CN114022161A - Independent source tracing system, method and device for original recording data of LIMS (laser induced mass spectrometry) system based on block chain and storage medium - Google Patents

Independent source tracing system, method and device for original recording data of LIMS (laser induced mass spectrometry) system based on block chain and storage medium Download PDF

Info

Publication number
CN114022161A
CN114022161A CN202111231949.9A CN202111231949A CN114022161A CN 114022161 A CN114022161 A CN 114022161A CN 202111231949 A CN202111231949 A CN 202111231949A CN 114022161 A CN114022161 A CN 114022161A
Authority
CN
China
Prior art keywords
data
tracing
authorization
module
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111231949.9A
Other languages
Chinese (zh)
Inventor
张罗一览
童小兵
袁秋红
叱干勇
赖阳洲
冉榭然夫
张晓风
张英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Qingze Water Quality Testing Co ltd
Original Assignee
Chongqing Qingze Water Quality Testing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Qingze Water Quality Testing Co ltd filed Critical Chongqing Qingze Water Quality Testing Co ltd
Priority to CN202111231949.9A priority Critical patent/CN114022161A/en
Publication of CN114022161A publication Critical patent/CN114022161A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain-based independent traceability system, a method and a device for primary record data of an LIMS (laser-induced mechanical shock spectroscopy) system and a storage medium. The method is realized based on a C/S architecture, the normal operation of an LIMS system is not influenced, the original record data is collected, stored and traced without manual intervention, safety and credibility guarantee is provided for tracing the original record data through the decentralization and difficult tampering of a block chain technology, the possibility of manually modifying the data by workers is reduced, and the final detection result data is guaranteed to be real and credible; meanwhile, the invention can be used for auditing the original record data stored in the LIMS system to judge whether the original record data stored in the LIMS system is falsified or not, thereby improving the data quality of the whole LIMS system and providing powerful support for the high quality and stability of the detection service of the whole laboratory.

Description

Independent source tracing system, method and device for original recording data of LIMS (laser induced mass spectrometry) system based on block chain and storage medium
Technical Field
The invention relates to the technical field of experimental data processing, in particular to a block chain-based independent traceability system, method and device for original recorded data of an LIMS (laser induced mass spectrometry) system and a storage medium.
Background
The LIMS (Laboratory Information Management System) System for Laboratory testing is widely applied to the fields of food testing, agricultural product testing, water quality testing, air testing and the like, and the most important for Laboratory testing is the authority and the credibility of test result data, the test result data is obtained by calculating test records obtained by testing through testing equipment, and the test records output by the testing equipment are generally called as original record data of testing. Therefore, how to realize traceability of the detected original recorded data so as to enable the detection result data to be true and credible is a very important topic.
At present, laboratory detection equipment is mainly divided into two types, namely a data acquisition interface and a non-data acquisition interface. Aiming at original recording data detected by detection equipment without a data acquisition interface, the original recording data can only be recorded into an LIMS (laser induced mechanical Spectroscopy) system in a manual recording mode at present; for a detection device with a data acquisition interface, an LIMS system may directly acquire original recording data detected by the detection device through the data acquisition interface of the detection device, but the original recording data of the detection device acquired through the data acquisition interface may be manually tampered in the LIMS system or a data storage layer, so that the original recording data stored in the LISM system is unreliable.
Therefore, how to realize traceability of original recorded data directly acquired through a data acquisition interface of detection equipment so as to guarantee authenticity and credibility of final detection result data is a problem to be solved urgently at present.
Disclosure of Invention
Aiming at the problem of low reliability of original recorded data directly acquired through interfaces of detection equipment and instruments, the invention particularly provides an independent tracing system, method, device and storage medium for original recorded data of an LIMS (laser induced mechanical verification) system based on a block chain, which can be used for directly acquiring and tracing the original recorded data through a data acquisition interface of the detection equipment independently of the LIMS system, so that the final detection result data is guaranteed to be real and reliable.
In order to achieve the above object, according to a first aspect of the present invention, the present invention provides a block chain-based LIMS system raw record data independent tracing system, where the independent tracing system is independent of the LIMS system, the independent tracing system includes a tracing server and at least one collection client, and the at least one collection client is in communication connection with the tracing server, where,
the tracing server is used for configuring a data acquisition rule and a data verification rule matched with the detection equipment and synchronizing the configured data acquisition rule and the configured data verification rule to the acquisition client;
the acquisition client is used for acquiring original record data detected by the detection equipment from the detection equipment through a data acquisition interface of the detection equipment according to the data acquisition rule, verifying the acquired original record data according to the data verification rule, performing data safety processing on the verified original record data to form a communication message, sending the communication message to the source tracing server, and storing the communication message;
the tracing server is further used for decrypting and carrying out safety verification processing on the communication message sent by the acquisition client, verifying whether the message data of the communication message passing the safety verification accords with the data verification rule again based on the data verification rule, analyzing the message data of the communication message conforming to the data verification rule to obtain original recorded data and data with high timeliness requirements, carrying out body storage on the analyzed data with high timeliness requirements, and packaging the analyzed original recorded data into block data for storage based on a block chain technology;
the source tracing server is further used for receiving source tracing query information, searching corresponding original record data in the stored block data according to the source tracing query information, and processing the original record data obtained through query into a source tracing query result matched with the source tracing query information for display.
Preferably, the tracing server is further configured to configure authentication authorization credential information according to the multidimensional information, where the authentication authorization credential information is used to verify a registration request and a data interaction request sent by the acquisition client, and the authentication authorization credential information includes an authentication License, a first authorization License, and authorization information;
the tracing server is further configured to store the authentication authorization credential information, and synchronize authentication License and authorization information in the authentication authorization credential information to the acquisition client, where the acquisition client carries the authentication License and the authorization information in the registration request and the data interaction request sent to the tracing server;
the tracing server is further configured to register the acquisition client based on the authentication License and the authorization information carried in the registration request, and authorize the acquisition client based on the authentication License and the authorization information carried in the data interaction request.
Preferably, the registering, by the tracing server, the collecting client based on the authentication License and the authorization information carried in the registration request includes:
the tracing server calculates a second authorization License based on the authentication License and authorization information carried in the registration request, and if the second authorization License is matched with the first authorization License, the tracing server judges that the registration request is a legal request and registers the acquisition client according to the judgment result;
the authorization of the tracing server to the acquisition client based on the authentication License and the authorization information carried in the data interaction request comprises:
and the tracing server calculates a third authorization License based on the authentication License and the authorization information carried in the data interaction request, and if the third authorization License is matched with the first authorization License, the tracing server judges that the data interaction request is a legal request and authorizes the acquisition client according to the judgment result.
Preferably, the tracing server includes a first authentication and authorization module, a tracing management module, a tracing analysis module, a collection rule module, a first data security module, a verification rule module, a consensus accounting module, a block ledger module and a first data storage module, wherein,
the first authentication and authorization module is used for configuring the authentication and authorization voucher information, storing the authentication and authorization voucher information, synchronizing authentication License and authorization information in the authentication and authorization voucher information to the acquisition client, and verifying a registration request and a data interaction request sent by the acquisition client based on the authentication and authorization voucher information;
the source tracing management module is used for receiving source tracing query information and displaying a source tracing query result obtained after the source tracing analysis module processes original record data according to a preset display form;
the source tracing analysis module is used for searching corresponding original record data in the stored block data according to the source tracing query information, analyzing and calculating the original record data obtained by query to generate a source tracing query result matched with the source tracing query information, and sending the source tracing query result to the source tracing management module;
the acquisition rule module is used for configuring and verifying a data acquisition rule matched with the detection equipment and synchronizing data acquisition rule configuration data to the acquisition client;
the first data security module is used for decrypting and carrying out security verification processing on the communication message sent by the acquisition client, and encrypting and signing data sent to the acquisition client by the tracing server;
the verification rule module is used for configuring a data verification rule matched with the detection equipment, synchronizing data configured by the data verification rule to the acquisition client and verifying whether the communication message passing the safety verification conforms to the data verification rule;
the consensus accounting module is used for analyzing the communication message which accords with the data verification rule to obtain original recorded data and data with high timeliness requirements, packaging the analyzed original recorded data into block data based on a block chain technology, sending the block data to the block book module for storage, and sending the data with high timeliness requirements to the first data storage module for storage;
the block book module is used for storing the block data sent by the consensus accounting module so as to provide source tracing of original recorded data;
the first data storage module is used for storing various tracing service data which are used for tracing the original record and comprise the data with high timeliness requirement.
Preferably, the collection client comprises a second authentication and authorization module, a collection rule setting module, a verification rule setting module, an original record data collection module, a second data security module, a data processing module and a second data storage module, wherein,
the second authentication and authorization module is used for receiving and storing the authentication License and the authorization information synchronized by the tracing server, and enabling the registration request and the data interaction request initiated by the acquisition client to the tracing server to carry the authentication License and the authorization information;
the collection rule setting module is used for receiving data collection rule configuration data synchronized by a collection rule module of the tracing server, sending the data collection rule configuration data to the second data security module for security verification, and sending the data collection rule configuration data passing the security verification to the second data storage module for storage, wherein the data collection rule configuration data received by the collection rule setting module cannot be changed;
the verification rule setting module is used for receiving data verification rule configuration data synchronized by a verification rule module of the tracing server, sending the data verification rule configuration data to the second data security module for security verification, and sending the data verification rule configuration data passing the security verification to the second data storage module for storage, wherein the data verification rule configuration data received by the verification rule setting module cannot be changed;
the original record data acquisition module is used for acquiring original record data detected by the detection equipment from the detection equipment through a data acquisition interface of the detection equipment according to the data acquisition rule, verifying the acquired original record data according to the data verification rule and sending the verified original record data to the data processing module for data processing;
the second data security module is used for encrypting, signing and data packaging the acquired and verified original recording data and carrying out security verification on the data from the tracing server;
the data processing module is used for calling the second data security module to encrypt, sign and package original recorded data to form a communication message which can be identified by the tracing server and sending the communication message to the tracing server;
the second data storage module is used for storing data acquisition rule configuration data, data verification rule configuration data and original record data acquired by the original record data acquisition module.
In order to achieve the above object, according to a second aspect of the present invention, the present invention provides a method for independent tracing of raw record data of a block chain-based LIMS system, where the method is performed based on any one of the above first aspects of the present invention, and the method includes the following steps:
the tracing server configures data acquisition rules and data verification rules for the detection equipment needing tracing;
the tracing server side synchronizes the data acquisition rule and the data verification rule to the acquisition client side;
the acquisition client acquires and verifies the original record data in the detection equipment according to the data acquisition rule and the data verification rule;
the method comprises the steps that an acquisition client side carries out data security processing on original recorded data passing verification to form a communication message, the communication message is sent to a tracing server side, and the communication message is stored;
the tracing server verifies whether the message data of the communication message passing the safety verification conforms to the data verification rule again according to the data verification rule;
the tracing server analyzes the message data of the communication message which accords with the data verification rule to obtain original record data and data with high timeliness requirement;
the source tracing server stores the data with high timeliness requirement obtained by analysis, and packs the original record data obtained by analysis into block data for storage based on a block chain technology;
and the tracing server receives the tracing query information, searches corresponding original record data in the stored block data according to the tracing query information, and processes the original record data obtained by query into a tracing query result matched with the tracing query information for display.
Preferably, the method further comprises the steps of:
the tracing server configures authentication and authorization certificate information according to the multi-dimensional information, wherein the authentication and authorization certificate information is used for verifying a registration request and a data interaction request sent by a collection client, and the authentication and authorization certificate information comprises authentication License, first authorization License and authorization information;
the tracing server stores the authentication authorization voucher information, and synchronizes the authentication License and the authorization information in the authentication authorization voucher information to the acquisition client, wherein the authentication License and the authorization information are carried in a registration request and a data interaction request sent to the tracing server by the acquisition client;
and the tracing server registers the acquisition client based on the authentication License and the authorization information carried in the registration request, and authorizes the acquisition client based on the authentication License and the authorization information carried in the data interaction request.
Preferably, the registering, by the tracing server, the collecting client based on the authentication License and the authorization information carried in the registration request includes:
the tracing server calculates a second authorization License based on the authentication License and the authorization information carried in the registration request, and if the second authorization License is matched with the first authorization License, the tracing server judges that the registration request is a legal request and registers the acquisition client according to the judgment result;
the authorization of the tracing server to the acquisition client based on the authentication License and the authorization information carried in the data interaction request comprises the following steps:
and the tracing server calculates a third authorization License based on the authentication License and the authorization information carried in the data interaction request, and if the third authorization License is matched with the first authorization License, the tracing server judges that the data interaction request is a legal request and authorizes the acquisition client according to the judgment result.
In order to achieve the above object, according to a third aspect of the present invention, there is provided a block chain-based LIMS system raw record data independent tracing apparatus, including:
a memory for storing a computer program; and
a processor for executing the computer program stored in the memory to execute the steps included in the original record data independent tracing method of the block chain based LIMS system according to any one of the second aspect of the present invention.
In order to achieve the above object, according to a fourth aspect of the present invention, there is provided a computer-readable storage medium storing a computer program, which when executed by one or more computers causes the one or more computers to perform the steps included in the original record data independent tracing method for a block chain based LIMS system according to any one of the above second aspects of the present invention.
According to the technical scheme, the independent source tracing system, method, device and storage medium of the original record data of the LIMS system based on the block chain are realized based on a C/S architecture, the system consists of an acquisition client and a source tracing server, the normal operation of the LIMS system is not influenced because the system is independent of the arrangement of the LIMS system, the original record data are acquired, stored and traced without manual intervention, the safe credibility guarantee is provided for the source tracing of the original record data through the decentralization and difficult tamper modification of the block chain technology, the possibility that a worker manually modifies the data is reduced, and the final detection result data is guaranteed to be real and credible; meanwhile, the invention is combined with a general data storage technology, can be used for tracing the source of the original record data, has universal applicability and operability for all LIMS systems, can be quickly applied to the existing LIMS system for auditing the original record data stored in the LIMS system so as to judge whether the original record data stored in the LIMS system is falsified, and can improve the data quality of the whole LIMS system, thereby improving the quality of a detection report and providing powerful support for the high quality and stability of the detection service of the whole laboratory.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic structural diagram of an independent original record data tracing system of a LIMS system based on a block chain in a preferred embodiment of the present invention;
FIG. 2 is a flowchart of a method for independent tracing of original recorded data of a LIMS system based on a block chain in a preferred embodiment of the present invention;
FIG. 3 is a flow chart of a method for independent tracing of original recorded data of a LIMS system based on block chains according to another preferred embodiment of the present invention;
fig. 4 is a block diagram of an independent original record data tracing apparatus of the LIMS system based on a block chain in a preferred embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
It will be understood by those within the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
As shown in fig. 1, an embodiment of the present invention provides an independent source tracing system for LIMS system raw record data based on a block chain, where the independent source tracing system is independent of the LIMS system (i.e., the independent source tracing system is not coupled to the LIMS system), the independent source tracing system may include a source tracing server and a plurality of acquisition clients, the source tracing server is provided with a first network communication module, each acquisition client is provided with a second network communication module, and the first network communication module of the source tracing server is in communication connection with the second network communication modules of the acquisition clients, so as to implement communication and service data exchange between the source tracing server and the acquisition clients.
Specifically, the first network communication module and the second network communication module may be wired communication modules or wireless communication modules.
Specifically, the tracing server comprises a first authentication authorization module, a tracing management module, a tracing analysis module, a collection rule module, a first data security module, a verification rule module, a consensus accounting module, a block ledger module and a first data storage module.
The first authentication and authorization module is used for configuring authentication and authorization voucher information, the authentication and authorization voucher information is used for verifying a registration request and a data interaction request sent by a collection client, the authentication and authorization voucher information comprises authentication License, first authorization License and authorization information, the authentication and authorization voucher information is stored, the authentication License and the authorization information in the authentication and authorization voucher information are synchronized to the collection client, and the registration request and the data interaction request sent by the collection client are verified based on the authentication and authorization voucher information, wherein the authentication License and the authorization information are carried in the registration request and the data interaction request sent by the collection client to a tracing server.
Specifically, the authentication and authorization credential information is obtained by configuring, by the first authentication and authorization module, multidimensional information such as LIMS system information, detection device information, authorization original record data type information, and the like. The authentication authorization voucher information configured by the tracing server can be inquired in the tracing management module, wherein the authentication License and the authorization information are visible, and the first authorization License is invisible to the user.
Specifically, the registering, by the first authentication and authorization module, the collection client based on the authentication License and the authorization information carried in the registration request includes:
and the first authentication and authorization module calculates a second authorization License based on the authentication License and the authorization information carried in the registration request, and if the second authorization License is matched with the first authorization License, the first authentication and authorization module judges that the registration request is a legal request and registers the acquisition client according to the judgment result. And only the acquisition client which is successfully registered in the first authentication and authorization module can send a data interaction request to the tracing server.
Specifically, the authorizing the acquisition client by the first authentication and authorization module based on the authentication License and the authorization information carried in the data interaction request includes:
the first authentication and authorization module calculates a third authorization License based on the authentication License and the authorization information carried in the data interaction request, and if the third authorization License is matched with the first authorization License, the first authentication and authorization module judges that the data interaction request is a legal request and authorizes the acquisition client according to the judgment result. Only the collection client authorized by the first authentication and authorization module can perform data interaction with the tracing server.
Specifically, in the present embodiment, an asymmetric encryption algorithm may be adopted for calculating and verifying the authorization License.
The source tracing management module is used for receiving the source tracing query information and displaying a source tracing query result obtained after the source tracing analysis module processes the original record data according to a preset display form. Specifically, the traceability management module may have a human-computer interaction interface, and a user may input traceability query information through the human-computer interaction interface, and at the same time, the traceability management module displays the received traceability query result in a preset display form set in a graph or a table. The traceability management module is also a management platform of the whole traceability server, and the traceability management module is used for displaying and configuring authentication and authorization certificate information, security algorithm information, data acquisition rule information, data verification rule information and the like in a form.
The source tracing analysis module is used for searching corresponding original record data in the stored block data according to the source tracing query information, analyzing and calculating the original record data obtained by query to generate a source tracing query result matched with the source tracing query information, and sending the source tracing query result to the source tracing management module.
The acquisition rule module is used for configuring and verifying a data acquisition rule matched with the detection equipment and synchronizing data acquisition rule configuration data to the acquisition client. Specifically, the configuration data acquisition rule generally uses the device number of the detection device as an identifier, and different detection devices adopt different data acquisition rules, where the data acquisition rules include, but are not limited to, the type of data to be acquired (such as file type, image-text type, etc.), the time point or interval of acquisition, the frequency of acquisition, the validity period of acquisition, and the like.
The first data security module is used for decrypting and verifying the communication message sent by the acquisition client, and encrypting and signing the data sent by the tracing server to the acquisition client. Specifically, the decryption and encryption can adopt an asymmetric encryption algorithm, so that the security of data transmission is guaranteed. The data encrypted and signed by the first data security module specifically comprises data verification rule data, data acquisition rule data, authentication authorization credential information data and the like. And the data verified by the first data security module is sent to the verification rule module for data verification, and the data security module is also responsible for the management of related encryption algorithms and keys.
The verification rule module is used for configuring a data verification rule matched with the detection equipment, synchronizing data configured by the data verification rule to the acquisition client, verifying whether the communication message passing the safety verification meets the data verification rule or not, ensuring the availability of the communication message, and sending the communication message passing the verification to the consensus accounting module for processing. Specifically, the configuration data validation rule generally uses the device number of the detection device as an identifier, and different detection devices use different validation rules, which include, but are not limited to, the type of the original recorded data (such as character string, number, integer, limit, etc.), the specification identifier, the number of times, the variance, the standard deviation, etc.
The consensus accounting module is used for analyzing the communication messages meeting the data verification rule to obtain original recorded data and data with high timeliness requirements, packaging the analyzed original recorded data into block data based on a block chain technology, sending the block data to the block book module for storage, sending the data with high timeliness requirements to the first data storage module for storage, and providing data support for the traceability analysis module. In particular, the data type of the data with high timeliness requirements can be specifically configured according to the needs.
The block book module is used for storing the block data sent by the consensus accounting module so as to trace the source of the original recorded data. Specifically, the block book module utilizes the characteristics of the block chain to ensure the availability and the non-tamper property of the data. The block data includes, but is not limited to, a detection value, a detection date, a device number, a collection mode, a collected file Hash value, an encryption algorithm, a data identifier, a detection item, a detection standard value, and the like of the original recorded data. The block book module can be built based on a federation chain, and can be deployed in an intranet by specifically using JDChain, Fabric and other federation chains of Jingdong.
The first data storage module is used for storing various tracing service data used for tracing the original record, including data with high timeliness requirement. Specifically, the tracing service data may further include data to be analyzed by the tracing analysis module, data sent by the verification rule module, data sent by the collection rule module, data sent by the first authentication and authorization module, data sent by the first data security module, and the like. The data storage module can be specifically built based on a relational database, and can use an Oracle database, a MySQL database, a SQL Server database, a DB2 database, a PostgreSQL database, a TiDB database, a Huawei Gauss database, a Dameng database and the like. For data with high requirement on timeliness, a memory or a NoSQL database can be adopted in an auxiliary mode, specifically, Redis, MongoDB, HBase, Cassandra, CouchDB and the like can be used, if files exist, a distributed file system can be used for storage, and FastDFS, MinIO and the like can be used.
Specifically, each acquisition client comprises a second authentication and authorization module, an acquisition rule setting module, a verification rule setting module, an original record data acquisition module, a second data security module, a data processing module and a second data storage module.
The second authentication and authorization module is used for receiving and storing the authentication License and the authorization information synchronized by the tracing server, and enabling the registration request and the data interaction request initiated by the acquisition client to the tracing server to carry the authentication License and the authorization information. Specifically, all communication messages (such as registration requests and data interaction requests) sent by the acquisition client to the tracing server need to be provided with authentication License and authorization information, otherwise, the tracing server rejects the data request of the acquisition client. The second authentication and authorization module is also responsible for sending a registration request to the first authentication and authorization module of the tracing server after the acquisition client is started, and completing the registration of the acquisition client at the tracing server.
The collection rule setting module is used for receiving data collection rule configuration data synchronized by the collection rule module of the tracing server, sending the data collection rule configuration data to the second data security module for security verification, and sending the data collection rule configuration data passing the security verification to the second data storage module for storage, wherein the data collection rule configuration data received by the collection rule setting module cannot be changed.
The verification rule setting module is used for receiving data verification rule configuration data synchronized by the verification rule module of the tracing server, sending the data verification rule configuration data to the second data security module for security verification, and sending the data verification rule configuration data passing the security verification to the second data storage module for storage, wherein the data verification rule configuration data received by the verification rule setting module cannot be changed.
The original record data acquisition module is used for acquiring original record data detected by the detection equipment from the detection equipment through a data acquisition interface of the detection equipment according to a data acquisition rule, verifying the acquired original record data according to a data verification rule and sending the original record data passing the verification to the data processing module for data processing. Specifically, the original recording data includes, but is not limited to, text data, graphics data, audio-video data.
The second data security module is used for encrypting, signing and data packaging the acquired and verified original record data and carrying out security verification on the data from the tracing server. Specifically, the encryption may adopt an asymmetric encryption algorithm, and the encryption and signature algorithms must correspond to the encryption and signature algorithms of the first data security module of the tracing server. The second data security module is also responsible for the management of the associated encryption algorithms and keys.
The data processing module is used for calling the second data security module to encrypt, sign and package the original recorded data to form a communication message which can be identified by the tracing server and then the communication message is sent to the tracing server. Specifically, the transmission of the communication message adopts an HTTPS protocol, and the data format of the communication message adopts a JSON format.
The second data storage module is used for storing the data acquisition rule configuration data, the data verification rule configuration data and the original record data acquired by the original record data acquisition module. Specifically, the second data storage module also stores data sent by the second data security module and data sent by the second authentication and authorization module. The second data storage module is built based on a relational database, and can use an Oracle database, a MySQL database, a SQL Server database, a DB2 database, a PostgreSQL database, a TiDB database, a Huawei Gauss database, a Dameng database and the like. For data with high requirement on timeliness, a memory or a NoSQL database can be adopted as an auxiliary, Redis, MongoDB, HBase, Cassandra, CouchDB and the like can be used, if files exist, a distributed file system can be adopted for storage, and FastDFS, MinIO and the like can be used.
In the embodiment, the independent source tracing system for the primary record data of the LIMS system based on the block chain is realized based on a C/S architecture, and the independent source tracing system is independent of the LIMS system and is not coupled with the LIMS system, so that the normal operation of the LIMS system is not influenced, the primary record data is collected, stored and traced without human intervention, the safe credibility guarantee is provided for the source tracing of the primary record data through the decentralization and difficult tampering of the block chain technology, the possibility of manual data modification by workers is reduced, and the final detection result data is ensured to be true and credible; meanwhile, the invention is combined with a general data storage technology, can be used for tracing the source of the original record data, has universal applicability and operability for all LIMS systems, can be quickly applied to the existing LIMS system for auditing the original record data stored in the LIMS system so as to judge whether the original record data stored in the LIMS system is falsified, and can improve the data quality of the whole LIMS system, thereby improving the quality of a detection report and providing powerful support for the high quality and stability of the detection service of the whole laboratory.
As shown in fig. 2, an embodiment of the present invention further provides a method for independent tracing of original recorded data of an LIMS system based on a blockchain, where the method is performed based on the independent tracing system of original recorded data of the LIMS system based on the blockchain in any of the embodiments of the present invention, and the method may include the following steps:
s1, configuring a data acquisition rule and a data verification rule by the tracing server aiming at the detection equipment needing tracing;
s2, the tracing server side synchronizes the data acquisition rule and the data verification rule to the acquisition client side;
s3, the acquisition client acquires and verifies the original record data in the detection equipment according to the data acquisition rule and the data verification rule;
s4, the acquisition client performs data security processing on the original record data passing the verification to form a communication message, sends the communication message to the tracing server, and stores the communication message;
s5, the tracing server verifies again whether the message data of the communication message passing the safety verification conforms to the data verification rule according to the data verification rule;
s6, the tracing server analyzes the message data of the communication message according with the data verification rule to obtain the original record data and the data with high timeliness requirement;
s7, the source tracing server stores the analyzed data with high timeliness requirement, and packs the analyzed original record data into block data for storage based on the block chain technology;
and S8, the tracing server receives the tracing query information, searches corresponding original record data in the stored block data according to the tracing query information, and processes the original record data obtained by query into a tracing query result matched with the tracing query information for display.
As shown in fig. 3, in an embodiment, on the basis of the previous embodiment, the method may further include the step of authenticating and authorizing the acquisition client by the tracing server, where the specific steps are as follows:
s01, the tracing server configures authentication and authorization voucher information according to the multi-dimensional information, wherein the authentication and authorization voucher information is used for verifying a registration request and a data interaction request sent by the acquisition client, and the authentication and authorization voucher information comprises authentication License, first authorization License and authorization information;
s02, the tracing server stores the authentication authorization voucher information, and synchronizes the authentication License and the authorization information in the authentication authorization voucher information to the acquisition client, wherein the acquisition client carries the authentication License and the authorization information in the registration request and the data interaction request sent to the tracing server;
and S03, the tracing server registers the acquisition client based on the authentication License and the authorization information carried in the registration request, and authorizes the acquisition client based on the authentication License and the authorization information carried in the data interaction request.
Specifically, in an embodiment, registering, by the tracing server, the collection client based on the authentication License and the authorization information carried in the registration request includes:
the tracing server calculates a second authorization License based on the authentication License and the authorization information carried in the registration request, and if the second authorization License is matched with the first authorization License, the tracing server judges that the registration request is a legal request and registers the acquisition client according to the judgment result;
the authorization of the tracing server to the acquisition client based on the authentication License and the authorization information carried in the data interaction request comprises the following steps:
and the tracing server calculates a third authorization License based on the authentication License and the authorization information carried in the data interaction request, and if the third authorization License is matched with the first authorization License, the tracing server judges that the data interaction request is a legal request and authorizes the acquisition client according to the judgment result.
The independent tracing method in this embodiment is performed based on the independent tracing system for original record data of the LIMS system based on the block chain in any of the embodiments of the present invention, and therefore the independent tracing method also has the beneficial effects of the embodiment of the independent tracing system.
As shown in fig. 4, an embodiment of the present invention further provides a device for independent tracing of raw record data of a LIMS system based on a block chain, and fig. 4 shows a block diagram of an exemplary device suitable for implementing an embodiment of the present invention. The apparatus shown in fig. 4 is only an example and should not bring any limitations to the function and scope of use of the embodiments of the present invention.
As shown in fig. 4, the apparatus is embodied in the form of a general purpose computing device. Components of the apparatus may include, but are not limited to:
memory 28, one or more processors 16, and a bus 18 connecting the various system components.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
The apparatus typically includes a variety of computer system readable media. Such media may be any available media that is accessible by the apparatus and includes both volatile and nonvolatile media, removable and non-removable media.
The memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. The apparatus may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 3, and commonly referred to as a "hard drive"). Although not shown in FIG. 3, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
The apparatus may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with the apparatus, and/or with any devices (e.g., network card, modem, etc.) that enable the apparatus to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, the device may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) through the network adapter 20. As shown, the network adapter 20 communicates with the other modules of the device over the bus 18. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the apparatus, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RA's device numbering system, tape drives, and data backup storage systems, etc.
The processor 16 executes programs stored in the memory 28 to perform various functional applications and data processing, for example, implement the independent tracing method for raw record data of the block chain-based LIMS system provided by the embodiment of the present invention, the method includes:
the tracing server configures data acquisition rules and data verification rules for the detection equipment needing tracing;
the tracing server side synchronizes the data acquisition rule and the data verification rule to the acquisition client side;
the acquisition client acquires and verifies the original record data in the detection equipment according to the data acquisition rule and the data verification rule;
the method comprises the steps that an acquisition client side carries out data security processing on original recorded data passing verification to form a communication message, the communication message is sent to a tracing server side, and the communication message is stored;
the tracing server verifies whether the message data of the communication message passing the safety verification conforms to the data verification rule again according to the data verification rule;
the tracing server analyzes the message data of the communication message which accords with the data verification rule to obtain original record data and data with high timeliness requirement;
the source tracing server stores the data with high timeliness requirement obtained by analysis, and packs the original record data obtained by analysis into block data for storage based on a block chain technology;
and the tracing server receives the tracing query information, searches corresponding original record data in the stored block data according to the tracing query information, and processes the original record data obtained by query into a tracing query result matched with the tracing query information for display.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by one or more computers, the computer program causes the one or more computers to execute the steps included in the independent tracing method for raw record data of a block chain based LIMS system according to any one of the above-mentioned method embodiments of the present invention.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
Those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than others, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. An independent source tracing system of LIMS system original record data based on a block chain is characterized in that the independent source tracing system is independent of the LIMS system, the independent source tracing system comprises a source tracing server and at least one acquisition client, the at least one acquisition client is in communication connection with the source tracing server, wherein,
the tracing server is used for configuring a data acquisition rule and a data verification rule matched with the detection equipment and synchronizing the configured data acquisition rule and the configured data verification rule to the acquisition client;
the acquisition client is used for acquiring original record data detected by the detection equipment from the detection equipment through a data acquisition interface of the detection equipment according to the data acquisition rule, verifying the acquired original record data according to the data verification rule, performing data safety processing on the verified original record data to form a communication message, sending the communication message to the source tracing server, and storing the communication message;
the tracing server is further used for decrypting and carrying out safety verification processing on the communication message sent by the acquisition client, verifying whether the message data of the communication message passing the safety verification accords with the data verification rule again based on the data verification rule, analyzing the message data of the communication message conforming to the data verification rule to obtain original recorded data and data with high timeliness requirements, carrying out body storage on the analyzed data with high timeliness requirements, and packaging the analyzed original recorded data into block data for storage based on a block chain technology;
the source tracing server is further used for receiving source tracing query information, searching corresponding original record data in the stored block data according to the source tracing query information, and processing the original record data obtained through query into a source tracing query result matched with the source tracing query information for display.
2. The blockchain-based LIMS system raw record data independent traceability system of claim 1,
the tracing server is further used for configuring authentication authorization voucher information according to the multi-dimensional information, the authentication authorization voucher information is used for verifying a registration request and a data interaction request sent by the acquisition client, and the authentication authorization voucher information comprises authentication License, first authorization License and authorization information;
the tracing server is further configured to store the authentication authorization credential information, and synchronize authentication License and authorization information in the authentication authorization credential information to the acquisition client, where the acquisition client carries the authentication License and the authorization information in the registration request and the data interaction request sent to the tracing server;
the tracing server is further configured to register the acquisition client based on the authentication License and the authorization information carried in the registration request, and authorize the acquisition client based on the authentication License and the authorization information carried in the data interaction request.
3. The blockchain-based LIMS system raw record data independent traceability system of claim 2,
the registering the collection client by the tracing server based on the authentication License and the authorization information carried in the registration request comprises:
the tracing server calculates a second authorization License based on the authentication License and authorization information carried in the registration request, and if the second authorization License is matched with the first authorization License, the tracing server judges that the registration request is a legal request and registers the acquisition client according to the judgment result;
the authorization of the tracing server to the acquisition client based on the authentication License and the authorization information carried in the data interaction request comprises:
and the tracing server calculates a third authorization License based on the authentication License and the authorization information carried in the data interaction request, and if the third authorization License is matched with the first authorization License, the tracing server judges that the data interaction request is a legal request and authorizes the acquisition client according to the judgment result.
4. The independent tracing system of original record data of block chain based LIMS system according to claim 2 or 3,
the tracing server comprises a first authentication and authorization module, a tracing management module, a tracing analysis module, an acquisition rule module, a first data security module, a verification rule module, a consensus accounting module, a block accounting module and a first data storage module, wherein,
the first authentication and authorization module is used for configuring the authentication and authorization voucher information, storing the authentication and authorization voucher information, synchronizing authentication License and authorization information in the authentication and authorization voucher information to the acquisition client, and verifying a registration request and a data interaction request sent by the acquisition client based on the authentication and authorization voucher information;
the source tracing management module is used for receiving source tracing query information and displaying a source tracing query result obtained after the source tracing analysis module processes original record data according to a preset display form;
the source tracing analysis module is used for searching corresponding original record data in the stored block data according to the source tracing query information, analyzing and calculating the original record data obtained by query to generate a source tracing query result matched with the source tracing query information, and sending the source tracing query result to the source tracing management module;
the acquisition rule module is used for configuring and verifying a data acquisition rule matched with the detection equipment and synchronizing data acquisition rule configuration data to the acquisition client;
the first data security module is used for decrypting and carrying out security verification processing on the communication message sent by the acquisition client, and encrypting and signing data sent to the acquisition client by the tracing server;
the verification rule module is used for configuring a data verification rule matched with the detection equipment, synchronizing data configured by the data verification rule to the acquisition client and verifying whether the communication message passing the safety verification conforms to the data verification rule;
the consensus accounting module is used for analyzing the communication message which accords with the data verification rule to obtain original recorded data and data with high timeliness requirements, packaging the analyzed original recorded data into block data based on a block chain technology, sending the block data to the block book module for storage, and sending the data with high timeliness requirements to the first data storage module for storage;
the block book module is used for storing the block data sent by the consensus accounting module so as to provide source tracing of original recorded data;
the first data storage module is used for storing various tracing service data which are used for tracing the original record and comprise the data with high timeliness requirement.
5. The blockchain-based LIMS system raw record data independent traceability system of claim 4,
the acquisition client comprises a second authentication and authorization module, an acquisition rule setting module, a verification rule setting module, an original record data acquisition module, a second data security module, a data processing module and a second data storage module, wherein,
the second authentication and authorization module is used for receiving and storing the authentication License and the authorization information synchronized by the tracing server, and enabling the registration request and the data interaction request initiated by the acquisition client to the tracing server to carry the authentication License and the authorization information;
the collection rule setting module is used for receiving data collection rule configuration data synchronized by a collection rule module of the tracing server, sending the data collection rule configuration data to the second data security module for security verification, and sending the data collection rule configuration data passing the security verification to the second data storage module for storage, wherein the data collection rule configuration data received by the collection rule setting module cannot be changed;
the verification rule setting module is used for receiving data verification rule configuration data synchronized by a verification rule module of the tracing server, sending the data verification rule configuration data to the second data security module for security verification, and sending the data verification rule configuration data passing the security verification to the second data storage module for storage, wherein the data verification rule configuration data received by the verification rule setting module cannot be changed;
the original record data acquisition module is used for acquiring original record data detected by the detection equipment from the detection equipment through a data acquisition interface of the detection equipment according to the data acquisition rule, verifying the acquired original record data according to the data verification rule and sending the verified original record data to the data processing module for data processing;
the second data security module is used for encrypting, signing and data packaging the acquired and verified original recording data and carrying out security verification on the data from the tracing server;
the data processing module is used for calling the second data security module to encrypt, sign and package original recorded data to form a communication message which can be identified by the tracing server and sending the communication message to the tracing server;
the second data storage module is used for storing data acquisition rule configuration data, data verification rule configuration data and original record data acquired by the original record data acquisition module.
6. A method for independent tracing of original record data of a block chain-based LIMS system is characterized in that the method is carried out based on the independent tracing system of original record data of the block chain-based LIMS system according to any one of claims 1 to 5, and the method comprises the following steps;
the tracing server configures data acquisition rules and data verification rules for the detection equipment needing tracing;
the tracing server side synchronizes the data acquisition rule and the data verification rule to the acquisition client side;
the acquisition client acquires and verifies the original record data in the detection equipment according to the data acquisition rule and the data verification rule;
the method comprises the steps that an acquisition client side carries out data security processing on original recorded data passing verification to form a communication message, the communication message is sent to a tracing server side, and the communication message is stored;
the tracing server verifies whether the message data of the communication message passing the safety verification conforms to the data verification rule again according to the data verification rule;
the tracing server analyzes the message data of the communication message which accords with the data verification rule to obtain original record data and data with high timeliness requirement;
the source tracing server stores the data with high timeliness requirement obtained by analysis, and packs the original record data obtained by analysis into block data for storage based on a block chain technology;
and the tracing server receives the tracing query information, searches corresponding original record data in the stored block data according to the tracing query information, and processes the original record data obtained by query into a tracing query result matched with the tracing query information for display.
7. The independent tracing method for original record data of LIMS system based on block chain as claimed in claim 6, wherein said method further comprises the following steps:
the tracing server configures authentication and authorization certificate information according to the multi-dimensional information, wherein the authentication and authorization certificate information is used for verifying a registration request and a data interaction request sent by a collection client, and the authentication and authorization certificate information comprises authentication License, first authorization License and authorization information;
the tracing server stores the authentication authorization voucher information, and synchronizes the authentication License and the authorization information in the authentication authorization voucher information to the acquisition client, wherein the authentication License and the authorization information are carried in a registration request and a data interaction request sent to the tracing server by the acquisition client;
and the tracing server registers the acquisition client based on the authentication License and the authorization information carried in the registration request, and authorizes the acquisition client based on the authentication License and the authorization information carried in the data interaction request.
8. The independent tracing method of original record data of block chain based LIMS system according to claim 7,
the tracing server side registers the acquisition client side based on the authentication License and the authorization information carried in the registration request, and the registration comprises the following steps:
the tracing server calculates a second authorization License based on the authentication License and the authorization information carried in the registration request, and if the second authorization License is matched with the first authorization License, the tracing server judges that the registration request is a legal request and registers the acquisition client according to the judgment result;
the authorization of the tracing server to the acquisition client based on the authentication License and the authorization information carried in the data interaction request comprises the following steps:
and the tracing server calculates a third authorization License based on the authentication License and the authorization information carried in the data interaction request, and if the third authorization License is matched with the first authorization License, the tracing server judges that the data interaction request is a legal request and authorizes the acquisition client according to the judgment result.
9. A LIMS system original record data independent source tracing device based on a block chain is characterized by comprising:
a memory for storing a computer program; and
a processor for executing the memory-stored computer program to perform the steps included in the method for independent tracing of raw record data of a blockchain-based LIMS system as claimed in any one of claims 6 to 8.
10. A computer readable storage medium storing a computer program, wherein the computer program, when executed by one or more computers, causes the one or more computers to perform the steps included in the independent tracing method for raw record data of a block chain based LIMS system as claimed in any one of claims 6 to 8.
CN202111231949.9A 2021-10-22 2021-10-22 Independent source tracing system, method and device for original recording data of LIMS (laser induced mass spectrometry) system based on block chain and storage medium Pending CN114022161A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111231949.9A CN114022161A (en) 2021-10-22 2021-10-22 Independent source tracing system, method and device for original recording data of LIMS (laser induced mass spectrometry) system based on block chain and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111231949.9A CN114022161A (en) 2021-10-22 2021-10-22 Independent source tracing system, method and device for original recording data of LIMS (laser induced mass spectrometry) system based on block chain and storage medium

Publications (1)

Publication Number Publication Date
CN114022161A true CN114022161A (en) 2022-02-08

Family

ID=80057177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111231949.9A Pending CN114022161A (en) 2021-10-22 2021-10-22 Independent source tracing system, method and device for original recording data of LIMS (laser induced mass spectrometry) system based on block chain and storage medium

Country Status (1)

Country Link
CN (1) CN114022161A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116402136A (en) * 2023-03-22 2023-07-07 中航信移动科技有限公司 Rule extraction method based on offline data, storage medium and electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116402136A (en) * 2023-03-22 2023-07-07 中航信移动科技有限公司 Rule extraction method based on offline data, storage medium and electronic equipment
CN116402136B (en) * 2023-03-22 2023-11-17 中航信移动科技有限公司 Rule extraction method based on offline data, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
US10673617B1 (en) Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity
KR102545407B1 (en) Distributed document and entity validation engine
US10491390B2 (en) Proof chaining and decomposition
US11139978B2 (en) Portable biometric identity on a distributed data storage layer
CN108076057B (en) Data security system and method based on block chain
US20230022769A1 (en) Method and system for public elections on a moderated blockchain
US20190251573A1 (en) Systems and methods of verifying credentials of aircraft personnel using a blockchain computer system
JP5753273B2 (en) Data authenticity guarantee method, management computer and storage medium
US10164963B2 (en) Enforcing server authentication based on a hardware token
JP2019505150A (en) Method and system for modified blockchain using digital signature
WO2020102696A1 (en) Methods and apparatus for encrypting, storing, and/or sharing sensitive data
CN108022194A (en) Law-enforcing recorder and its data safety processing method, server and system
CN111914029A (en) Block chain-based medical data calling method and device, electronic equipment and medium
CN109308421A (en) A kind of information tamper resistant method, device, server and computer storage medium
CN110912693A (en) Digital certificate format compliance detection system
CN114022161A (en) Independent source tracing system, method and device for original recording data of LIMS (laser induced mass spectrometry) system based on block chain and storage medium
CN107370733A (en) A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions
CN112217636B (en) Data processing method and device based on block chain, computer equipment and medium
US20130268764A1 (en) Data event authentication and verification system
CN113742745A (en) Audit process evidence obtaining link management system and management method
US11818277B1 (en) Computing system for electronic message tamper-proofing
US11063762B1 (en) Computing system for inter-application communication
CN113114615A (en) Device, system, method, storage medium, and program product for preventing data hijacking
CN112863652A (en) Medical image data storage system
CN110380861A (en) Digital authenticating and its encrypted transmission method, system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination