CN115277690A - Industrial data supervisory systems based on block chain - Google Patents

Industrial data supervisory systems based on block chain Download PDF

Info

Publication number
CN115277690A
CN115277690A CN202210515907.6A CN202210515907A CN115277690A CN 115277690 A CN115277690 A CN 115277690A CN 202210515907 A CN202210515907 A CN 202210515907A CN 115277690 A CN115277690 A CN 115277690A
Authority
CN
China
Prior art keywords
data
module
authority
industrial
coding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210515907.6A
Other languages
Chinese (zh)
Inventor
卢青松
杨有丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Chaoqing Technology Co ltd
Original Assignee
Anhui Chaoqing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Chaoqing Technology Co ltd filed Critical Anhui Chaoqing Technology Co ltd
Priority to CN202210515907.6A priority Critical patent/CN115277690A/en
Publication of CN115277690A publication Critical patent/CN115277690A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a data supervision system, in particular to an industrial data supervision system based on a block chain, which comprises a server, wherein the server acquires industrial data through an industrial data acquisition module and acquires data length through a data length acquisition module, the server classifies the acquired industrial data through a data classification module based on the data length and sends the classified data to a corresponding data processing module through a data distribution module for data processing, the server generates a public key through a data encryption module and encrypts the processed data, and meanwhile, a private key corresponding to the public key is generated by using a private key generation module; the technical scheme provided by the invention can effectively overcome the defects that the data processing resources can not be reasonably matched and the effective and safe supervision on the data calling is not carried out in the prior art.

Description

Industrial data supervisory systems based on block chain
Technical Field
The invention relates to a data supervision system, in particular to an industrial data supervision system based on a block chain.
Background
Along with the development of the internet, a plurality of industrial enterprises use an internet cloud management platform to perform data management, the existing internet management platform is usually provided with a main server, and each node under the main server can transmit data to the main server.
With the birth of the block chain technology, people can utilize the block chain technology to realize the synchronous work of various distributed information, and then in the aspect of industrial internet data security supervision, the data security can be greatly improved by completely combining the block chain technology. Therefore, the invention provides an industrial data supervision system based on a block chain.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects in the prior art, the invention provides an industrial data supervision system based on a block chain, which can effectively overcome the defects that data processing resources cannot be reasonably matched and effective safety supervision on data calling is not carried out in the prior art.
(II) technical scheme
In order to realize the purpose, the invention is realized by the following technical scheme:
the industrial data supervision system based on the block chain comprises a server, wherein the server acquires industrial data through an industrial data acquisition module and acquires data length through a data length acquisition module, the server classifies the acquired industrial data based on the data length through a data classification module and sends the classified data to a corresponding data processing module through a data distribution module for data processing, the server generates a public key through a data encryption module and encrypts the processed data, and meanwhile, a private key corresponding to the public key is generated through a private key generation module;
the server establishes a data sharing point through a data sharing point establishing module and receives encrypted data sent by a data encryption module, the server establishes a user information set of a system user through the user information set establishing module and receives a data calling request sent by the user through a data calling request receiving module, the server checks the data calling request and the user information set through a calling authority verifying module to verify whether the user has data calling authority or not, the server conducts tampering confirmation on data to be called in the data sharing point through a data tampering-proof confirming module according to a data calling authority verifying result, and packs and sends the data to be called which are not tampered and a corresponding private key to a user terminal together through a calling data packet sending module.
Preferably, the industrial data acquisition module communicates with different industrial data sources, acquires industrial data from each industrial data source in real time, and sends the acquired industrial data to the data length acquisition module.
Preferably, the data length obtaining module obtains the coding length of each industrial data, the industrial data includes a coding prefix, a coding main body and a coding suffix, the coding length of the coding prefix and the coding main body is determined by a coding rule, and the coding length of the coding suffix is fixed.
Preferably, the data classification module matches the encoding length of the encoding prefix with a system encoding length set, and classifies each industrial data.
Preferably, the data encryption module generates a public key, including:
s1, acquiring an index link of the processed data, and taking the index link as a first part of a public key;
s2, acquiring the viewing authority of the processed data, generating an authority index according to an information set formed by the viewing authority, and taking the authority index as a second part of the public key;
and S3, acquiring the viewable part in the coding main body, generating a viewing index according to the viewable coding main body, and taking the viewing index as a third part of the public key.
Preferably, the viewing authority of the data includes a viewing content range, a viewing personnel range, a viewing area range and a viewing time range, and the viewing authority of the data is set by a data generator.
Preferably, the private key generating module generates a private key corresponding to a public key, including:
s1, acquiring operation authority of processed data, generating an operation index according to an information set formed by the operation authority, and taking the operation index as a first part of a private key;
s2, acquiring and intercepting a data sequence of the processed data, and taking the intercepted data sequence as a second part of the private key;
and S3, marking the coding main body, and taking the operable part in the coding main body as a third part of the private key.
Preferably, the operation authority of the data includes data generator information, uploading authority, downloading authority and modifying authority.
Preferably, the user information set establishing module establishes a user information set of a system user in each data sharing point, and after the user selects the data sharing point, the calling authority verifying module extracts the user information from the data calling request and matches the user information set;
if the matching is successful, the calling authority verification module judges that the user has the data calling authority, the data tamper-proof confirmation module carries out tamper confirmation on the data to be called in the data sharing point, and otherwise, the calling authority verification module judges that the user does not have the data calling authority.
Preferably, the data tamper-proof confirmation module performs hash calculation on encrypted data sent by the data encryption module to generate a first hash value and stores the first hash value, performs hash calculation on data to be called in the data sharing point to generate a second hash value when tamper confirmation is performed, and compares the second hash value with the first hash value;
the data tamper-proof confirmation module counts the encrypted data sent by the data encryption module and generates a first data number, when tamper confirmation is carried out, the data to be called in the data sharing point are counted and a second data number is generated, the second data number is compared with the first data number, and if the comparison results are the same, the data to be called is not tampered.
(III) advantageous effects
Compared with the prior art, the block chain-based industrial data supervision system provided by the invention has the following beneficial effects:
1) The data length of the collected industrial data is obtained through the data length obtaining module, the data classifying module classifies the collected industrial data based on the data length, and the data distributing module sends the classified data to the corresponding data processing module for data processing, so that reasonable matching can be performed on data processing resources according to the data length of the industrial data, on one hand, the situation that the data processing resources cannot meet the calculation force requirement and the system data processing efficiency is low is prevented, and on the other hand, the situation that the data processing resources are excessively distributed and the system data processing resources are wasted is prevented;
2) The data sharing point establishing module establishes a data sharing point and receives encrypted data sent by the data encryption module, the user information set establishing module establishes a user information set of a system user, the calling authority verifying module checks the data calling request and the user information set, the safety of a data calling party is determined by verifying whether the user has the data calling authority or not, and then effective safety supervision is carried out on data calling;
3) According to the data calling authority verification result, the data tamper-proof confirmation module carries out tamper confirmation on the data to be called in the data sharing point, the calling data packet sending module packs the data to be called which are not tampered and the corresponding private key together and sends the data to the user terminal, the safety of calling data can be ensured, and the data calling party is prevented from being damaged due to data tampering.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
FIG. 1 is a schematic diagram of the system of the present invention;
FIG. 2 is a schematic flow chart of the present invention for classifying the collected industrial data and allocating data processing resources for data processing;
FIG. 3 is a flow diagram illustrating security supervision for data invocation in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The utility model provides an industrial data supervisory systems based on block chain, as shown in fig. 1 and fig. 2, including the server, the server passes through industrial data acquisition module collection industrial data, and acquire data length through data length acquisition module, the server passes through data classification module and classifies to the collection industrial data based on data length, and send the data after classifying to corresponding data processing module through data distribution module and carry out data processing, the server passes through data encryption module and generates the public key and encrypts the data after handling, utilize private key generation module to generate the private key that corresponds with the public key simultaneously.
The industrial data acquisition module is communicated with different industrial data sources, acquires industrial data from each industrial data source in real time, and sends the acquired industrial data to the data length acquisition module.
The data length obtaining module obtains the coding length of each industrial data, the industrial data comprise a coding prefix, a coding main body and a coding suffix, the coding length of the coding prefix and the coding main body is determined by a coding rule, and the coding length of the coding suffix is fixed.
And the data classification module matches the coding length of the coding prefix with the system coding length set and classifies all industrial data.
The data encryption module generates a public key, comprising:
s1, acquiring an index link of the processed data, and taking the index link as a first part of a public key;
s2, acquiring the viewing authority of the processed data, generating an authority index according to an information set formed by the viewing authority, and taking the authority index as a second part of the public key;
and S3, acquiring the viewable part in the coding main body, generating a viewing index according to the viewable coding main body, and taking the viewing index as a third part of the public key.
The viewing authority of the data comprises a viewing content range, a viewing personnel range, a viewing area range and a viewing time range, and the viewing authority of the data is set by a data generator.
The private key generating module generates a private key corresponding to the public key, including:
s1, acquiring operation authority of processed data, generating an operation index according to an information set formed by the operation authority, and taking the operation index as a first part of a private key;
s2, acquiring and intercepting a data sequence of the processed data, and taking the intercepted data sequence as a second part of the private key;
and S3, marking the coding body, and taking the operable part in the coding body as a third part of the private key.
The operation authority of the data comprises data generator information, uploading authority, downloading authority and modifying authority.
According to the technical scheme, the data length of the collected industrial data is obtained through the data length obtaining module, the data classifying module classifies the collected industrial data based on the data length, the data distribution module sends the classified data to the corresponding data processing module for data processing, and therefore reasonable matching can be conducted on data processing resources according to the data length of the industrial data.
As shown in fig. 2 and fig. 3, the server establishes a data sharing point through the data sharing point establishing module, and receives encrypted data sent by the data encrypting module, the server establishes a user information set of a system user through the user information set establishing module, and receives a data calling request sent by the user through the data calling request receiving module, the server checks the data calling request and the user information set through the calling authority verifying module, and verifies whether the user has a data calling authority, the server performs tamper confirmation on data to be called in the data sharing point through the data tamper-proof confirming module according to a data calling authority verifying result, and packs the data to be called which is not tampered with and a corresponding private key together to the user terminal through the calling data packet sending module.
The user information set establishing module establishes a user information set of a system user in each data sharing point, and after the user selects the data sharing point, the calling authority verification module extracts the user information from the data calling request and matches the user information set:
if the matching is successful, the calling authority verification module judges that the user has the data calling authority, the data tamper-proof confirmation module carries out tamper confirmation on the data to be called in the data sharing point, and otherwise, the calling authority verification module judges that the user does not have the data calling authority.
According to the technical scheme, the data sharing point establishing module establishes the data sharing point and receives encrypted data sent by the data encryption module, the user information set establishing module establishes a user information set of a system user, the calling authority verifying module checks a data calling request and the user information set, the safety of a data calling party is determined by verifying whether the user has a data calling authority, and then effective safety supervision is carried out on data calling.
The data tamper-proof confirmation module performs hash calculation on encrypted data sent by the data encryption module to generate and store a first hash value, performs hash calculation on data to be called in the data sharing point to generate a second hash value when tamper confirmation is performed, and compares the second hash value with the first hash value;
the data tamper-proof confirmation module counts the encrypted data sent by the data encryption module and generates a first data strip number, when tamper confirmation is carried out, the data to be called in the data sharing point are counted and a second data strip number is generated, the second data strip number is compared with the first data strip number, and if the comparison results are the same, the data to be called are not tampered.
In the technical scheme, the detection frequency of all encrypted data in the data sharing point with respect to the hash value and the number of data pieces can be set for the data tamper-proof confirmation module, so that dynamic tamper-proof supervision of all encrypted data is realized.
According to the technical scheme, the data tamper-proof confirmation module carries out tamper confirmation on the data to be called in the data sharing point according to the data calling authority verification result, the calling data packet sending module packs the data to be called which are not tampered and the corresponding private key together and sends the data to the user terminal, the safety of calling data can be guaranteed, and damage to a data calling party due to data tampering is prevented.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. An industrial data supervisory system based on block chains is characterized in that: the system comprises a server, wherein the server acquires industrial data through an industrial data acquisition module and acquires data length through a data length acquisition module, the server classifies the acquired industrial data based on the data length through a data classification module and sends the classified data to a corresponding data processing module through a data distribution module for data processing, the server generates a public key through a data encryption module and encrypts the processed data, and meanwhile, a private key corresponding to the public key is generated through a private key generation module;
the server establishes a data sharing point through a data sharing point establishing module and receives encrypted data sent by a data encrypting module, the server establishes a user information set of a system user through the user information set establishing module and receives a data calling request sent by the user through a data calling request receiving module, the server checks the data calling request and the user information set through a calling authority verifying module to verify whether the user has data calling authority, the server conducts tampering confirmation on data to be called in the data sharing point through a data tampering-proof confirming module according to a data calling authority verifying result, and packs the data to be called which is not tampered and a corresponding private key together to be sent to a user terminal through a calling data packet sending module.
2. The blockchain-based industrial data curation system of claim 1, wherein: the industrial data acquisition module is communicated with different industrial data sources, acquires industrial data from each industrial data source in real time, and sends the acquired industrial data to the data length acquisition module.
3. The system according to claim 2, wherein: the data length obtaining module obtains the coding length of each industrial data, the industrial data comprise a coding prefix, a coding main body and a coding suffix, the coding length of the coding prefix and the coding main body is determined by a coding rule, and the coding length of the coding suffix is fixed.
4. The blockchain-based industrial data curation system of claim 3, wherein: and the data classification module is used for matching the coding length of the coding prefix with a system coding length set and classifying all industrial data.
5. The blockchain-based industrial data supervisory system according to claim 1, wherein: the data encryption module generates a public key, including:
s1, acquiring an index link of the processed data, and taking the index link as a first part of a public key;
s2, acquiring the viewing authority of the processed data, generating an authority index according to an information set formed by the viewing authority, and taking the authority index as a second part of the public key;
and S3, acquiring the viewable part in the coding main body, generating a viewing index according to the viewable coding main body, and taking the viewing index as a third part of the public key.
6. The blockchain-based industrial data supervisory system according to claim 5, wherein: the viewing authority of the data comprises a viewing content range, a viewing personnel range, a viewing area range and a viewing time range, and the viewing authority of the data is set by a data generator.
7. The blockchain-based industrial data supervisory system according to claim 1, wherein: the private key generating module generates a private key corresponding to the public key, including:
s1, acquiring operation authority of processed data, generating an operation index according to an information set formed by the operation authority, and taking the operation index as a first part of a private key;
s2, acquiring and intercepting a data sequence of the processed data, and taking the intercepted data sequence as a second part of the private key;
and S3, marking the coding main body, and taking the operable part in the coding main body as a third part of the private key.
8. The blockchain-based industrial data curation system of claim 7, wherein: the operation authority of the data comprises data generator information, uploading authority, downloading authority and modifying authority.
9. The blockchain-based industrial data curation system of claim 1, wherein: the user information set establishing module establishes a user information set of a system user in each data sharing point, and after the user selects the data sharing point, the calling authority verifying module extracts user information from the data calling request and matches the user information set;
if the matching is successful, the calling authority verification module judges that the user has the data calling authority, the data tamper-proof confirmation module carries out tamper confirmation on the data to be called in the data sharing point, and otherwise, the calling authority verification module judges that the user does not have the data calling authority.
10. The blockchain-based industrial data curation system of claim 9, wherein: the data tamper-proof confirmation module performs hash calculation on encrypted data sent by the data encryption module to generate a first hash value and stores the first hash value, performs hash calculation on data to be called in the data sharing point to generate a second hash value when tamper confirmation is performed, and compares the second hash value with the first hash value;
the data tamper-proof confirmation module counts the encrypted data sent by the data encryption module and generates a first data strip number, when tamper confirmation is carried out, the data to be called in the data sharing point are counted and a second data strip number is generated, the second data strip number is compared with the first data strip number, and if the comparison results are the same, the data to be called are not tampered.
CN202210515907.6A 2022-05-12 2022-05-12 Industrial data supervisory systems based on block chain Pending CN115277690A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210515907.6A CN115277690A (en) 2022-05-12 2022-05-12 Industrial data supervisory systems based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210515907.6A CN115277690A (en) 2022-05-12 2022-05-12 Industrial data supervisory systems based on block chain

Publications (1)

Publication Number Publication Date
CN115277690A true CN115277690A (en) 2022-11-01

Family

ID=83760362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210515907.6A Pending CN115277690A (en) 2022-05-12 2022-05-12 Industrial data supervisory systems based on block chain

Country Status (1)

Country Link
CN (1) CN115277690A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115801190A (en) * 2022-11-15 2023-03-14 广州市吉清科技有限公司 Intelligent old-age care monitoring method

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019052286A1 (en) * 2017-09-12 2019-03-21 广州广电运通金融电子股份有限公司 User identity verification method, apparatus and system based on blockchain
CN109741162A (en) * 2018-09-03 2019-05-10 上海奥若拉信息科技集团有限公司 The storage of personal collage-credit data, processing, sharing method and system based on block chain
US20190325146A1 (en) * 2018-04-24 2019-10-24 Throughtek Technology (Shenzhen) Co., Ltd. Data encryption and decryption method and system and network connection apparatus and data encryption and decryption method thereof
CN111475859A (en) * 2020-04-08 2020-07-31 珠海复旦创新研究院 Data sharing and database asynchronous verifiable query method, system and equipment based on block chain technology
WO2020259635A1 (en) * 2019-06-27 2020-12-30 深圳前海微众银行股份有限公司 Method and apparatus for sharing blockchain data
KR102233468B1 (en) * 2019-11-25 2021-03-29 주식회사 스마트엠투엠 Blockchain-based security hub platform for enhancing security of habor infrastructure
CN113343264A (en) * 2021-06-24 2021-09-03 北京八分量信息科技有限公司 Block chain-based data tamper-proof system and method
CN113794743A (en) * 2021-11-18 2021-12-14 湖南和信安华区块链科技有限公司 Industrial data supervisory systems based on block chain
CN113946610A (en) * 2021-10-22 2022-01-18 帝杰曼科技股份有限公司 Block chain data supervision system and method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019052286A1 (en) * 2017-09-12 2019-03-21 广州广电运通金融电子股份有限公司 User identity verification method, apparatus and system based on blockchain
US20190325146A1 (en) * 2018-04-24 2019-10-24 Throughtek Technology (Shenzhen) Co., Ltd. Data encryption and decryption method and system and network connection apparatus and data encryption and decryption method thereof
CN109741162A (en) * 2018-09-03 2019-05-10 上海奥若拉信息科技集团有限公司 The storage of personal collage-credit data, processing, sharing method and system based on block chain
WO2020259635A1 (en) * 2019-06-27 2020-12-30 深圳前海微众银行股份有限公司 Method and apparatus for sharing blockchain data
KR102233468B1 (en) * 2019-11-25 2021-03-29 주식회사 스마트엠투엠 Blockchain-based security hub platform for enhancing security of habor infrastructure
CN111475859A (en) * 2020-04-08 2020-07-31 珠海复旦创新研究院 Data sharing and database asynchronous verifiable query method, system and equipment based on block chain technology
CN113343264A (en) * 2021-06-24 2021-09-03 北京八分量信息科技有限公司 Block chain-based data tamper-proof system and method
CN113946610A (en) * 2021-10-22 2022-01-18 帝杰曼科技股份有限公司 Block chain data supervision system and method
CN113794743A (en) * 2021-11-18 2021-12-14 湖南和信安华区块链科技有限公司 Industrial data supervisory systems based on block chain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115801190A (en) * 2022-11-15 2023-03-14 广州市吉清科技有限公司 Intelligent old-age care monitoring method

Similar Documents

Publication Publication Date Title
CN109409122B (en) File storage method, electronic device and storage medium
CN109766673B (en) Alliance type audio and video copyright block chain system and audio and video copyright chaining method
CN106603233B (en) Encryption and decryption method for remote bid opening type bidding system
CN111209334A (en) Block chain-based power terminal data security management method
CN109472164A (en) The verification method and its network and electronic equipment of contract dataset
CN110035058B (en) Resource request method, device and storage medium
CN110381075B (en) Block chain-based equipment identity authentication method and device
CN113379420B (en) Block chain execution intelligent contract method, computer equipment and block chain system
CN113254972A (en) Information security management method based on block chain
US20200329039A1 (en) Securing digital data transmission in a communication network
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN115277690A (en) Industrial data supervisory systems based on block chain
CN111447068A (en) Time service evidence storing method based on block chain
CN113408752A (en) Garbage recovery supervision system and method based on block chain
CN110689348A (en) Income verification method, device, terminal and medium based on alliance chain
CN112689019A (en) Logistics state monitoring method based on block chain technology
CN111444265A (en) Government affair information sharing system based on block chain
CN113570321B (en) Hydrogen energy data management system
CN115600189A (en) Commercial password application security evaluation system
CN110232283A (en) The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography
EP3512159A1 (en) Method, platform and system for ensuring auditability of an immutable digital transaction
CN114372092A (en) Case collaborative search processing method, system, device and electronic equipment
CN113935874A (en) District chain-based book management system for studying income
CN114374506A (en) Security tracing and sharing supervision method for power data under master-slave alliance link
CN113626860A (en) Electric power data privacy protection method based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination