CN111415157A - Block chain-based data asset safety circulation method - Google Patents

Block chain-based data asset safety circulation method Download PDF

Info

Publication number
CN111415157A
CN111415157A CN202010232727.8A CN202010232727A CN111415157A CN 111415157 A CN111415157 A CN 111415157A CN 202010232727 A CN202010232727 A CN 202010232727A CN 111415157 A CN111415157 A CN 111415157A
Authority
CN
China
Prior art keywords
data
block chain
circulation
information
layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010232727.8A
Other languages
Chinese (zh)
Inventor
王明月
王涛
朱国辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guiyang Big Data Exchange Co ltd
Original Assignee
Guiyang Big Data Exchange Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guiyang Big Data Exchange Co ltd filed Critical Guiyang Big Data Exchange Co ltd
Priority to CN202010232727.8A priority Critical patent/CN111415157A/en
Publication of CN111415157A publication Critical patent/CN111415157A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a block chain-based data asset safety circulation method, and particularly relates to the technical field of data resource transaction, wherein the method comprises the following steps: the data supplier records the data ownership information to the block chain; and a second process: generating a data right identification in the block chain and transmitting the data right identification to a data supplier; and a third process: the data demander records the information of the required data to the block chain; and (4) a fourth process: recording data circulation information to a block chain in a data circulation process; and a fifth process: the whole data circulation process is monitored by the data management and control module, the monitoring result is recorded in the block chain, and a data demand party can perform source tracing query according to the data identification. According to the invention, the right information of the data, the description information of the data and the circulation information of the data are respectively recorded in the block chain, so that the transaction tracing is realized, the data source can be checked, and the safety and the privacy of data circulation are ensured.

Description

Block chain-based data asset safety circulation method
Technical Field
The invention relates to the technical field of data resource transaction, in particular to a safe data asset circulation method based on a block chain.
Background
Data distribution refers to the behavior of data as an object between a data provider and a data consumer according to a certain distribution rule. In this case, the data is separated from the original usage scenario, and the usage purpose is changed. With the gradually accepted resource value of data and the increasingly complete structure of big data industry chain, the demand of data circulation in China is increasingly urgent. Data circulation enables data to be transferred from a data generation end to a data application end no matter sharing or trading, resource allocation is optimized, and the data circulation becomes an important link for releasing data value. Data circulation in China, particularly data circulation in the transaction industry, still faces serious problems, such as extremely outstanding data privacy protection problem, accurate definition of data right problem, lack of unified consensus in standards of all links of data circulation, rampant data transaction and the like.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention records the right information of the data, the description information of the data and the circulation information of the data to the block chain respectively, thereby realizing transaction tracing and ensuring the data source to be searchable, thereby ensuring the safety and the privacy of data circulation.
The invention relates to a block chain-based data asset safety circulation method, which comprises the following flows:
the first process is as follows: the data supplier records the data ownership information to the block chain, encrypts the data ownership information to obtain a private key signature and creates an intelligent contract;
and a second process: generating a data right identification in the block chain and transmitting the data right identification to a data supplier;
and a third process: the data demand side records the information of the required data to a block chain, fills in a contract for applying for using the data and acquires a secret key;
and (4) a fourth process: the data supplier verifies the request of the data demander, if the verification is successful, the data demander can use the data, if the verification is unsuccessful, the data demander cannot use the data, and data circulation information is recorded to the block chain in the data circulation process;
and a fifth process: the whole process of the first process, the second process, the third process and the fourth process is monitored by the data control module, and the monitoring result is recorded in the block chain, so that the data demand side can perform source tracing query according to the data identification.
Further, the data right information generates a hash value of the data right through a hash algorithm, and the hash value of the data right is stored on the block chain.
Further, the validation token for the blockchain includes a digital certificate record number, data description information, a data digest, and a data provider digital signature.
Furthermore, the data supplier and the data demander are self-growing nodes, and both the data supplier and the data demander keep a set of independent data accounts, and the data of each client is consistent.
Further, the logic layer of the circulation method is divided into a circulation layer, a block layer, a consensus layer and a network layer;
the circulation layer encrypts and transmits the data assets and is mainly used for determining data rights, recording data circulation information and monitoring transaction traceability;
the block layer adopts a block chain structure, asymmetric encryption and a model based on transaction to continuously track each data of transaction data;
the consensus layer adopts a consensus algorithm to encrypt and decrypt data, so that a data demand party and a data supply party achieve consensus;
the network layer encapsulates a CA authentication mechanism, a peer-to-peer network mechanism and a distributed networking mechanism, identity authentication and access control are carried out on data users, all the data users can form peer-to-peer network nodes, and the stability and the safety of the operation of the whole system cannot be influenced by the invalidation, exit and addition of a plurality of nodes in the system and even the existence of malicious nodes.
Further, the circulation information includes information of a data supplier and a data demander
The invention has the beneficial effects that: the invention discloses a data asset safety circulation method based on a block chain, which can improve the key problems of data circulation such as data asset registration, data traceability and the like through the block chain technology, and the characteristics of openness, autonomy and decentralization of the block chain technology are suitable for data transaction traceability.
Drawings
The invention is further described below with reference to the following figures and examples:
FIG. 1 is a schematic illustration of a data asset circulation flow diagram;
FIG. 2 is a diagram of a data flow logical layer analysis.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention relates to a block chain-based data asset safety circulation method, which comprises the following flows:
the first process is as follows: the data supplier records the data ownership information to the block chain, encrypts the data ownership information to obtain a private key signature and creates an intelligent contract;
and a second process: generating a data right identification in the block chain and transmitting the data right identification to a data supplier;
and a third process: the data demand side records the information of the required data to a block chain, fills in a contract for applying for using the data and acquires a secret key;
and (4) a fourth process: the data supplier verifies the request of the data demander, if the verification is successful, the data demander can use the data, if the verification is unsuccessful, the data demander cannot use the data, and data circulation information is recorded to the block chain in the data circulation process;
and a fifth process: the whole process of the first process, the second process, the third process and the fourth process is monitored by the data control module, and the monitoring result is recorded in the block chain, so that the data demand side can perform source tracing query according to the data identification.
According to the invention, ownership information, description information and circulation information of data in data asset circulation are respectively recorded in the block chain, real-time monitoring is carried out on the whole process of data asset circulation, and all information of data transaction is linked, so that transaction tracing is realized, the data source is searchable, and the safety and privacy of data circulation are ensured.
In this embodiment of the present application, the data right information generates a hash value of the data right through a hash algorithm, and the hash value of the data right is stored on the block chain.
In an embodiment of the present application, the validation token of the blockchain includes a digital certificate record number, data description information, a data digest, and a data provider digital signature.
In the embodiment of the application, the data supplier and the data demander are self-growing nodes, and both maintain a set of independent data accounts, and the data of each client is consistent.
In the embodiment of the application, the logic layer of the circulation method is divided into a circulation layer, a block layer, a consensus layer and a network layer;
the circulation layer is used for encrypting and transmitting data assets and is mainly used for determining data rights, recording data circulation information and monitoring transaction traceability, and a data provider is used for encrypting and transmitting own data more easily and conveniently realizing the right-determining management of the data by relying on a network layer, a consensus layer and a block layer compared with a traditional data circulation platform. The data circulation platform faces the encrypted data, so that self-verification clearing is easier, and the flooding copying of the circulating data is avoided. By means of the traceability function of the block chain system, the data owner can track the current circulation situation of the data, authorization verification of the data owner is required for each use of the data, autonomous control over owned data by a data provider is achieved, the data demander can trace the source of the data, authenticity of data analysis is guaranteed, and accuracy and effectiveness of the data analysis are improved;
the block layer adopts a block chain structure, asymmetric encryption and a transaction-based model to continuously track each data of transaction data, adopts a compound accounting method model different from a common commercial bank, namely a transaction-based model, namely a unspent transaction output (UTXO) model, and is more suitable for the control and tracing of data transaction. Besides, the historical transaction information buckled by the ring is realized through a block chain type data structure, and the encryption and decryption of a public key and a private key are realized through an asymmetric cryptography technology, so that the operations of data authentication, data chain linking and the like before data transaction are facilitated;
the consensus layer adopts a consensus algorithm to encrypt and decrypt data, so that a data demand party and a data supply party achieve consensus;
the network layer encapsulates a CA authentication mechanism, a peer-to-peer network mechanism and a distributed networking mechanism, identity authentication and access control are carried out on data users, all the data users can form peer-to-peer network nodes, the stability and the safety of the operation of the whole system cannot be influenced by the invalidation, exit and addition of a plurality of nodes in the system and even the existence of malicious nodes, and the network layer is deployed in a mode of a permission chain. In the aspect of identity authentication, an industry-class or regional-class electronic commerce authentication and authorization mechanism is used for identity authentication and access control. The whole network is a peer-to-peer network, and the failure, exit and join of a plurality of nodes in the system, even the existence of malicious nodes, can not influence the stability and the safety of the operation of the whole system.
In the embodiment of the application, the circulation information comprises information of a data supplier and a data demander, so that data tracing is facilitated.
Finally, the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made to the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention, and all of them should be covered in the claims of the present invention.

Claims (6)

1. A safe circulation method of data assets based on a block chain is characterized in that the circulation method flow comprises the following steps:
the first process is as follows: the data supplier records the data ownership information to the block chain, encrypts the data ownership information to obtain a private key signature and creates an intelligent contract;
and a second process: generating a data right identification in the block chain and transmitting the data right identification to a data supplier;
and a third process: the data demand side records the information of the required data to a block chain, fills in a contract for applying for using the data and acquires a secret key;
and (4) a fourth process: the data supplier verifies the request of the data demander, if the verification is successful, the data demander can use the data, if the verification is unsuccessful, the data demander cannot use the data, and data circulation information is recorded to the block chain in the data circulation process;
and a fifth process: the whole process of the first process, the second process, the third process and the fourth process is monitored by the data control module, and the monitoring result is recorded in the block chain, so that the data demand side can perform source tracing query according to the data identification.
2. The block chain-based data asset secure circulation method according to claim 1, characterized in that: and the data right information generates a hash value of the data right through a hash algorithm, and the hash value of the data right is stored on the block chain.
3. The block chain-based data asset secure circulation method according to claim 1, characterized in that: the validation token for the blockchain includes a digital certificate record number, data description information, a data digest, and a data provider digital signature.
4. The block chain-based data asset secure circulation method according to claim 1, characterized in that: the data supplier and the data demander are self-growing nodes, and both the data supplier and the data demander keep a set of independent data accounts, and the data of each client is consistent.
5. The block chain-based data asset secure circulation method according to claim 1, characterized in that: the logic layer of the circulation method is divided into a circulation layer, a block layer, a consensus layer and a network layer;
the circulation layer encrypts and transmits the data assets and is mainly used for determining data rights, recording data circulation information and monitoring transaction traceability;
the block layer adopts a block chain structure, asymmetric encryption and a model based on transaction to continuously track each data of transaction data;
the consensus layer adopts a consensus algorithm to encrypt and decrypt data, so that a data demand party and a data supply party achieve consensus;
the network layer encapsulates a CA authentication mechanism, a peer-to-peer network mechanism and a distributed networking mechanism, identity authentication and access control are carried out on data users, all the data users can form peer-to-peer network nodes, and the stability and the safety of the operation of the whole system cannot be influenced by the invalidation, exit and addition of a plurality of nodes in the system and even the existence of malicious nodes.
6. The block chain-based data asset secure circulation method according to claim 1, characterized in that: the circulation information includes information of a data supplier and a data demander.
CN202010232727.8A 2020-03-28 2020-03-28 Block chain-based data asset safety circulation method Pending CN111415157A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010232727.8A CN111415157A (en) 2020-03-28 2020-03-28 Block chain-based data asset safety circulation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010232727.8A CN111415157A (en) 2020-03-28 2020-03-28 Block chain-based data asset safety circulation method

Publications (1)

Publication Number Publication Date
CN111415157A true CN111415157A (en) 2020-07-14

Family

ID=71491502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010232727.8A Pending CN111415157A (en) 2020-03-28 2020-03-28 Block chain-based data asset safety circulation method

Country Status (1)

Country Link
CN (1) CN111415157A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111931238A (en) * 2020-09-15 2020-11-13 支付宝(杭州)信息技术有限公司 Block chain-based data asset transfer method, device and equipment
CN112634058A (en) * 2020-12-22 2021-04-09 无锡井通网络科技有限公司 Data mutual trust and mutual sharing and intercommunication platform based on block chain
WO2022083490A1 (en) * 2020-10-23 2022-04-28 国网福建省电力有限公司 Blockchain-based data product trusted transaction method
US11341284B2 (en) 2020-09-04 2022-05-24 Alipay (Hangzhou) Information Technology Co., Ltd. Trusted hardware-based data management methods, apparatuses, and devices
US11354447B2 (en) 2020-08-28 2022-06-07 Alipay (Hangzhou) Information Technology Co., Ltd. Data authorization information acquisition methods, apparatuses, and devices
US11362815B2 (en) 2020-08-28 2022-06-14 Alipay (Hangzhou) Information Technology Co., Ltd. Trusted data transmission methods, apparatuses, and devices
US11386191B2 (en) 2020-09-15 2022-07-12 Alipay (Hangzhou) Information Technology Co., Ltd. Trusted hardware-based identity management methods, apparatuses, and devices
CN114884674A (en) * 2022-04-29 2022-08-09 蚂蚁区块链科技(上海)有限公司 Block chain-based user data transfer method, device and equipment
US11455417B2 (en) 2020-09-04 2022-09-27 Alipay (Hangzhou) Information Technology Co., Ltd. Data processing methods, apparatuses, and devices
US11494511B2 (en) 2020-09-15 2022-11-08 Alipay (Hangzhou) Information Technology Co., Ltd. Data processing methods, apparatuses, and devices
US11604894B2 (en) 2020-07-24 2023-03-14 Alipay (Hangzhou) Information Technology Co., Ltd. Data processing methods, apparatuses, devices, and media
US11614929B2 (en) 2020-08-28 2023-03-28 Alipay (Hangzhou) Information Technology Co., Ltd. Identity registration methods, apparatuses, and devices
US11652879B2 (en) 2020-08-28 2023-05-16 Alipay (Hangzhou) Information Technology Co., Ltd. Matching methods, apparatuses, and devices based on trusted asset data

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018032372A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Trusted power grid transaction platform based on block chain technology
CN108256875A (en) * 2018-04-09 2018-07-06 王先笨 A kind of safe traceability system based on product supply chain
CN108650328A (en) * 2018-05-22 2018-10-12 河海大学常州校区 The block catenary system of data information record and storage in a kind of cloud service platform
CN108985790A (en) * 2018-06-25 2018-12-11 平安科技(深圳)有限公司 Method for anti-counterfeit, system, computer equipment and storage medium based on block chain
CN110335149A (en) * 2019-06-19 2019-10-15 华中科技大学 A kind of assets based on block chain really weigh transaction realization method and system
CN110414936A (en) * 2019-07-30 2019-11-05 河北时代电子有限公司 A kind of trade order flow system and method based on block chain technology
CN110457955A (en) * 2019-08-08 2019-11-15 北京芯际科技有限公司 A kind of big data processing method based on block chain
CN110838064A (en) * 2019-10-12 2020-02-25 华中科技大学 Method and system for realizing asset tracing based on Fabric Block Link platform

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018032372A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Trusted power grid transaction platform based on block chain technology
CN108256875A (en) * 2018-04-09 2018-07-06 王先笨 A kind of safe traceability system based on product supply chain
CN108650328A (en) * 2018-05-22 2018-10-12 河海大学常州校区 The block catenary system of data information record and storage in a kind of cloud service platform
CN108985790A (en) * 2018-06-25 2018-12-11 平安科技(深圳)有限公司 Method for anti-counterfeit, system, computer equipment and storage medium based on block chain
CN110335149A (en) * 2019-06-19 2019-10-15 华中科技大学 A kind of assets based on block chain really weigh transaction realization method and system
CN110414936A (en) * 2019-07-30 2019-11-05 河北时代电子有限公司 A kind of trade order flow system and method based on block chain technology
CN110457955A (en) * 2019-08-08 2019-11-15 北京芯际科技有限公司 A kind of big data processing method based on block chain
CN110838064A (en) * 2019-10-12 2020-02-25 华中科技大学 Method and system for realizing asset tracing based on Fabric Block Link platform

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11604894B2 (en) 2020-07-24 2023-03-14 Alipay (Hangzhou) Information Technology Co., Ltd. Data processing methods, apparatuses, devices, and media
US11362815B2 (en) 2020-08-28 2022-06-14 Alipay (Hangzhou) Information Technology Co., Ltd. Trusted data transmission methods, apparatuses, and devices
US11652879B2 (en) 2020-08-28 2023-05-16 Alipay (Hangzhou) Information Technology Co., Ltd. Matching methods, apparatuses, and devices based on trusted asset data
US11614929B2 (en) 2020-08-28 2023-03-28 Alipay (Hangzhou) Information Technology Co., Ltd. Identity registration methods, apparatuses, and devices
US11354447B2 (en) 2020-08-28 2022-06-07 Alipay (Hangzhou) Information Technology Co., Ltd. Data authorization information acquisition methods, apparatuses, and devices
US11455417B2 (en) 2020-09-04 2022-09-27 Alipay (Hangzhou) Information Technology Co., Ltd. Data processing methods, apparatuses, and devices
US11341284B2 (en) 2020-09-04 2022-05-24 Alipay (Hangzhou) Information Technology Co., Ltd. Trusted hardware-based data management methods, apparatuses, and devices
US11386191B2 (en) 2020-09-15 2022-07-12 Alipay (Hangzhou) Information Technology Co., Ltd. Trusted hardware-based identity management methods, apparatuses, and devices
CN111931238A (en) * 2020-09-15 2020-11-13 支付宝(杭州)信息技术有限公司 Block chain-based data asset transfer method, device and equipment
US11494511B2 (en) 2020-09-15 2022-11-08 Alipay (Hangzhou) Information Technology Co., Ltd. Data processing methods, apparatuses, and devices
CN113255005A (en) * 2020-09-15 2021-08-13 支付宝(杭州)信息技术有限公司 Block chain-based data asset transfer method, device and equipment
CN111931238B (en) * 2020-09-15 2021-05-04 支付宝(杭州)信息技术有限公司 Block chain-based data asset transfer method, device and equipment
US11726968B2 (en) 2020-09-15 2023-08-15 Alipay (Hangzhou) Information Technology Co., Ltd. Methods, apparatuses, and devices for transferring data assets based on blockchain
WO2022083490A1 (en) * 2020-10-23 2022-04-28 国网福建省电力有限公司 Blockchain-based data product trusted transaction method
CN112634058A (en) * 2020-12-22 2021-04-09 无锡井通网络科技有限公司 Data mutual trust and mutual sharing and intercommunication platform based on block chain
CN114884674A (en) * 2022-04-29 2022-08-09 蚂蚁区块链科技(上海)有限公司 Block chain-based user data transfer method, device and equipment
CN114884674B (en) * 2022-04-29 2024-01-23 蚂蚁区块链科技(上海)有限公司 User data circulation method, device and equipment based on block chain

Similar Documents

Publication Publication Date Title
CN111415157A (en) Block chain-based data asset safety circulation method
CN109409122B (en) File storage method, electronic device and storage medium
CN109889504B (en) Decentralized data access right transaction method and system
US20230299938A9 (en) System for privacy protection during iot secure data sharing and method thereof
CN110288480B (en) Private transaction method and device for blockchain
CN101981889B (en) Secure communications in computer cluster systems
CN110032545A (en) File memory method, system and electronic equipment based on block chain
CN111324881B (en) Data security sharing system and method fusing Kerberos authentication server and block chain
CN114499895B (en) Data trusted processing method and system fusing trusted computing and block chain
CN109450843B (en) SSL certificate management method and system based on block chain
Zhong et al. Distributed blockchain-based authentication and authorization protocol for smart grid
CN111538784B (en) Digital asset transaction method, device and storage medium based on blockchain
CN110855428A (en) Movie copyright protection method based on block chain
CN113779607A (en) Industrial data asset management method, system and equipment
CN114329529A (en) Asset data management method and system based on block chain
CN114244527A (en) Block chain-based power Internet of things equipment identity authentication method and system
CN111352999A (en) National data circulation and data right confirming method and platform based on block chain
Cao et al. A design of key distribution mechanism in decentralized digital rights management based on blockchain and zero-knowledge proof
BR112020025811A2 (en) block chain arrangement with restricted transaction
Wang et al. Housing rental scheme based on redactable blockchain
CN117376026A (en) Internet of things equipment identity authentication method and system
Zhang et al. High-speed railway environmental monitoring data identity authentication scheme based on consortium blockchain
CN115840683B (en) Heterogeneous alliance chain monitoring method, system, device, equipment and storage medium
CN117094825A (en) Cross-chain trusted land transaction system and method based on blockchain
CN117056984A (en) Method, system, computer equipment and storage medium for data security calculation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200714

RJ01 Rejection of invention patent application after publication