CN109359477A - A kind of data encryption, data verification method and its system - Google Patents

A kind of data encryption, data verification method and its system Download PDF

Info

Publication number
CN109359477A
CN109359477A CN201811295947.4A CN201811295947A CN109359477A CN 109359477 A CN109359477 A CN 109359477A CN 201811295947 A CN201811295947 A CN 201811295947A CN 109359477 A CN109359477 A CN 109359477A
Authority
CN
China
Prior art keywords
data
encryption
block
ciphertext
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811295947.4A
Other languages
Chinese (zh)
Other versions
CN109359477B (en
Inventor
吴军
高希余
赵华桥
巩玉强
岳才勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongyang Health Technology Group Co ltd
Original Assignee
Shandong Msunhealth Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Msunhealth Technology Group Co Ltd filed Critical Shandong Msunhealth Technology Group Co Ltd
Priority to CN201811295947.4A priority Critical patent/CN109359477B/en
Publication of CN109359477A publication Critical patent/CN109359477A/en
Application granted granted Critical
Publication of CN109359477B publication Critical patent/CN109359477B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of data encryption, data verification method and its system, data ciphering method, method includes: the progress first layer encryption in Data Mart server, is encrypted to data content by Encryption Algorithm, generates data ciphertext and saves;Second layer encryption is carried out in data routing server, data is generated to corresponding data encryption information preservation when indexing, and merge with first layer encrypted cipher text and encrypted, generate index data ciphertext and save;Third time encryption is carried out in block chain server, when index data stores within a block, multiple index data combination of two are encrypted, and to encrypted result, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved step by step;The 4th encryption is carried out in block chain server, combines upper block ciphertext with this block transaction encryption ciphertext, generates the block encryption ciphertext of this block and keep, and completes four layers of HASH encryption.

Description

A kind of data encryption, data verification method and its system
Technical field
The disclosure belongs to the technical field of data encryption, is related to a kind of data encryption, data verification method and its system, especially It is related to a kind of data ciphering method based on block chain and its system and a kind of data verification method based on block chain and Its system.
Background technique
Only there is provided background technical informations relevant to the disclosure for the statement of this part, it is not necessary to so constitute first skill Art.
With the application of information technology developed with it in different industries every aspect, the factor of constraint informationization development exists It is gradually highlighted during the landing of various information demand.Each department is contained in same industry, and each department is all with itself Business demand set out, respectively develop application system, these systems be respectively it is used, data are difficult to carry out effective integration, it is difficult to Comprehensive various information is provided, due to the problems such as information talent lacks, capital matching problem and mechanism system are unsound, is led The maintenance, update, Perfect the work of operation system is caused to be difficult effectively to carry out, system is then increasingly becoming information island one by one.
It is to establish common data platform to carry out data management, common data platform that mainstream, which solves the mode of information island, at present The data in different sources are uniformly summarized, it is unified to store, necessary data sharing, and logarithm are provided for other application system According to effectively being accumulated.Such as in medical industry, current existing data usage mode all unites different medical organization data One is aggregated into the consolidated storage of population health platform, then uses ESB data/address bus tool to data, provides number with the formation of interface According to interface.Index data user is gone in the consolidated storage of population health platform by ESB interface and obtains data, every time from Data content needed for being searched in Platform center library.However such mode for solving information island has been unable to satisfy wanting at this stage It asks, can not ensure the effective use of data.Therefore, block chain technology is applied in data management, ensure that data Multinode storage.
The application and exploitation of block chain technology, digital-scrambling techniques are crucial.Once encryption method is cracked, block chain Data safety will be challenged, block chain can not tamper will not exist.
Guarantee the not revisable mode of data at present, generally by first primary encryption preservation is carried out to data, then exists Re-encrypted and original encrypted content is carried out to data when use to compare, by comparison of coherence guarantee data not by Modification.
However, under original not revisable mechanism of guarantee data, if encryption method leakage or cracked, others into After row data modification, it can still ensure that encrypted content is constant, then lose the meaning for preventing data modification.
Summary of the invention
For the deficiencies in the prior art, one or more other embodiments of the present disclosure provide a kind of data encryption, Data verification method and its system are based on block chain technology, related layer by layer by four layers of Encryption Algorithm, effectively prevent to data Modification, improve Information Security.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of data ciphering method is provided.
A kind of data ciphering method, this method comprises:
First layer encryption is carried out in Data Mart server, data content is encrypted by Encryption Algorithm, is generated Data ciphertext simultaneously saves;
Second layer encryption is carried out in data routing server, and data are generated to corresponding data encryption information when indexing and are protected It deposits, and merges with first layer encrypted cipher text and encrypted, generate index data ciphertext and save;
Third time encryption is carried out in block chain server, when index data stores within a block, by multiple index datas Combination of two encryption, to encrypted result, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved step by step;
The 4th encryption is carried out in block chain server, by upper block ciphertext and this block transaction encryption ciphertext group It closes, generates the block encryption ciphertext of this block and keep, complete four layers of HASH encryption.
Further, in the method, the specific method step of the first layer encryption includes:
Setting needs the critical data item encrypted;
According to the critical data item that the needs of setting encrypt, the number for the critical data item for needing to encrypt in every data is obtained According to content;
Data content is encrypted by Encryption Algorithm, generate data ciphertext and is saved, first layer encryption is completed.
Further, in the method, the specific method step of the second layer encryption includes:
When generating index according to the data of acquisition, by the corresponding data encryption information of index data separately as index data Item is saved;
Computations are carried out after the index data item of preservation is merged with the data ciphertext in first layer encryption, generate index Data ciphertext simultaneously saves, and completes second layer encryption.
Further, in the method, the specific method step of the third layer encryption includes:
When index data stores within a block, multiple index data combination of two encryptions, by index data and index number HASH encryption is carried out according to ciphertext;
The encrypted data of HASH are stored in transaction as message;
To the transaction having been filed on, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved step by step, complete third layer encryption.
Further, in the method, index data and index data ciphertext are subjected to HASH encryption, formed 16 into Data processed.
Further, in the method, the specific method step of the 4th layer of encryption includes:
To the block newly formed, using the block transaction encryption ciphertext of a upper block as the area of a data item and this block Block transaction encryption ciphertext forms the block encryption ciphertext of this block, until the block of block chain network is all linked with one another, completes the 4th Secondary encryption.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of data encryption system is provided.
A kind of data encryption system, based on a kind of data ciphering method, comprising:
Several block chain servers, each block chain server connect Data Mart service by data routing server Device.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of data verification method is provided.
A kind of data verification method, this method are based on a kind of data ciphering method, comprising:
The encrypted cipher text for obtaining a certain block carries out comparison of coherence in block transaction to block transaction re-encrypted, If inconsistent, otherwise data verification failure enters in next step;
Index encrypted cipher text is obtained, when data are generated and indexed to index data re-encrypted, carries out comparison of coherence, if Inconsistent, then data verification failure, otherwise enters in next step;
Data encryption ciphertext is obtained, to data content re-encrypted, carries out comparison of coherence, if inconsistent, data are tested Card failure, otherwise data verification success.
According to the other side of one or more other embodiments of the present disclosure, a kind of computer-readable storage medium is also provided Matter.
A kind of computer readable storage medium, wherein being stored with a plurality of instruction, described instruction is suitable for by terminal device Reason device loads and executes a kind of data verification method.
According to the other side of one or more other embodiments of the present disclosure, a kind of terminal device is also provided.
A kind of terminal device, using internet terminal equipment, including processor and computer readable storage medium, processor For realizing each instruction;Computer readable storage medium is suitable for by processor load simultaneously for storing a plurality of instruction, described instruction Execute a kind of data verification method.
The disclosure the utility model has the advantages that
(1) a kind of data encryption, data verification method and its system of the present invention are encrypted, layer using four layers of HASH Layer is related, and each layer all can be using upper one layer of encrypted content as the encrypted entry of this layer, if carrying out data modification, needing will be every One layer of encrypted content is modified, and the difficulty of data modification is improved, while also reducing the probability of data modification.
(2) a kind of data encryption, data verification method and its system of the present invention are encrypted using four layers of HASH, When data verification, data encryption verifying is all carried out each time, data modification, requires to test by four layers of Encryption Algorithm each time Card.
Detailed description of the invention
The accompanying drawings constituting a part of this application is used to provide further understanding of the present application, and the application's shows Meaning property embodiment and its explanation are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 is a kind of data encryption network topology structure figure according to one or more embodiments;
Fig. 2 is the data ciphering method flow chart according to one or more embodiments;
Fig. 3 is the data verification method flow chart according to one or more embodiments.
Specific embodiment:
Below in conjunction with the attached drawing in one or more other embodiments of the present disclosure, to one or more other embodiments of the present disclosure In technical solution be clearly and completely described, it is clear that described embodiments are only a part of the embodiments of the present invention, Instead of all the embodiments.Based on one or more other embodiments of the present disclosure, those of ordinary skill in the art are not being made Every other embodiment obtained, shall fall within the protection scope of the present invention under the premise of creative work.
It is noted that following detailed description is all illustrative, it is intended to provide further instruction to the application.Unless another It indicates, all technical and scientific terms that the present embodiment uses have and the application person of an ordinary skill in the technical field Normally understood identical meanings.
It should be noted that term used herein above is merely to describe specific embodiment, and be not intended to restricted root According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singular Also it is intended to include plural form, additionally, it should be understood that, when in the present specification using term "comprising" and/or " packet Include " when, indicate existing characteristics, step, operation, device, component and/or their combination.
It should be noted that flowcharts and block diagrams in the drawings show according to various embodiments of the present disclosure method and The architecture, function and operation in the cards of system.It should be noted that each box in flowchart or block diagram can represent A part of one module, program segment or code, a part of the module, program segment or code may include one or more A executable instruction for realizing the logic function of defined in each embodiment.It should also be noted that some alternately Realization in, function marked in the box can also occur according to the sequence that is marked in attached drawing is different from.For example, two connect The box even indicated can actually be basically executed in parallel or they can also be executed in a reverse order sometimes, This depends on related function.It should also be noted that each box and flow chart in flowchart and or block diagram And/or the combination of the box in block diagram, the dedicated hardware based system that functions or operations as defined in executing can be used are come It realizes, or the combination of specialized hardware and computer instruction can be used to realize.
In the absence of conflict, the feature in the embodiment and embodiment in the disclosure can be combined with each other, and tie below It closes attached drawing and embodiment is described further the disclosure.
One or more other embodiments of the present disclosure are by taking medical industry as an example.A kind of data four in population health platform are provided Layer HASH encryption method, this method is not limited in the population health platform in medical industry, in the data encryption of other industry In be still applicable in.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of data encryption system is provided.As shown in Figure 1 Four layers of HASH be encrypted in network deployment topological structure.
A kind of data encryption system, comprising:
Several block chain servers, each block chain server connect Data Mart service by data routing server Device.
Four layers of HASH encryption carry out first layer encryption in the database of Data Mart server respectively, then on data road By carrying out second layer encryption on server, third layer and the 4th layer of encryption are finally carried out on block chain server.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of data ciphering method is provided.Such as Fig. 2 institute Show.
A kind of data ciphering method, this method comprises:
Step (1): first layer encryption is carried out in Data Mart server, data content is added by Encryption Algorithm It is close, it generates data ciphertext and saves;
Further, in the method, the specific method step of the first layer encryption includes:
Step (1-1): setting needs the critical data item encrypted;Obtain data;
Step (1-2): the critical data item encrypted according to the needs of setting obtains the key for needing to encrypt in every data The data content of data item;
Step (1-3): encrypting data content using specific Encryption Algorithm, generates data ciphertext and saves, complete It is encrypted at first layer.
Step (2): carrying out second layer encryption in data routing server, and data are generated to corresponding data when indexing and are added Confidential information saves, and merges with first layer encrypted cipher text and encrypted, and generates index data ciphertext and saves;
Further, in the method, the specific method step of the second layer encryption includes:
Step (2-1): acquisition data generate index when, by corresponding data encryption information separately as data item into Row saves;
Step (2-2): carrying out computations together with the critical data item in first layer encryption for the data item of preservation, raw It at index data ciphertext and saves, completes second layer encryption.
Step (3): carrying out third time encryption in block chain server will be multiple when index data stores within a block The encryption of index data combination of two, to encrypted result, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved step by step;
Further, in the method, the specific method step of the third layer encryption includes:
Step (3-1): when storing index data within a block, multiple index data combination of two encryptions will be indexed Data (including ciphertext after index encryption) carry out HASH encryption, form hexadecimal data;
Step (3-1): the encrypted data of HASH are stored in transaction as message;
Step (3-1): to the transaction having been filed on, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved, are completed step by step Third layer encryption.
Step (4): the 4th encryption is carried out in block chain server, by upper block ciphertext and this block transaction encryption Ciphertext combination, generates the block encryption ciphertext of this block and keeps, and completes four layers of HASH encryption.
Further, in the method, the specific method step of the 4th layer of encryption includes:
To the block newly formed, using the block transaction encryption ciphertext of a upper block as the area of a data item and this block Block transaction encryption ciphertext forms the block encryption ciphertext of this block, until the block of block chain network is all linked with one another, completes the 4th Secondary encryption.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of data verification method is provided.Such as Fig. 3 institute Show.
A kind of data verification method, this method are based on a kind of data ciphering method, comprising:
Step (1): obtaining the encrypted cipher text of a certain block, and in block transaction to block transaction re-encrypted, comparison adds Close content carries out comparison of coherence, if inconsistent, otherwise data verification failure enters in next step;
Step (2): obtaining index encrypted cipher text, when data are generated and indexed to index data re-encrypted, comparison encryption Content carries out comparison of coherence, if inconsistent, otherwise data verification failure enters in next step;
Step (3): obtaining data encryption ciphertext, to data content re-encrypted, compares encrypted content, carries out consistency ratio Compared with, if inconsistent, data verification failure, otherwise data verification success.
According to the other side of one or more other embodiments of the present disclosure, a kind of computer-readable storage medium is also provided Matter.
A kind of computer readable storage medium, wherein being stored with a plurality of instruction, described instruction is suitable for by terminal device Reason device loads and executes a kind of data verification method.
According to the other side of one or more other embodiments of the present disclosure, a kind of terminal device is also provided.
A kind of terminal device, using internet terminal equipment, including processor and computer readable storage medium, processor For realizing each instruction;Computer readable storage medium is suitable for by processor load simultaneously for storing a plurality of instruction, described instruction Execute a kind of data verification method.
It should be understood by those skilled in the art that, embodiment of the disclosure can provide as method, system or computer program Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the disclosure Formula.Moreover, the disclosure, which can be used, can use storage in the computer that one or more wherein includes computer usable program code The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The disclosure is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present disclosure Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random AccessMemory, RAM) etc..
The disclosure the utility model has the advantages that
(1) a kind of data encryption, data verification method and its system of the present invention are encrypted, layer using four layers of HASH Layer is related, and each layer all can be using upper one layer of encrypted content as the encrypted entry of this layer, if carrying out data modification, needing will be every One layer of encrypted content is modified, and the difficulty of data modification is improved, while also reducing the probability of data modification.
(2) a kind of data encryption, data verification method and its system of the present invention are encrypted using four layers of HASH, When data verification, data encryption verifying is all carried out each time, data modification, requires to test by four layers of Encryption Algorithm each time Card.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.Therefore, the present invention is not intended to be limited to this These embodiments shown in text, and it is to fit to the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. a kind of data ciphering method, which is characterized in that this method comprises:
First layer encryption is carried out in Data Mart server, data content is encrypted by Encryption Algorithm, generates data Ciphertext simultaneously saves;
Second layer encryption is carried out in data routing server, and data are generated to corresponding data encryption information preservation when indexing, And merges with first layer encrypted cipher text and encrypted, generate index data ciphertext and save;
Third time encryption is carried out in block chain server, when index data stores within a block, two-by-two by multiple index datas Combined ciphering, to encrypted result, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved step by step;
The 4th encryption is carried out in block chain server, combines upper block ciphertext with this block transaction encryption ciphertext, it is raw The block encryption ciphertext of cost block is simultaneously kept, and completes four layers of HASH encryption.
2. a kind of data ciphering method as described in claim 1, which is characterized in that in the method, the first layer encryption Specific method step include:
Setting needs the critical data item encrypted;
According to the critical data item that the needs of setting encrypt, in the data for obtaining the critical data item for needing to encrypt in every data Hold;
Data content is encrypted by Encryption Algorithm, generate data ciphertext and is saved, first layer encryption is completed.
3. a kind of data ciphering method as described in claim 1, which is characterized in that in the method, the second layer encryption Specific method step include:
According to the data of acquisition generate index when, by the corresponding data encryption information of index data separately as index data item into Row saves;
Computations are carried out after the index data item of preservation is merged with the data ciphertext in first layer encryption, generate index data Ciphertext simultaneously saves, and completes second layer encryption.
4. a kind of data ciphering method as described in claim 1, which is characterized in that in the method, the third layer encryption Specific method step include:
When index data stores within a block, multiple index data combination of two encryptions are close by index data and index data Text carries out HASH encryption;
The encrypted data of HASH are stored in transaction as message;
To the transaction having been filed on, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved step by step, complete third layer encryption.
5. a kind of data ciphering method as claimed in claim 4, which is characterized in that in the method, by index data and Index data ciphertext carries out HASH encryption, forms hexadecimal data.
6. a kind of data ciphering method as described in claim 1, which is characterized in that in the method, the 4th layer of encryption Specific method step include:
To the block newly formed, handed over the block transaction encryption ciphertext of a upper block as the block an of data item and this block Easy encrypted cipher text forms the block encryption ciphertext of this block, until the block of block chain network is all linked with one another, completes the 4th time and adds It is close.
7. a kind of data encryption system, which is characterized in that based on such as a kind of data encryption of any of claims 1-6 Method, comprising:
Several block chain servers, each block chain server connect Data Mart server by data routing server.
8. a kind of data verification method, which is characterized in that a kind of this method data for example of any of claims 1-6 add Decryption method, comprising:
The encrypted cipher text for obtaining a certain block carries out comparison of coherence, if not in block transaction to block transaction re-encrypted Unanimously, then otherwise data verification failure enters in next step;
Index encrypted cipher text is obtained, when data are generated and indexed to index data re-encrypted, comparison of coherence is carried out, if different It causes, then data verification failure, otherwise enters in next step;
Data encryption ciphertext is obtained, to data content re-encrypted, carries out comparison of coherence, if inconsistent, data verification is lost It loses, otherwise data verification success.
9. a kind of computer readable storage medium, wherein being stored with a plurality of instruction, which is characterized in that described instruction is suitable for by terminal The processor of equipment loads and executes a kind of data verification method as claimed in claim 8.
10. a kind of terminal device, using internet terminal equipment, including processor and computer readable storage medium, processor For realizing each instruction;Computer readable storage medium is for storing a plurality of instruction, which is characterized in that described instruction be suitable for by Reason device loads and executes a kind of data verification method as claimed in claim 8.
CN201811295947.4A 2018-11-01 2018-11-01 Data encryption and data verification method and system Active CN109359477B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811295947.4A CN109359477B (en) 2018-11-01 2018-11-01 Data encryption and data verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811295947.4A CN109359477B (en) 2018-11-01 2018-11-01 Data encryption and data verification method and system

Publications (2)

Publication Number Publication Date
CN109359477A true CN109359477A (en) 2019-02-19
CN109359477B CN109359477B (en) 2020-06-23

Family

ID=65343697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811295947.4A Active CN109359477B (en) 2018-11-01 2018-11-01 Data encryption and data verification method and system

Country Status (1)

Country Link
CN (1) CN109359477B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113282810A (en) * 2021-05-08 2021-08-20 国电南瑞科技股份有限公司 Block chain hash-based encrypted electric power transaction data post-verification method and device
CN113569262A (en) * 2021-07-30 2021-10-29 立信(重庆)数据科技股份有限公司 Ciphertext storage method and system based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106059762A (en) * 2016-07-26 2016-10-26 江苏国泰新点软件有限公司 Data security processing method and apparatus
CN106921677A (en) * 2017-04-20 2017-07-04 陈少峰 A kind of multiple encryption system of block chain houseclearing
CN107222482A (en) * 2017-06-01 2017-09-29 黑龙江卓亚科技有限公司 A kind of data management system and method based on compound block chain network
CN108462568A (en) * 2018-02-11 2018-08-28 西安电子科技大学 A kind of secure file storage and sharing method based on block chain
US10114969B1 (en) * 2015-08-04 2018-10-30 Jordan White Chaney Ultra-secure blockchain-based electronic information transfer system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10114969B1 (en) * 2015-08-04 2018-10-30 Jordan White Chaney Ultra-secure blockchain-based electronic information transfer system
CN106059762A (en) * 2016-07-26 2016-10-26 江苏国泰新点软件有限公司 Data security processing method and apparatus
CN106921677A (en) * 2017-04-20 2017-07-04 陈少峰 A kind of multiple encryption system of block chain houseclearing
CN107222482A (en) * 2017-06-01 2017-09-29 黑龙江卓亚科技有限公司 A kind of data management system and method based on compound block chain network
CN108462568A (en) * 2018-02-11 2018-08-28 西安电子科技大学 A kind of secure file storage and sharing method based on block chain

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113282810A (en) * 2021-05-08 2021-08-20 国电南瑞科技股份有限公司 Block chain hash-based encrypted electric power transaction data post-verification method and device
CN113282810B (en) * 2021-05-08 2022-11-15 国电南瑞科技股份有限公司 Block chain hash-based encrypted electric power transaction data post-verification method and device
CN113569262A (en) * 2021-07-30 2021-10-29 立信(重庆)数据科技股份有限公司 Ciphertext storage method and system based on block chain
CN113569262B (en) * 2021-07-30 2022-05-10 立信(重庆)数据科技股份有限公司 Ciphertext storage method and system based on block chain

Also Published As

Publication number Publication date
CN109359477B (en) 2020-06-23

Similar Documents

Publication Publication Date Title
TWI694350B (en) Information supervision method and device based on blockchain
Pyoung et al. Blockchain of finite-lifetime blocks with applications to edge-based IoT
CN108200208B (en) Logistics block chain consensus algorithm based on cloud computing
CN105893042A (en) Intelligent contract implementation method based on block chain
CN106293648B (en) Services Composition behavior compliance measure based on Route Dependence figure
CN110225095B (en) Data processing method, device and system
Oktay et al. SEMROD: secure and efficient MapReduce over hybrid clouds
CN107256243A (en) A kind of data access card method and its device based on multiple hash algorithm
CN110597785A (en) Automobile part remanufacturing sharing system based on block chain and private cloud
CN112835977A (en) Database management method and system based on block chain
Zhang et al. A knowledge sharing framework for green supply chain management based on blockchain and edge computing
CN109359477A (en) A kind of data encryption, data verification method and its system
Archetti et al. A branch-and-price algorithm for the robust graph coloring problem
CN106712928A (en) Big data rainbow table based decryption method and device
CN112380179A (en) Block chain-based steel supply chain information secret sharing method and system
CN116415203A (en) Government information intelligent fusion system and method based on big data
Wang Blockfedml: Blockchained federated machine learning systems
CN113886890A (en) Digital resource co-construction sharing method and device
CN110555783A (en) block chain-based power marketing data protection method and system
CN106250453A (en) The cipher text retrieval method of numeric type data based on cloud storage and device
CN113810185B (en) Anti-trapdoor leakage on-chain data restoration system and method
CN113064731B (en) Cloud-edge-architecture-based big data processing terminal device, processing method and medium
CN114036577A (en) Coalition chain-oriented supervision method and supervision digital twin model
CN114168268A (en) Container technology-based intelligent distribution data acquisition and fusion method and system
Salehi Integration of blockchain technologie in case of systems engineering and software engineering in an industrial context

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 12 / F, building 1, Aosheng building, 1166 Xinluo street, hi tech Zone, Jinan City, Shandong Province

Patentee after: Zhongyang Health Technology Group Co.,Ltd.

Address before: 12 / F, building 1, Aosheng building, 1166 Xinluo street, hi tech Zone, Jinan City, Shandong Province

Patentee before: SHANDONG MSUNHEALTH TECHNOLOGY GROUP Co.,Ltd.