CN109359477A - A kind of data encryption, data verification method and its system - Google Patents
A kind of data encryption, data verification method and its system Download PDFInfo
- Publication number
- CN109359477A CN109359477A CN201811295947.4A CN201811295947A CN109359477A CN 109359477 A CN109359477 A CN 109359477A CN 201811295947 A CN201811295947 A CN 201811295947A CN 109359477 A CN109359477 A CN 109359477A
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- block
- ciphertext
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of data encryption, data verification method and its system, data ciphering method, method includes: the progress first layer encryption in Data Mart server, is encrypted to data content by Encryption Algorithm, generates data ciphertext and saves;Second layer encryption is carried out in data routing server, data is generated to corresponding data encryption information preservation when indexing, and merge with first layer encrypted cipher text and encrypted, generate index data ciphertext and save;Third time encryption is carried out in block chain server, when index data stores within a block, multiple index data combination of two are encrypted, and to encrypted result, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved step by step;The 4th encryption is carried out in block chain server, combines upper block ciphertext with this block transaction encryption ciphertext, generates the block encryption ciphertext of this block and keep, and completes four layers of HASH encryption.
Description
Technical field
The disclosure belongs to the technical field of data encryption, is related to a kind of data encryption, data verification method and its system, especially
It is related to a kind of data ciphering method based on block chain and its system and a kind of data verification method based on block chain and
Its system.
Background technique
Only there is provided background technical informations relevant to the disclosure for the statement of this part, it is not necessary to so constitute first skill
Art.
With the application of information technology developed with it in different industries every aspect, the factor of constraint informationization development exists
It is gradually highlighted during the landing of various information demand.Each department is contained in same industry, and each department is all with itself
Business demand set out, respectively develop application system, these systems be respectively it is used, data are difficult to carry out effective integration, it is difficult to
Comprehensive various information is provided, due to the problems such as information talent lacks, capital matching problem and mechanism system are unsound, is led
The maintenance, update, Perfect the work of operation system is caused to be difficult effectively to carry out, system is then increasingly becoming information island one by one.
It is to establish common data platform to carry out data management, common data platform that mainstream, which solves the mode of information island, at present
The data in different sources are uniformly summarized, it is unified to store, necessary data sharing, and logarithm are provided for other application system
According to effectively being accumulated.Such as in medical industry, current existing data usage mode all unites different medical organization data
One is aggregated into the consolidated storage of population health platform, then uses ESB data/address bus tool to data, provides number with the formation of interface
According to interface.Index data user is gone in the consolidated storage of population health platform by ESB interface and obtains data, every time from
Data content needed for being searched in Platform center library.However such mode for solving information island has been unable to satisfy wanting at this stage
It asks, can not ensure the effective use of data.Therefore, block chain technology is applied in data management, ensure that data
Multinode storage.
The application and exploitation of block chain technology, digital-scrambling techniques are crucial.Once encryption method is cracked, block chain
Data safety will be challenged, block chain can not tamper will not exist.
Guarantee the not revisable mode of data at present, generally by first primary encryption preservation is carried out to data, then exists
Re-encrypted and original encrypted content is carried out to data when use to compare, by comparison of coherence guarantee data not by
Modification.
However, under original not revisable mechanism of guarantee data, if encryption method leakage or cracked, others into
After row data modification, it can still ensure that encrypted content is constant, then lose the meaning for preventing data modification.
Summary of the invention
For the deficiencies in the prior art, one or more other embodiments of the present disclosure provide a kind of data encryption,
Data verification method and its system are based on block chain technology, related layer by layer by four layers of Encryption Algorithm, effectively prevent to data
Modification, improve Information Security.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of data ciphering method is provided.
A kind of data ciphering method, this method comprises:
First layer encryption is carried out in Data Mart server, data content is encrypted by Encryption Algorithm, is generated
Data ciphertext simultaneously saves;
Second layer encryption is carried out in data routing server, and data are generated to corresponding data encryption information when indexing and are protected
It deposits, and merges with first layer encrypted cipher text and encrypted, generate index data ciphertext and save;
Third time encryption is carried out in block chain server, when index data stores within a block, by multiple index datas
Combination of two encryption, to encrypted result, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved step by step;
The 4th encryption is carried out in block chain server, by upper block ciphertext and this block transaction encryption ciphertext group
It closes, generates the block encryption ciphertext of this block and keep, complete four layers of HASH encryption.
Further, in the method, the specific method step of the first layer encryption includes:
Setting needs the critical data item encrypted;
According to the critical data item that the needs of setting encrypt, the number for the critical data item for needing to encrypt in every data is obtained
According to content;
Data content is encrypted by Encryption Algorithm, generate data ciphertext and is saved, first layer encryption is completed.
Further, in the method, the specific method step of the second layer encryption includes:
When generating index according to the data of acquisition, by the corresponding data encryption information of index data separately as index data
Item is saved;
Computations are carried out after the index data item of preservation is merged with the data ciphertext in first layer encryption, generate index
Data ciphertext simultaneously saves, and completes second layer encryption.
Further, in the method, the specific method step of the third layer encryption includes:
When index data stores within a block, multiple index data combination of two encryptions, by index data and index number
HASH encryption is carried out according to ciphertext;
The encrypted data of HASH are stored in transaction as message;
To the transaction having been filed on, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved step by step, complete third layer encryption.
Further, in the method, index data and index data ciphertext are subjected to HASH encryption, formed 16 into
Data processed.
Further, in the method, the specific method step of the 4th layer of encryption includes:
To the block newly formed, using the block transaction encryption ciphertext of a upper block as the area of a data item and this block
Block transaction encryption ciphertext forms the block encryption ciphertext of this block, until the block of block chain network is all linked with one another, completes the 4th
Secondary encryption.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of data encryption system is provided.
A kind of data encryption system, based on a kind of data ciphering method, comprising:
Several block chain servers, each block chain server connect Data Mart service by data routing server
Device.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of data verification method is provided.
A kind of data verification method, this method are based on a kind of data ciphering method, comprising:
The encrypted cipher text for obtaining a certain block carries out comparison of coherence in block transaction to block transaction re-encrypted,
If inconsistent, otherwise data verification failure enters in next step;
Index encrypted cipher text is obtained, when data are generated and indexed to index data re-encrypted, carries out comparison of coherence, if
Inconsistent, then data verification failure, otherwise enters in next step;
Data encryption ciphertext is obtained, to data content re-encrypted, carries out comparison of coherence, if inconsistent, data are tested
Card failure, otherwise data verification success.
According to the other side of one or more other embodiments of the present disclosure, a kind of computer-readable storage medium is also provided
Matter.
A kind of computer readable storage medium, wherein being stored with a plurality of instruction, described instruction is suitable for by terminal device
Reason device loads and executes a kind of data verification method.
According to the other side of one or more other embodiments of the present disclosure, a kind of terminal device is also provided.
A kind of terminal device, using internet terminal equipment, including processor and computer readable storage medium, processor
For realizing each instruction;Computer readable storage medium is suitable for by processor load simultaneously for storing a plurality of instruction, described instruction
Execute a kind of data verification method.
The disclosure the utility model has the advantages that
(1) a kind of data encryption, data verification method and its system of the present invention are encrypted, layer using four layers of HASH
Layer is related, and each layer all can be using upper one layer of encrypted content as the encrypted entry of this layer, if carrying out data modification, needing will be every
One layer of encrypted content is modified, and the difficulty of data modification is improved, while also reducing the probability of data modification.
(2) a kind of data encryption, data verification method and its system of the present invention are encrypted using four layers of HASH,
When data verification, data encryption verifying is all carried out each time, data modification, requires to test by four layers of Encryption Algorithm each time
Card.
Detailed description of the invention
The accompanying drawings constituting a part of this application is used to provide further understanding of the present application, and the application's shows
Meaning property embodiment and its explanation are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 is a kind of data encryption network topology structure figure according to one or more embodiments;
Fig. 2 is the data ciphering method flow chart according to one or more embodiments;
Fig. 3 is the data verification method flow chart according to one or more embodiments.
Specific embodiment:
Below in conjunction with the attached drawing in one or more other embodiments of the present disclosure, to one or more other embodiments of the present disclosure
In technical solution be clearly and completely described, it is clear that described embodiments are only a part of the embodiments of the present invention,
Instead of all the embodiments.Based on one or more other embodiments of the present disclosure, those of ordinary skill in the art are not being made
Every other embodiment obtained, shall fall within the protection scope of the present invention under the premise of creative work.
It is noted that following detailed description is all illustrative, it is intended to provide further instruction to the application.Unless another
It indicates, all technical and scientific terms that the present embodiment uses have and the application person of an ordinary skill in the technical field
Normally understood identical meanings.
It should be noted that term used herein above is merely to describe specific embodiment, and be not intended to restricted root
According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singular
Also it is intended to include plural form, additionally, it should be understood that, when in the present specification using term "comprising" and/or " packet
Include " when, indicate existing characteristics, step, operation, device, component and/or their combination.
It should be noted that flowcharts and block diagrams in the drawings show according to various embodiments of the present disclosure method and
The architecture, function and operation in the cards of system.It should be noted that each box in flowchart or block diagram can represent
A part of one module, program segment or code, a part of the module, program segment or code may include one or more
A executable instruction for realizing the logic function of defined in each embodiment.It should also be noted that some alternately
Realization in, function marked in the box can also occur according to the sequence that is marked in attached drawing is different from.For example, two connect
The box even indicated can actually be basically executed in parallel or they can also be executed in a reverse order sometimes,
This depends on related function.It should also be noted that each box and flow chart in flowchart and or block diagram
And/or the combination of the box in block diagram, the dedicated hardware based system that functions or operations as defined in executing can be used are come
It realizes, or the combination of specialized hardware and computer instruction can be used to realize.
In the absence of conflict, the feature in the embodiment and embodiment in the disclosure can be combined with each other, and tie below
It closes attached drawing and embodiment is described further the disclosure.
One or more other embodiments of the present disclosure are by taking medical industry as an example.A kind of data four in population health platform are provided
Layer HASH encryption method, this method is not limited in the population health platform in medical industry, in the data encryption of other industry
In be still applicable in.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of data encryption system is provided.As shown in Figure 1
Four layers of HASH be encrypted in network deployment topological structure.
A kind of data encryption system, comprising:
Several block chain servers, each block chain server connect Data Mart service by data routing server
Device.
Four layers of HASH encryption carry out first layer encryption in the database of Data Mart server respectively, then on data road
By carrying out second layer encryption on server, third layer and the 4th layer of encryption are finally carried out on block chain server.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of data ciphering method is provided.Such as Fig. 2 institute
Show.
A kind of data ciphering method, this method comprises:
Step (1): first layer encryption is carried out in Data Mart server, data content is added by Encryption Algorithm
It is close, it generates data ciphertext and saves;
Further, in the method, the specific method step of the first layer encryption includes:
Step (1-1): setting needs the critical data item encrypted;Obtain data;
Step (1-2): the critical data item encrypted according to the needs of setting obtains the key for needing to encrypt in every data
The data content of data item;
Step (1-3): encrypting data content using specific Encryption Algorithm, generates data ciphertext and saves, complete
It is encrypted at first layer.
Step (2): carrying out second layer encryption in data routing server, and data are generated to corresponding data when indexing and are added
Confidential information saves, and merges with first layer encrypted cipher text and encrypted, and generates index data ciphertext and saves;
Further, in the method, the specific method step of the second layer encryption includes:
Step (2-1): acquisition data generate index when, by corresponding data encryption information separately as data item into
Row saves;
Step (2-2): carrying out computations together with the critical data item in first layer encryption for the data item of preservation, raw
It at index data ciphertext and saves, completes second layer encryption.
Step (3): carrying out third time encryption in block chain server will be multiple when index data stores within a block
The encryption of index data combination of two, to encrypted result, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved step by step;
Further, in the method, the specific method step of the third layer encryption includes:
Step (3-1): when storing index data within a block, multiple index data combination of two encryptions will be indexed
Data (including ciphertext after index encryption) carry out HASH encryption, form hexadecimal data;
Step (3-1): the encrypted data of HASH are stored in transaction as message;
Step (3-1): to the transaction having been filed on, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved, are completed step by step
Third layer encryption.
Step (4): the 4th encryption is carried out in block chain server, by upper block ciphertext and this block transaction encryption
Ciphertext combination, generates the block encryption ciphertext of this block and keeps, and completes four layers of HASH encryption.
Further, in the method, the specific method step of the 4th layer of encryption includes:
To the block newly formed, using the block transaction encryption ciphertext of a upper block as the area of a data item and this block
Block transaction encryption ciphertext forms the block encryption ciphertext of this block, until the block of block chain network is all linked with one another, completes the 4th
Secondary encryption.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of data verification method is provided.Such as Fig. 3 institute
Show.
A kind of data verification method, this method are based on a kind of data ciphering method, comprising:
Step (1): obtaining the encrypted cipher text of a certain block, and in block transaction to block transaction re-encrypted, comparison adds
Close content carries out comparison of coherence, if inconsistent, otherwise data verification failure enters in next step;
Step (2): obtaining index encrypted cipher text, when data are generated and indexed to index data re-encrypted, comparison encryption
Content carries out comparison of coherence, if inconsistent, otherwise data verification failure enters in next step;
Step (3): obtaining data encryption ciphertext, to data content re-encrypted, compares encrypted content, carries out consistency ratio
Compared with, if inconsistent, data verification failure, otherwise data verification success.
According to the other side of one or more other embodiments of the present disclosure, a kind of computer-readable storage medium is also provided
Matter.
A kind of computer readable storage medium, wherein being stored with a plurality of instruction, described instruction is suitable for by terminal device
Reason device loads and executes a kind of data verification method.
According to the other side of one or more other embodiments of the present disclosure, a kind of terminal device is also provided.
A kind of terminal device, using internet terminal equipment, including processor and computer readable storage medium, processor
For realizing each instruction;Computer readable storage medium is suitable for by processor load simultaneously for storing a plurality of instruction, described instruction
Execute a kind of data verification method.
It should be understood by those skilled in the art that, embodiment of the disclosure can provide as method, system or computer program
Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the disclosure
Formula.Moreover, the disclosure, which can be used, can use storage in the computer that one or more wherein includes computer usable program code
The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The disclosure is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present disclosure
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random
AccessMemory, RAM) etc..
The disclosure the utility model has the advantages that
(1) a kind of data encryption, data verification method and its system of the present invention are encrypted, layer using four layers of HASH
Layer is related, and each layer all can be using upper one layer of encrypted content as the encrypted entry of this layer, if carrying out data modification, needing will be every
One layer of encrypted content is modified, and the difficulty of data modification is improved, while also reducing the probability of data modification.
(2) a kind of data encryption, data verification method and its system of the present invention are encrypted using four layers of HASH,
When data verification, data encryption verifying is all carried out each time, data modification, requires to test by four layers of Encryption Algorithm each time
Card.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field
For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair
Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.Therefore, the present invention is not intended to be limited to this
These embodiments shown in text, and it is to fit to the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. a kind of data ciphering method, which is characterized in that this method comprises:
First layer encryption is carried out in Data Mart server, data content is encrypted by Encryption Algorithm, generates data
Ciphertext simultaneously saves;
Second layer encryption is carried out in data routing server, and data are generated to corresponding data encryption information preservation when indexing,
And merges with first layer encrypted cipher text and encrypted, generate index data ciphertext and save;
Third time encryption is carried out in block chain server, when index data stores within a block, two-by-two by multiple index datas
Combined ciphering, to encrypted result, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved step by step;
The 4th encryption is carried out in block chain server, combines upper block ciphertext with this block transaction encryption ciphertext, it is raw
The block encryption ciphertext of cost block is simultaneously kept, and completes four layers of HASH encryption.
2. a kind of data ciphering method as described in claim 1, which is characterized in that in the method, the first layer encryption
Specific method step include:
Setting needs the critical data item encrypted;
According to the critical data item that the needs of setting encrypt, in the data for obtaining the critical data item for needing to encrypt in every data
Hold;
Data content is encrypted by Encryption Algorithm, generate data ciphertext and is saved, first layer encryption is completed.
3. a kind of data ciphering method as described in claim 1, which is characterized in that in the method, the second layer encryption
Specific method step include:
According to the data of acquisition generate index when, by the corresponding data encryption information of index data separately as index data item into
Row saves;
Computations are carried out after the index data item of preservation is merged with the data ciphertext in first layer encryption, generate index data
Ciphertext simultaneously saves, and completes second layer encryption.
4. a kind of data ciphering method as described in claim 1, which is characterized in that in the method, the third layer encryption
Specific method step include:
When index data stores within a block, multiple index data combination of two encryptions are close by index data and index data
Text carries out HASH encryption;
The encrypted data of HASH are stored in transaction as message;
To the transaction having been filed on, combined ciphering, generation block transaction encryption ciphertext are simultaneously saved step by step, complete third layer encryption.
5. a kind of data ciphering method as claimed in claim 4, which is characterized in that in the method, by index data and
Index data ciphertext carries out HASH encryption, forms hexadecimal data.
6. a kind of data ciphering method as described in claim 1, which is characterized in that in the method, the 4th layer of encryption
Specific method step include:
To the block newly formed, handed over the block transaction encryption ciphertext of a upper block as the block an of data item and this block
Easy encrypted cipher text forms the block encryption ciphertext of this block, until the block of block chain network is all linked with one another, completes the 4th time and adds
It is close.
7. a kind of data encryption system, which is characterized in that based on such as a kind of data encryption of any of claims 1-6
Method, comprising:
Several block chain servers, each block chain server connect Data Mart server by data routing server.
8. a kind of data verification method, which is characterized in that a kind of this method data for example of any of claims 1-6 add
Decryption method, comprising:
The encrypted cipher text for obtaining a certain block carries out comparison of coherence, if not in block transaction to block transaction re-encrypted
Unanimously, then otherwise data verification failure enters in next step;
Index encrypted cipher text is obtained, when data are generated and indexed to index data re-encrypted, comparison of coherence is carried out, if different
It causes, then data verification failure, otherwise enters in next step;
Data encryption ciphertext is obtained, to data content re-encrypted, carries out comparison of coherence, if inconsistent, data verification is lost
It loses, otherwise data verification success.
9. a kind of computer readable storage medium, wherein being stored with a plurality of instruction, which is characterized in that described instruction is suitable for by terminal
The processor of equipment loads and executes a kind of data verification method as claimed in claim 8.
10. a kind of terminal device, using internet terminal equipment, including processor and computer readable storage medium, processor
For realizing each instruction;Computer readable storage medium is for storing a plurality of instruction, which is characterized in that described instruction be suitable for by
Reason device loads and executes a kind of data verification method as claimed in claim 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811295947.4A CN109359477B (en) | 2018-11-01 | 2018-11-01 | Data encryption and data verification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811295947.4A CN109359477B (en) | 2018-11-01 | 2018-11-01 | Data encryption and data verification method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109359477A true CN109359477A (en) | 2019-02-19 |
CN109359477B CN109359477B (en) | 2020-06-23 |
Family
ID=65343697
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811295947.4A Active CN109359477B (en) | 2018-11-01 | 2018-11-01 | Data encryption and data verification method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109359477B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113282810A (en) * | 2021-05-08 | 2021-08-20 | 国电南瑞科技股份有限公司 | Block chain hash-based encrypted electric power transaction data post-verification method and device |
CN113569262A (en) * | 2021-07-30 | 2021-10-29 | 立信(重庆)数据科技股份有限公司 | Ciphertext storage method and system based on block chain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106059762A (en) * | 2016-07-26 | 2016-10-26 | 江苏国泰新点软件有限公司 | Data security processing method and apparatus |
CN106921677A (en) * | 2017-04-20 | 2017-07-04 | 陈少峰 | A kind of multiple encryption system of block chain houseclearing |
CN107222482A (en) * | 2017-06-01 | 2017-09-29 | 黑龙江卓亚科技有限公司 | A kind of data management system and method based on compound block chain network |
CN108462568A (en) * | 2018-02-11 | 2018-08-28 | 西安电子科技大学 | A kind of secure file storage and sharing method based on block chain |
US10114969B1 (en) * | 2015-08-04 | 2018-10-30 | Jordan White Chaney | Ultra-secure blockchain-based electronic information transfer system |
-
2018
- 2018-11-01 CN CN201811295947.4A patent/CN109359477B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10114969B1 (en) * | 2015-08-04 | 2018-10-30 | Jordan White Chaney | Ultra-secure blockchain-based electronic information transfer system |
CN106059762A (en) * | 2016-07-26 | 2016-10-26 | 江苏国泰新点软件有限公司 | Data security processing method and apparatus |
CN106921677A (en) * | 2017-04-20 | 2017-07-04 | 陈少峰 | A kind of multiple encryption system of block chain houseclearing |
CN107222482A (en) * | 2017-06-01 | 2017-09-29 | 黑龙江卓亚科技有限公司 | A kind of data management system and method based on compound block chain network |
CN108462568A (en) * | 2018-02-11 | 2018-08-28 | 西安电子科技大学 | A kind of secure file storage and sharing method based on block chain |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113282810A (en) * | 2021-05-08 | 2021-08-20 | 国电南瑞科技股份有限公司 | Block chain hash-based encrypted electric power transaction data post-verification method and device |
CN113282810B (en) * | 2021-05-08 | 2022-11-15 | 国电南瑞科技股份有限公司 | Block chain hash-based encrypted electric power transaction data post-verification method and device |
CN113569262A (en) * | 2021-07-30 | 2021-10-29 | 立信(重庆)数据科技股份有限公司 | Ciphertext storage method and system based on block chain |
CN113569262B (en) * | 2021-07-30 | 2022-05-10 | 立信(重庆)数据科技股份有限公司 | Ciphertext storage method and system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN109359477B (en) | 2020-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI694350B (en) | Information supervision method and device based on blockchain | |
Pyoung et al. | Blockchain of finite-lifetime blocks with applications to edge-based IoT | |
CN108200208B (en) | Logistics block chain consensus algorithm based on cloud computing | |
CN105893042A (en) | Intelligent contract implementation method based on block chain | |
CN106293648B (en) | Services Composition behavior compliance measure based on Route Dependence figure | |
CN110225095B (en) | Data processing method, device and system | |
Oktay et al. | SEMROD: secure and efficient MapReduce over hybrid clouds | |
CN107256243A (en) | A kind of data access card method and its device based on multiple hash algorithm | |
CN110597785A (en) | Automobile part remanufacturing sharing system based on block chain and private cloud | |
CN112835977A (en) | Database management method and system based on block chain | |
Zhang et al. | A knowledge sharing framework for green supply chain management based on blockchain and edge computing | |
CN109359477A (en) | A kind of data encryption, data verification method and its system | |
Archetti et al. | A branch-and-price algorithm for the robust graph coloring problem | |
CN106712928A (en) | Big data rainbow table based decryption method and device | |
CN112380179A (en) | Block chain-based steel supply chain information secret sharing method and system | |
CN116415203A (en) | Government information intelligent fusion system and method based on big data | |
Wang | Blockfedml: Blockchained federated machine learning systems | |
CN113886890A (en) | Digital resource co-construction sharing method and device | |
CN110555783A (en) | block chain-based power marketing data protection method and system | |
CN106250453A (en) | The cipher text retrieval method of numeric type data based on cloud storage and device | |
CN113810185B (en) | Anti-trapdoor leakage on-chain data restoration system and method | |
CN113064731B (en) | Cloud-edge-architecture-based big data processing terminal device, processing method and medium | |
CN114036577A (en) | Coalition chain-oriented supervision method and supervision digital twin model | |
CN114168268A (en) | Container technology-based intelligent distribution data acquisition and fusion method and system | |
Salehi | Integration of blockchain technologie in case of systems engineering and software engineering in an industrial context |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 12 / F, building 1, Aosheng building, 1166 Xinluo street, hi tech Zone, Jinan City, Shandong Province Patentee after: Zhongyang Health Technology Group Co.,Ltd. Address before: 12 / F, building 1, Aosheng building, 1166 Xinluo street, hi tech Zone, Jinan City, Shandong Province Patentee before: SHANDONG MSUNHEALTH TECHNOLOGY GROUP Co.,Ltd. |