a data provider digital signature.
4. The block chain-based data asset secure circulation method according to claim 1, characterized in that: the data supplier and the data demander are self-growing nodes, and both the data supplier and the data demander keep a set of independent data accounts, and the data of each client is consistent.
5. The block chain-based data asset secure circulation method according to claim 1, characterized in that: the logic layer of the circulation method is divided into a circulation layer, a block layer, a consensus layer and a network layer;
the circulation layer encrypts and transmits the data assets and is mainly used for determining data rights, recording data circulation information and monitoring transaction traceability;
the block layer adopts a block chain structure, asymmetric encryption and a model based on transaction to continuously track each data of transaction data;
the consensus layer adopts a consensus algorithm to encrypt and decrypt data, so that a data demand party and a data supply party achieve consensus;
the network layer encapsulates a CA authentication mechanism, a peer-to-peer network mechanism and a distributed networking mechanism, identity authentication and access control are carried out on data users, all the data users can form peer-to-peer network nodes, and the stability and the safety of the operation of the whole system cannot be influenced by the invalidation, exit and addition of a plurality of nodes in the system and even the existence of malicious nodes.
6. The block chain-based data asset secure circulation method according to claim 1, characterized in that: the circulation information includes information of a data supplier and a data demander.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010232727.8A CN111415157A (en) | 2020-03-28 | 2020-03-28 | Block chain-based data asset safety circulation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010232727.8A CN111415157A (en) | 2020-03-28 | 2020-03-28 | Block chain-based data asset safety circulation method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111415157A true CN111415157A (en) | 2020-07-14 |
Family
ID=71491502
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010232727.8A Pending CN111415157A (en) | 2020-03-28 | 2020-03-28 | Block chain-based data asset safety circulation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111415157A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111931238A (en) * | 2020-09-15 | 2020-11-13 | 支付宝(杭州)信息技术有限公司 | Block chain-based data asset transfer method, device and equipment |
CN112634058A (en) * | 2020-12-22 | 2021-04-09 | 无锡井通网络科技有限公司 | Data mutual trust and mutual sharing and intercommunication platform based on block chain |
WO2022083490A1 (en) * | 2020-10-23 | 2022-04-28 | 国网福建省电力有限公司 | Blockchain-based data product trusted transaction method |
US11341284B2 (en) | 2020-09-04 | 2022-05-24 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted hardware-based data management methods, apparatuses, and devices |
US11354447B2 (en) | 2020-08-28 | 2022-06-07 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data authorization information acquisition methods, apparatuses, and devices |
US11362815B2 (en) | 2020-08-28 | 2022-06-14 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted data transmission methods, apparatuses, and devices |
US11386191B2 (en) | 2020-09-15 | 2022-07-12 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted hardware-based identity management methods, apparatuses, and devices |
CN114884674A (en) * | 2022-04-29 | 2022-08-09 | 蚂蚁区块链科技(上海)有限公司 | Block chain-based user data transfer method, device and equipment |
US11455417B2 (en) | 2020-09-04 | 2022-09-27 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, and devices |
US11494511B2 (en) | 2020-09-15 | 2022-11-08 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, and devices |
US11604894B2 (en) | 2020-07-24 | 2023-03-14 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, devices, and media |
US11614929B2 (en) | 2020-08-28 | 2023-03-28 | Alipay (Hangzhou) Information Technology Co., Ltd. | Identity registration methods, apparatuses, and devices |
US11652879B2 (en) | 2020-08-28 | 2023-05-16 | Alipay (Hangzhou) Information Technology Co., Ltd. | Matching methods, apparatuses, and devices based on trusted asset data |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018032372A1 (en) * | 2016-08-13 | 2018-02-22 | 深圳市樊溪电子有限公司 | Trusted power grid transaction platform based on block chain technology |
CN108256875A (en) * | 2018-04-09 | 2018-07-06 | 王先笨 | A kind of safe traceability system based on product supply chain |
CN108650328A (en) * | 2018-05-22 | 2018-10-12 | 河海大学常州校区 | The block catenary system of data information record and storage in a kind of cloud service platform |
CN108985790A (en) * | 2018-06-25 | 2018-12-11 | 平安科技(深圳)有限公司 | Method for anti-counterfeit, system, computer equipment and storage medium based on block chain |
CN110335149A (en) * | 2019-06-19 | 2019-10-15 | 华中科技大学 | A kind of assets based on block chain really weigh transaction realization method and system |
CN110414936A (en) * | 2019-07-30 | 2019-11-05 | 河北时代电子有限公司 | A kind of trade order flow system and method based on block chain technology |
CN110457955A (en) * | 2019-08-08 | 2019-11-15 | 北京芯际科技有限公司 | A kind of big data processing method based on block chain |
CN110838064A (en) * | 2019-10-12 | 2020-02-25 | 华中科技大学 | Method and system for realizing asset tracing based on Fabric Block Link platform |
-
2020
- 2020-03-28 CN CN202010232727.8A patent/CN111415157A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018032372A1 (en) * | 2016-08-13 | 2018-02-22 | 深圳市樊溪电子有限公司 | Trusted power grid transaction platform based on block chain technology |
CN108256875A (en) * | 2018-04-09 | 2018-07-06 | 王先笨 | A kind of safe traceability system based on product supply chain |
CN108650328A (en) * | 2018-05-22 | 2018-10-12 | 河海大学常州校区 | The block catenary system of data information record and storage in a kind of cloud service platform |
CN108985790A (en) * | 2018-06-25 | 2018-12-11 | 平安科技(深圳)有限公司 | Method for anti-counterfeit, system, computer equipment and storage medium based on block chain |
CN110335149A (en) * | 2019-06-19 | 2019-10-15 | 华中科技大学 | A kind of assets based on block chain really weigh transaction realization method and system |
CN110414936A (en) * | 2019-07-30 | 2019-11-05 | 河北时代电子有限公司 | A kind of trade order flow system and method based on block chain technology |
CN110457955A (en) * | 2019-08-08 | 2019-11-15 | 北京芯际科技有限公司 | A kind of big data processing method based on block chain |
CN110838064A (en) * | 2019-10-12 | 2020-02-25 | 华中科技大学 | Method and system for realizing asset tracing based on Fabric Block Link platform |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11604894B2 (en) | 2020-07-24 | 2023-03-14 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, devices, and media |
US11362815B2 (en) | 2020-08-28 | 2022-06-14 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted data transmission methods, apparatuses, and devices |
US11652879B2 (en) | 2020-08-28 | 2023-05-16 | Alipay (Hangzhou) Information Technology Co., Ltd. | Matching methods, apparatuses, and devices based on trusted asset data |
US11614929B2 (en) | 2020-08-28 | 2023-03-28 | Alipay (Hangzhou) Information Technology Co., Ltd. | Identity registration methods, apparatuses, and devices |
US11354447B2 (en) | 2020-08-28 | 2022-06-07 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data authorization information acquisition methods, apparatuses, and devices |
US11455417B2 (en) | 2020-09-04 | 2022-09-27 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, and devices |
US11341284B2 (en) | 2020-09-04 | 2022-05-24 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted hardware-based data management methods, apparatuses, and devices |
US11386191B2 (en) | 2020-09-15 | 2022-07-12 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted hardware-based identity management methods, apparatuses, and devices |
CN111931238A (en) * | 2020-09-15 | 2020-11-13 | 支付宝(杭州)信息技术有限公司 | Block chain-based data asset transfer method, device and equipment |
US11494511B2 (en) | 2020-09-15 | 2022-11-08 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, and devices |
CN113255005A (en) * | 2020-09-15 | 2021-08-13 | 支付宝(杭州)信息技术有限公司 | Block chain-based data asset transfer method, device and equipment |
CN111931238B (en) * | 2020-09-15 | 2021-05-04 | 支付宝(杭州)信息技术有限公司 | Block chain-based data asset transfer method, device and equipment |
US11726968B2 (en) | 2020-09-15 | 2023-08-15 | Alipay (Hangzhou) Information Technology Co., Ltd. | Methods, apparatuses, and devices for transferring data assets based on blockchain |
WO2022083490A1 (en) * | 2020-10-23 | 2022-04-28 | 国网福建省电力有限公司 | Blockchain-based data product trusted transaction method |
CN112634058A (en) * | 2020-12-22 | 2021-04-09 | 无锡井通网络科技有限公司 | Data mutual trust and mutual sharing and intercommunication platform based on block chain |
CN114884674A (en) * | 2022-04-29 | 2022-08-09 | 蚂蚁区块链科技(上海)有限公司 | Block chain-based user data transfer method, device and equipment |
CN114884674B (en) * | 2022-04-29 | 2024-01-23 | 蚂蚁区块链科技(上海)有限公司 | User data circulation method, device and equipment based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111415157A (en) | Block chain-based data asset safety circulation method | |
CN109409122B (en) | File storage method, electronic device and storage medium | |
CN109889504B (en) | Decentralized data access right transaction method and system | |
US20230299938A9 (en) | System for privacy protection during iot secure data sharing and method thereof | |
CN110288480B (en) | Private transaction method and device for blockchain | |
CN101981889B (en) | Secure communications in computer cluster systems | |
CN110032545A (en) | File memory method, system and electronic equipment based on block chain | |
CN111324881B (en) | Data security sharing system and method fusing Kerberos authentication server and block chain | |
CN114499895B (en) | Data trusted processing method and system fusing trusted computing and block chain | |
CN109450843B (en) | SSL certificate management method and system based on block chain | |
Zhong et al. | Distributed blockchain-based authentication and authorization protocol for smart grid | |
CN111538784B (en) | Digital asset transaction method, device and storage medium based on blockchain | |
CN110855428A (en) | Movie copyright protection method based on block chain | |
CN113779607A (en) | Industrial data asset management method, system and equipment | |
CN114329529A (en) | Asset data management method and system based on block chain | |
CN114244527A (en) | Block chain-based power Internet of things equipment identity authentication method and system | |
CN111352999A (en) | National data circulation and data right confirming method and platform based on block chain | |
Cao et al. | A design of key distribution mechanism in decentralized digital rights management based on blockchain and zero-knowledge proof | |
BR112020025811A2 (en) | block chain arrangement with restricted transaction | |
Wang et al. | Housing rental scheme based on redactable blockchain | |
CN117376026A (en) | Internet of things equipment identity authentication method and system | |
Zhang et al. | High-speed railway environmental monitoring data identity authentication scheme based on consortium blockchain | |
CN115840683B (en) | Heterogeneous alliance chain monitoring method, system, device, equipment and storage medium | |
CN117094825A (en) | Cross-chain trusted land transaction system and method based on blockchain | |
CN117056984A (en) | Method, system, computer equipment and storage medium for data security calculation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200714 |
|
RJ01 | Rejection of invention patent application after publication |