CN109587146A - Method for managing object and system based on block chain - Google Patents
Method for managing object and system based on block chain Download PDFInfo
- Publication number
- CN109587146A CN109587146A CN201811511899.8A CN201811511899A CN109587146A CN 109587146 A CN109587146 A CN 109587146A CN 201811511899 A CN201811511899 A CN 201811511899A CN 109587146 A CN109587146 A CN 109587146A
- Authority
- CN
- China
- Prior art keywords
- block chain
- user
- identity
- object identity
- management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 238000012795 verification Methods 0.000 claims abstract description 25
- 238000013475 authorization Methods 0.000 claims description 22
- 238000004891 communication Methods 0.000 claims description 22
- 238000012986 modification Methods 0.000 claims description 12
- 230000004048 modification Effects 0.000 claims description 12
- 238000012217 deletion Methods 0.000 claims description 6
- 230000037430 deletion Effects 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 230000007246 mechanism Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 230000006399 behavior Effects 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 239000006185 dispersion Substances 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Abstract
The invention discloses a kind of method for managing object and system based on block chain.Wherein, this method comprises: obtaining the first user identifier for including in the object registration request received and the first data object in advance, the first object identity corresponding with the first data object is generated;The first object data information corresponding with the first object identity is obtained, by the first object data information and the first object identity and the first user identifier associated storage into block chain network;When receiving Object Management group request, the second user mark for including in Object Management group request and the second object identity are obtained, judges whether the corresponding user of second user mark has permission the second object identity of management according to preset Authority Verification rule;If so, being managed according to Object Management group request to the second object data information corresponding with the second object identity in block chain network.Which improves the safety of data object, and then the information sharing being advantageously implemented between data object.
Description
Technical field
The present invention relates to field of computer technology, and in particular to a kind of method for managing object and system based on block chain.
Background technique
With flourishing for internet, various entities can be conceptualized as corresponding data object, and borrow
Computer network is helped to realize the management operation of data object.It can be seen that Internet technology provides for the management of all kinds of entities
It is convenient.
But inventor has found in the implementation of the present invention, Object Management group mode in the prior art at least exists
Following defects: since different business departments may be corresponded respectively between each entity, for examining for information security etc.
Consider, data object corresponding to each entity is usually only shared inside the entity, often cannot achieve letter between different entities
Breath is mutually enjoyed, and " information island " is thus caused largely to exist.So-called information island refers to: not being associated with functionally between each other mutually
It helps, the not shared computer application system exchanged and information mutually disconnects with operation flow and application of information.It can be seen that existing
There is the Object Management group mode in technology to cannot achieve the association mutual assistance between each entity since safety is lower.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind
State the method for managing object and system based on block chain of problem.
According to an aspect of the invention, there is provided a kind of method for managing object based on block chain, comprising:
The first user identifier for including in the object registration request received and the first data object are obtained in advance, are generated
The first object identity corresponding with first data object;
The first object data information corresponding with first object identity is obtained, by first object data information
With first object identity and the first user identifier associated storage into block chain network;
When receiving Object Management group request, the second user mark for including in Object Management group request and the are obtained
Two object identities judge whether the corresponding user of the second user mark has permission pipe according to preset Authority Verification rule
Manage second object identity;
If so, being requested according to the Object Management group to corresponding with second object identity in the block chain network
Second object data information is managed.
According to another aspect of the present invention, a kind of Object Management System based on block chain is provided, comprising:
Identify storage server, suitable for obtain in advance receive object registration request in include the first user identifier with
And first data object, generate the first object identity corresponding with first data object;It obtains and first object
Corresponding first object data information is identified, by first object data information and first object identity and described
First user identifier associated storage is into block chain network;
ID management server includes suitable for obtaining in Object Management group request when receiving Object Management group request
Second user mark and the second object identity, according to preset Authority Verification rule judge second user mark it is right
Whether the user answered has permission management second object identity;If so, being requested according to the Object Management group to the block chain
The second object data information corresponding with second object identity is managed in network.
According to another aspect of the invention, provide a kind of electronic equipment, comprising: processor, memory, communication interface and
Communication bus, processor, memory and communication interface complete mutual communication by communication bus;
For memory for storing an at least executable instruction, it is above-mentioned based on block chain that executable instruction executes processor
The corresponding operation of method for managing object.
In accordance with a further aspect of the present invention, a kind of computer storage medium is provided, at least one is stored in storage medium
Executable instruction, executable instruction make processor execute such as the corresponding operation of the above-mentioned method for managing object based on block chain.
Disclosed method for managing object and system based on block chain according to the present invention, can be for the object note received
The first data object for including in volume request generates corresponding first object identity, and by the first object data information and first pair
As mark and the first user identifier associated storage are into block chain network;Correspondingly, when receiving Object Management group request, lead to
Crossing the second object identity for including in Object Management group request and preset Authority Verification rule can be managed.Thus may be used
See, in this approach, the object identity of each data object is stored by block chain network, and pass through preset Authority Verification
The access authority of each data object of rule control, to be obviously improved the safety of data object, and then is advantageously implemented
The association mutual assistance between information sharing and each entity between data object.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the flow diagram of the method for managing object based on block chain of one embodiment of the invention;
Fig. 2 shows the flow diagrams of the method for managing object based on block chain of another embodiment of the present invention;
Fig. 3 shows a kind of system structure of Object Management System based on block chain of further embodiment of this invention offer
Figure;
Fig. 4 shows the structural schematic diagram of a kind of electronic equipment according to an embodiment of the present invention;
Fig. 5 shows the structural schematic diagram of a form of block chain network.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
Fig. 1 shows the flow diagram of the method for managing object based on block chain of one embodiment of the invention.Such as Fig. 1
It is shown, this method comprises:
Step S110: the first user identifier and the first data for including in the object registration request received are obtained in advance
Object generates the first object identity corresponding with the first data object.
Wherein, object registration request can the transmission of the entity device as belonging to Various types of data object.For example, can be by enterprise
Electronic equipment is sent.The network entity for receiving object registration request can be a block chain node in block chain network,
It can also be the server or third party's node for accessing the block chain network and having certain processing capacity, in short, of the invention
The executing subject of this step is not limited.
Specifically, the first user identifier for including in object registration request is used to indicate the mark of the owner of data object
All kinds of marks such as information, such as user account, User ID.The first data object for including in object registration request is to be registered
Data object is specifically as follows Various types of data object, for example, it may be the traffic table etc. inside department.
In addition, can be generated by various modes, example when generating the first object identity corresponding with the first data object
Such as, can sequentially distribute, be randomly assigned, being generated according to information such as the object orienteds of data object by preset algorithm etc..This
An object mark is used for unique identification first data object, can be all kinds of forms such as identification code.
Step S120: obtaining corresponding with the first object identity the first object data information, by the first number of objects it is believed that
Breath is with the first object identity and the first user identifier associated storage into block chain network.
The first object data information corresponding with the first object identity refers to the particular content information of the first object identity.
In storage, for the ease of inquiry, needs to realize following both sides association: on the one hand, needing the first object data information
It is interrelated with the first object identity, in order to inquire the first object data information corresponding with the first object identity;Separately
On the one hand, need the first object identity and the first user identifier is interrelated, in order to determine that first object identity is gathered around
The person of having (registers the main body of first object identity).It is associated with, can be mentioned for subsequent management process by above-mentioned both sides
For convenience.
Specifically, by the first object data information and the first object identity and the first user identifier associated storage to block
When chain network, it can be stored by way of transaction record.Also, in order to promote safety, all kinds of common recognition algorithms can be passed through
Realize the verifying recorded to the transaction.The present invention stores details without limitation to specific.
Step S130: when receiving Object Management group request, the second user mark for including in Object Management group request is obtained
And second object identity, judge whether the corresponding user of second user mark has the right according to preset Authority Verification rule
Limit the second object identity of management.
Object Management group request can also be sent by all kinds of entity devices.For example, can be with the reality of sending object registration request
Body equipment is identical, can also be different.The second user mark for including in Object Management group request sends the Object Management group for indicating
The main body of request.The second object identity for including in Object Management group request is for identifying the Object Management group request mesh to be managed
Mark object.
Specifically, object promotes the safety of object by malicious access in order to prevent, in the present embodiment, further presses
Judge whether the corresponding user of second user mark has permission the second object identity of management according to preset Authority Verification rule.
The Authority Verification rule can be by being embodied in various ways.For example, can be pre-configured with during object registration, it can also be according to pre-
The user gradation first divided determines.It can prevent the malicious access of illegal user by the Authority Verification rule, it is ensured that block chain
The safety of the data object stored in network.
Step S140: if so, according to Object Management group request in block chain network corresponding with the second object identity the
Two object data informations are managed.
Specifically, the second object data information corresponding with the second object identity in block chain network is managed
When, it can realize by various modes, for example, read operation can be executed for the second object data information, modification operation, delete behaviour
Each generic operations such as work are specifically dependent upon the type of Object Management group request.
The disclosed method for managing object based on block chain according to the present invention, can be for the object registration request received
In include the first data object generate corresponding first object identity, and by the first object data information and the first object identity
And first user identifier associated storage into block chain network;Correspondingly, when receiving Object Management group request, pass through object
The second object identity and preset Authority Verification rule for including in management request can be managed.It can be seen that at this
In mode, the object identity of each data object is stored by block chain network, and pass through preset Authority Verification rule control
The access authority of each data object is made, to be obviously improved the safety of data object, and then is advantageously implemented data pair
As information sharing.
Fig. 2 shows the flow diagrams of the method for managing object based on block chain of another embodiment of the present invention.?
In the present embodiment, it can be realized based on block chain network shown in fig. 5.Fig. 5 shows a form of block chain network.Such as figure
Shown in 5, which includes multiple super nodes, more station identification servers and more resolution servers.Wherein, more
Identification server is requested the object registration by super node for receiving and processing object registration request from the user
In include information store into block chain network.More resolution servers are for receiving and processing Object Management group from the user
Request is parsed for the object identity for including in Object Management group request, and is obtained in block chain network according to parsing result
The corresponding information of storage.Certainly, the block chain network that the present invention is also based on other forms is realized, for example, can will identify
Server and resolution server are integrated on a server jointly or are further subdivided into multiple servers etc..
Wherein, identification (RNC-ID) analytic technology is to solve the key technology of " information island ".I.e. each article is compiled into specific
Data Identification pass through Data Identification during the transmitting of the information of industrial big data and realize interaction between object and object.Mark
The essence of knowledge is the technology of object for identification, so as to various information processing system, resource management system, Network Management System pair
Target object carries out related management and control.Identification (RNC-ID) analytic is each entity identified in network, is supported to the information of isomery
Intelligence association.
As shown in Fig. 2, method includes the following steps:
Step S200: the first user identifier and the first data for including in the object registration request received are obtained in advance
Object.
Wherein, object registration request can be sent by the owner of Various types of data object by all kinds of entity devices.This step
Rapid executing subject can be identification server shown in fig. 5.After receiving object registration request, by parsing the object
Registration request extracts the first user identifier wherein included and the first data object.Wherein, the first user identifier is used for table
Show all kinds of marks such as identification information of the owner of data object to be registered, such as user account, User ID.Object registration is asked
The first data object for including in asking is data object to be registered, is specifically as follows Various types of data object.
For example, each enterprise or tissue manage self-contained data object for the ease of passing through block chain, it is necessary first to build
Found the account of oneself, account information is above-mentioned user identifier, can one user of unique identification, the user may for enterprise
Industry user or organizing user.
In addition, due to the redundancy backup mechanism of block chain, it is desirable that all block chain nodes require to save the number of full dose
According to file, for this reason, it may be necessary to synchronize a large amount of data, for some block chain nodes for being not intended to participate in common recognition mechanism undoubtedly
It can take a substantial amount of time and resource.To solve the above-mentioned problems, the block chain network in the present embodiment is by block chain link click and sweep
Be divided into two class of full node and light node: full node needs to participate in common recognition operation, and needs the data file of synchronous full dose;And it gently saves
Point is then not involved in common recognition operation, without the data file of synchronous full dose, is only responsible for initiating the operation such as domain name operation requests.In addition,
For the ease of book keeping operation, light node can also vote to full node, further to be selected from full node according to voting results
Enumerate multiple super nodes.It can be seen that full node can further become super node, only become super node later
The record verifying and block that can participate in block chain are packaged.It correspondingly, can be according to itself hardware when each user establishes account
Resource and other factors are selected to full node or light node, to provide selection space for user.
It can be seen that in the present embodiment, corresponding data object is registered and managed by account, each account can only
The object oneself managed is operated, and can be modified, the operation such as deletion;Each account can initiate the behaviour such as newly-increased object requests
Make, corresponding data are stored to block chain after block chain node verification and are packaged.
Step S210: the first object identity corresponding with the first data object is generated.
For the ease of one data object of unique identification in block chain network, in the present embodiment, need to be stored in area
A unique object identity is arranged in each data object of block chain network, and the object identity is as the data object in block chain
The identity for storing and managing in network.
Specifically, it when generating the first object identity corresponding with the first data object, can extract and the first data
The corresponding characteristics of objects information of object (such as object oriented, object type, object properties, object owner's information etc.), so
Afterwards, calculated result corresponding with characteristics of objects information is calculated by preset algorithm, which is determined as and the first number
According to corresponding first object identity of object.In addition, the object identity of each object repeats in order to prevent, can be combined with
The timestamp information of object registration request generates the first object identity, can also generate a random number by random number algorithm,
And the random number is made to participate in calculating, to avoid repeating.It can be seen that first object identity is by preset algorithm, and root
What the timestamp information and random number information requested according to characteristics of objects information, object registration generated.In order to promote safety,
The preset algorithm can be Encryption Algorithm, and it is possible to encrypted by public key information corresponding with user account, so as to
It is decrypted in being based on the corresponding private key information of user account in subsequent management process, to ensure the only data object
Owner just have permission manage the object, prevent other main bodys malice management object.In short, the present invention does not limit the first object
The specific generating mode of mark, those skilled in the art can generate first object identity by all kinds of modes.
Step S220: obtaining corresponding with the first object identity the first object data information, by the first number of objects it is believed that
Breath is with the first object identity and the first user identifier associated storage into block chain network.
The first object data information corresponding with the first object identity refers to the particular content information of the first object identity,
It generally also include characteristics of objects information mentioned above.In storage, for the ease of inquiry, need to realize that following both sides is closed
Connection: on the one hand, need the first object data information and the first object identity is interrelated, in order to inquire and the first object
Identify corresponding first object data information;On the other hand, it needs mutually to close the first object identity and the first user identifier
Connection, in order to determine owner's (registering the main body of first object identity) of first object identity.Pass through above-mentioned two side
The association in face can provide convenience for subsequent management process.
Specifically, by the first object data information and the first object identity and the first user identifier associated storage to area
When in block chain network, it can be accomplished in that firstly, according to the first object data information, the first object identity and
One user identifier generates the first transaction record;Then, common recognition algorithm is passed through to this by each network node in block chain network
After first transaction record is verified, which is stored in block chain network;Wherein, the common recognition in the present embodiment is calculated
Method is mainly DPOS (Delegated ProofofStake appoints equity to prove) algorithm.The algorithm both can solve POW algorithm and exist
The problem of mass energy generated during mine crosses consumption is dug, is also avoided that " trust issuable under the mining rights of POS algorithm
The biased problem of balance ".Certainly, in addition to DPOS algorithm, can also using POS (ProofofStake, equity prove) algorithm or
POW (ProofofWork, proof of work) algorithm.
In addition, further including permission pipe in object registration request for the ease of setting the access authority of data object
Manage information, and by the first object data information and the first object identity and the first user identifier associated storage to block chain network
When, it needs authorization administration information and the first object identity associated storage.The authorization administration information subsequent for managing
It determines whether management subject has permission in journey and manages the data object.Wherein, authorization administration information includes: at least one permission class
Type and respectively user identifier set corresponding with various permission types;Wherein, permission type includes: to read permission, modification
Permission, and/or deletion permission.The action type that can be performed when can limit by permission type and manage the object.With power
The corresponding user identifier set of limit type is used to store the user identifier of whole users with the permission type.For example, needle
For reading permission, the user being only stored in user identifier set corresponding with permission is read, which just has permission, executes reading
Extract operation.Other than being managed according to permission type, it is also based on user type and is managed.For example, in advance will be complete
User in net is divided into multiple user types, such as advanced level user, intermediate users, less advanced users etc., then, respectively for each
The different administration authority of the user setting of seed type.Correspondingly, in subsequent management process, directly according to sending object management
The user type of the user of request judges whether it has permission the management operation for executing current type.
Step S230: when receiving Object Management group request, the second user mark for including in Object Management group request is obtained
And second object identity, judge whether the corresponding user of second user mark has the right according to preset Authority Verification rule
Limit the second object identity of management.
Wherein, which can be realized by the resolution server in Fig. 5, and the resolution server is firstly the need of for Object Management group
Request is parsed, to obtain second user mark wherein included and the second object identity.And it is further desired that being directed to second
Object identity is parsed, with the characteristics of objects information etc. for obtaining second object identity.Specific resolving can be by above
The inverse process of the generating process for the object identity mentioned realizes which is not limited by the present invention.For example, in parsing, by pre-
The inverse operation of imputation method obtain characteristics of objects information for generating object identity, object registration request timestamp information, with
And random number information etc., in order to according to the compliance of the Information Authentication Object Management group request got.
Wherein, Object Management group request can also be sent by all kinds of entity devices.For example, can be with sending object registration request
Entity device it is identical, can also be different.The second user mark for including in Object Management group request sends the object for indicating
Manage the main body of request.The second object identity for including in Object Management group request to be managed for identifying Object Management group request
Target object.
In fact, the first user identifier and the first object identity in the present embodiment refer to: sending object registration request
When corresponding user identifier and object identity.Second user mark and the second object identity in the present embodiment refer to:
Sending object management user identifier and object identity corresponding when requesting.Correspondingly, if Object Management group request is infused with object
Volume request is to be issued by same user for same target, then the first user identifier is identical as second user mark, first
Object identity and the second object identity.That is, first and second division is only used for distinguishing corresponding request type, without
For being distinguished to user identifier and object identity itself.
Specifically, judging whether the corresponding user of second user mark has the right according to preset Authority Verification rule
Limit management the second object identity when, can the authorization administration information according to corresponding to the second object identity, determine second user mark
Know whether corresponding user has permission management second object identity.For example, according to determining pair of type of Object Management group request
The permission type answered judges the user according to the user identifier set corresponding with permission type for including in authorization administration information
Whether have permission and manages second object identity.Wherein, the type of Object Management group request includes: that object query request, object are repaired
Change the newly-increased request of request, object removal request, and/or object.
Further optionally, whether the corresponding user of second user mark is being judged according to preset Authority Verification rule
Have permission management the second object identity when, can also judge second object identity whether with second user identify associated storage,
If so, determining that the corresponding user of second user mark has permission manages second object identity.Specifically, if this second pair
As mark and second user mark associated storage, then illustrate that second user mark is as the main body where second object identity
It is registered, i.e. owner of the second user mark corresponding to the second object identity.
Step S240: if so, according to Object Management group request in block chain network corresponding with the second object identity the
Two object data informations are managed.
Specifically, the second object data information corresponding with the second object identity in block chain network is managed
When, it can realize by various modes, for example, read operation can be executed for the second object data information, modification operation, delete behaviour
Each generic operations such as work are specifically dependent upon the type of Object Management group request.For example, being to modify the request of the Object Management group of action type
Example can be accomplished in that (i.e. one kind of Object Management group request is specific firstly, sending modification object requests by account
Type), it is broadcast to each block chain node;Then, by super node to requests verification legitimacy, after being verified, block chain
Node generates block using DPoS common recognition mechanism, is attached on block chain;Finally, completing object modification request.
Further optionally, in order to further enhance safety, by the first object data information and the first object identity and
When first user identifier associated storage is into block chain network, further judged according to the information type of the first object data information
Whether need to encrypt;If so, executing encryption for the first object data information and the first object identity and the first user identifier
Associated storage is into block chain network after operation.Wherein, need are being judged whether according to the information type of the first object data information
It when encrypting, can be set dynamically during object registration by object owner, type of encryption rule can also be preset, it should
Rule is for providing that type of object needs to encrypt, and correspondingly, is directly encrypted according to the type encryption rule to needs
Object data is encrypted.When specific encryption, it can be encrypted by the public key of object owner, in order to which object possesses
Person is decrypted by private key, to prevent non-object owner's malice tampering objects data.
It can be seen that in the present embodiment, enterprise carries out object registration, obtain object identity code (i.e. object identity), with
Just object data is stored in block chain.Block chain node is common to safeguard a distributed data base using DPoS common recognition mechanism.It answers
With program by requesting to resolution server, query object information realizes identification (RNC-ID) analytic.Wherein, data file and search engine
It cooperates, can guarantee search efficiency.Also, in order to further enhance safety, all access servers must all be carried out
Access authentication controls access authority.The access server includes identification server and resolution server in Fig. 5.
In addition, inventor has found in the implementation of the present invention: Most current enterprise-level information island there are main
Be based on the reason of following several respects: (1) lacking and trust: the information dispersion of each each link for participating in main body is stored in each main body
Inside, information is not transparent enough between each main body, information transmission speed is relatively slow, is easily artificially modified, and causes each main body each other
Between lack trust;(2) supervision retrospect is difficult: due to not setting up trust systems between each main body, once going wrong, lookup is asked
Efficiency is lower, the time is longer when inscribing reason, and proof is called to account difficulty, it is difficult to which supervision is traced to the source;(3) data transparency and secret protection are difficult to
Balance: on the one hand, according to legal provisions, the partial data of enterprise is provided to authorities, and leads to the public with other
Body proves submitted;On the other hand, because being related to trade secret, concern of data is to outward leakage again for enterprise, so that enterprise exists
Data transparency and secret protection are difficult to balance between the two;(4) the degree of automation is low: portion link needs manual entry data,
It is not carried out full automation, higher cost, efficiency are lower and error-prone.The present invention is by block chain technology come storage object letter
Breath can successfully solve the above problems.Block chain can be regarded as a kind of distributed data base, and block chain technology passes through more piece
Point collective safeguards the mode of entire information system, by the way of transferring to rely on mathematical algorithm independent of strong trust center, solution
In distributed data base of having determined the problem of data consistency.The present invention combines block chain technology with identification (RNC-ID) analytic, proposes
A kind of identification (RNC-ID) analytic system based on block chain can be realized facility registration service procedure and query service stream based on the system
Journey.
In the identification (RNC-ID) analytic system provided by the invention based on block chain, using block chain technology, completely save
It is open and clear, traceable and can not change to guarantee the data of record, while having encrypted privacy number therein for the data of each main body
According to solving trust problem, supervision problem and the data Privacy Protection of each main body, and provide difference for different user
The data query function of degree.Which does not depend on platform, either what type of platform, can access the system and from source
Shared and interaction, the data that information data is safely completed on head can be read safely.Each object in the present invention has only
One mark, is distributed unitedly by the whole world.Resolving is a series of security solution realized by servers by certification.Separately
Outside, in data plane, the data which type can be set can be taken out, and the data of which type cannot be taken out, can be by counting
It is controlled according to owner oneself.It can be realized with a low cost under the premise of safety and the seamless interfacing of original system and different application system
Inexpensive interoperability between system, effectively solution problem of detached island of information, realize cross-platform interdepartmental information share-and-exchange.
In addition, all identification servers in the present embodiment form block chain identification (RNC-ID) analytic network, it is a kind of without center
Mechanism or intermediate buffer respectively organize the peer-to-peer network of oneself record.Block chain technology itself and common recognition mechanism can be true
It protects data reliability (i.e. database is all identical for all nodes).Anyone can not cancel or change any note
Record, only specifically the record owner can be carried out relevant operation, it is ensured that Information Security.In addition, the block in the present embodiment
There are 2 kinds of modes: light node in chain network node, needing to rely on third-party server just can be carried out transaction, access network.Light node
The complete copy of All Activity is not saved, it is therefore necessary to be trusted third-party server to obtain trade confirmation, be occupied lesser
Hard drive space;Full node stores the entire transactions history of All Activity, can directly start to trade on network, independent of
Any other server or third party's service, occupies biggish hard drive space.User can according to need the corresponding section of selection
Dot pattern, wherein the full node for becoming super node is to participate in verifying and generate block, light node, which then only initiates transaction, is asked
It asks.
Fig. 3 shows a kind of system structure of Object Management System based on block chain of further embodiment of this invention offer
Figure, as shown in figure 3, the system comprises:
Storage server 31 is identified, suitable for obtaining the first user identifier for including in the object registration received request in advance
And first data object, generate the first object identity corresponding with first data object;It obtains and described first pair
As identifying corresponding first object data information, by first object data information and first object identity and institute
The first user identifier associated storage is stated into block chain network 30;
ID management server 32 is wrapped suitable for when receiving Object Management group request, obtaining in the Object Management group request
The second user mark contained and the second object identity judge that the second user identifies institute according to preset Authority Verification rule
Whether corresponding user has permission management second object identity;If so, being requested according to the Object Management group to the block
The second object data information corresponding with second object identity is managed in chain network 30.
Wherein, the mark storage server in Fig. 3 can be the identification server in Fig. 5, and ID management server can be with
For the resolution server in Fig. 5.
Optionally, authorization administration information, and the mark storage server are further included in the object registration request
It is particularly adapted to: by the authorization administration information and the first object identity associated storage;
Then the ID management server 32 is particularly adapted to:
According to authorization administration information corresponding to second object identity, determine corresponding to the second user mark
Whether user has permission management second object identity.
Optionally, the authorization administration information include: at least one permission type and respectively with various permission type phases
Corresponding user identifier set;Wherein, the permission type includes: to read permission, modification authority, and/or deletion permission;
And/or Object Management group request include: object query request, object modification request, object removal request and/
Or the newly-increased request of object.
Optionally, the ID management server 32 is particularly adapted to:
Judge whether second object identity with the second user identifies associated storage, if so, determining described the
User corresponding to two user identifiers has permission management second object identity.
Optionally, the mark storage server 31 is particularly adapted to:
Judge whether to need to encrypt according to the information type of first object data information;
If so, being held for first object data information with first object identity and first user identifier
Associated storage is into block chain network after row cryptographic operation.
Optionally, the mark storage server 31 is particularly adapted to:
According to first object data information, first object identity and first user identifier, the is generated
One transaction record;
First transaction record is verified by algorithm of knowing together by each network node in the block chain network
Afterwards, which is stored in block chain network;Wherein, the common recognition algorithm includes: DPOS algorithm.
The specific structure and working principle of above-mentioned each equipment can refer to the description of corresponding steps in embodiment of the method, herein
It repeats no more.
The embodiment of the present application provides a kind of nonvolatile computer storage media, and computer storage medium is stored at least
One executable instruction, the computer executable instructions can be performed in above-mentioned any means embodiment based on block chain to orthicon
Reason method.
Fig. 4 shows the structural schematic diagram of a kind of electronic equipment according to an embodiment of the present invention, the specific embodiment of the invention
The specific implementation of electronic equipment is not limited.
As shown in figure 4, the electronic equipment may include: processor (processor) 402, communication interface
(Communications Interface) 404, memory (memory) 406 and communication bus 408.
Wherein:
Processor 402, communication interface 404 and memory 406 complete mutual communication by communication bus 408.
Communication interface 404, for being communicated with the network element of other equipment such as client or other servers etc..
It is real can specifically to execute the above-mentioned method for managing object based on block chain for executing program 410 for processor 402
Apply the correlation step in example.
Specifically, program 410 may include program code, which includes computer operation instruction.
Processor 402 may be central processor CPU or specific integrated circuit ASIC (Application
Specific Integrated Circuit), or be arranged to implement the integrated electricity of one or more of the embodiment of the present invention
Road.The one or more processors that electronic equipment includes can be same type of processor, such as one or more CPU;It can also
To be different types of processor, such as one or more CPU and one or more ASIC.
Memory 406, for storing program 410.Memory 406 may include high speed RAM memory, it is also possible to further include
Nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.
Program 410 specifically can be used for so that processor 402 executes the above-mentioned method for managing object based on block chain and implements
Correlation step in example.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein.
Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
Microprocessor or digital signal processor (DSP) realize the Object Management group dress according to an embodiment of the present invention based on block chain
The some or all functions of some or all components in setting.The present invention is also implemented as described here for executing
Method some or all device or device programs (for example, computer program and computer program product).This
The program that the realization of sample is of the invention can store on a computer-readable medium, or can have one or more signal
Form.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other
Form provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
The invention also discloses a kind of method for managing object based on block chain of A1., comprising:
The first user identifier for including in the object registration request received and the first data object are obtained in advance, are generated
The first object identity corresponding with first data object;
The first object data information corresponding with first object identity is obtained, by first object data information
With first object identity and the first user identifier associated storage into block chain network;
When receiving Object Management group request, the second user mark for including in Object Management group request and the are obtained
Two object identities judge whether the corresponding user of the second user mark has permission pipe according to preset Authority Verification rule
Manage second object identity;
If so, being requested according to the Object Management group to corresponding with second object identity in the block chain network
Second object data information is managed.
A2. the method according to claim A1, wherein further include rights management in the object registration request
Information, and described first object data information is associated with and is deposited with first object identity and first user identifier
It stores up and is specifically included in block chain network: by the authorization administration information and the first object identity associated storage;
It is then described to judge whether the corresponding user of the second user mark has the right according to preset Authority Verification rule
Limit manages second object identity and specifically includes:
According to authorization administration information corresponding to second object identity, determine corresponding to the second user mark
Whether user has permission management second object identity.
A3. the method according to claim A2, wherein the authorization administration information includes: at least one permission class
Type and respectively user identifier set corresponding with various permission types;Wherein, the permission type include: read permission,
Modification authority, and/or deletion permission;
And/or Object Management group request include: object query request, object modification request, object removal request and/
Or the newly-increased request of object.
A4. according to any method of claim A1-3, wherein described to judge according to preset Authority Verification rule
Whether the corresponding user of the second user mark, which has permission management second object identity, specifically includes:
Judge whether second object identity with the second user identifies associated storage, if so, determining described the
User corresponding to two user identifiers has permission management second object identity.
A5. according to any method of claim A1-4, wherein described by first object data information and institute
It states the first object identity and the first user identifier associated storage is specifically included into block chain network:
Judge whether to need to encrypt according to the information type of first object data information;
If so, being held for first object data information with first object identity and first user identifier
Associated storage is into block chain network after row cryptographic operation.
A6. according to any method of claim A1-5, wherein described by first object data information and institute
It states the first object identity and the first user identifier associated storage is specifically included into block chain network:
According to first object data information, first object identity and first user identifier, the is generated
One transaction record;
First transaction record is verified by algorithm of knowing together by each network node in the block chain network
Afterwards, which is stored in block chain network;Wherein, the common recognition algorithm includes: DPOS algorithm.
B7. a kind of Object Management System based on block chain, comprising: block chain network accesses the block chain network
Identify storage server and ID management server;Wherein,
Identify storage server, suitable for obtain in advance receive object registration request in include the first user identifier with
And first data object, generate the first object identity corresponding with first data object;It obtains and first object
Corresponding first object data information is identified, by first object data information and first object identity and described
First user identifier associated storage is into block chain network;
ID management server includes suitable for obtaining in Object Management group request when receiving Object Management group request
Second user mark and the second object identity, according to preset Authority Verification rule judge second user mark it is right
Whether the user answered has permission management second object identity;If so, being requested according to the Object Management group to the block chain
The second object data information corresponding with second object identity is managed in network.
B8. the system according to claim B7, wherein further include rights management in the object registration request
Information, and the mark storage server is particularly adapted to: the authorization administration information is associated with first object identity and is deposited
Storage;
Then the ID management server is particularly adapted to:
According to authorization administration information corresponding to second object identity, determine corresponding to the second user mark
Whether user has permission management second object identity.
B9. the system according to claim B8, wherein the authorization administration information includes: at least one permission class
Type and respectively user identifier set corresponding with various permission types;Wherein, the permission type include: read permission,
Modification authority, and/or deletion permission;
And/or Object Management group request include: object query request, object modification request, object removal request and/
Or the newly-increased request of object.
B10. according to any system of claim B7-9, wherein the ID management server is particularly adapted to:
Judge whether second object identity with the second user identifies associated storage, if so, determining described the
User corresponding to two user identifiers has permission management second object identity.
B11. according to any system of claim B7-10, wherein the mark storage server is particularly adapted to:
Judge whether to need to encrypt according to the information type of first object data information;
If so, being held for first object data information with first object identity and first user identifier
Associated storage is into block chain network after row cryptographic operation.
B12. according to any system of claim B7-11, wherein the mark storage server is particularly adapted to:
According to first object data information, first object identity and first user identifier, the is generated
One transaction record;
First transaction record is verified by algorithm of knowing together by each network node in the block chain network
Afterwards, which is stored in block chain network;Wherein, the common recognition algorithm includes: DPOS algorithm.
C13. a kind of electronic equipment, comprising: processor, memory, communication interface and communication bus, the processor, institute
It states memory and the communication interface completes mutual communication by the communication bus;
The memory executes the processor as weighed for storing an at least executable instruction, the executable instruction
Benefit requires the corresponding operation of the method for managing object based on block chain described in any one of A1-6.
D14. a kind of computer storage medium is stored with an at least executable instruction in the storage medium, described to hold
The method for managing object based on block chain that row instruction executes processor as described in any one of claim A1-6 is corresponding
Operation.
Claims (10)
1. a kind of method for managing object based on block chain, comprising:
The first user identifier for including in the object registration request received and the first data object, generation and institute are obtained in advance
State corresponding first object identity of the first data object;
The first object data information corresponding with first object identity is obtained, by first object data information and institute
The first object identity and the first user identifier associated storage are stated into block chain network;
When receiving Object Management group request, the second user mark for including in the Object Management group request and second pair are obtained
As mark, judge whether the corresponding user of the second user mark has permission management institute according to preset Authority Verification rule
State the second object identity;
If so, according to the Object Management group request in the block chain network with second object identity corresponding second
Object data information is managed.
2. authorization administration information is further included in the object registration request according to the method described in claim 1, wherein,
And described first object data information and first object identity and the first user identifier associated storage are arrived
It is specifically included in block chain network: by the authorization administration information and the first object identity associated storage;
It is then described to judge whether the corresponding user of the second user mark has permission pipe according to preset Authority Verification rule
Second object identity is managed to specifically include:
According to authorization administration information corresponding to second object identity, the corresponding user of the second user mark is determined
Whether management second object identity is had permission.
3. according to the method described in claim 2, wherein, the authorization administration information include: at least one permission type and
User identifier set corresponding with various permission types respectively;Wherein, the permission type includes: to read permission, the power of amendment
Limit, and/or deletion permission;
And/or Object Management group request includes: object query request, object modification request, object removal request, and/or right
As newly-increased request.
4. method according to claim 1 to 3, wherein described to judge described according to preset Authority Verification rule
Whether user corresponding to two user identifiers, which has permission management second object identity, specifically includes:
Judge second object identity whether with the second user identify associated storage, if so, determine it is described second use
Mark corresponding user in family has permission management second object identity.
5. method according to claim 1 to 4, wherein described by first object data information and described first
Object identity and the first user identifier associated storage are specifically included into block chain network:
Judge whether to need to encrypt according to the information type of first object data information;
Add if so, being executed for first object data information and first object identity and first user identifier
Associated storage is into block chain network after close operation.
6. -5 any method according to claim 1, wherein described by first object data information and described first
Object identity and the first user identifier associated storage are specifically included into block chain network:
According to first object data information, first object identity and first user identifier, generates first and hand over
Easily record;
It, will after being verified by algorithm of knowing together to first transaction record by each network node in the block chain network
First transaction record is stored in block chain network;Wherein, the common recognition algorithm includes: DPOS algorithm.
7. a kind of Object Management System based on block chain, comprising: block chain network, the mark of the access block chain network are deposited
Store up server and ID management server;Wherein,
Storage server is identified, suitable for obtaining the first user identifier and for including in the object registration received request in advance
One data object generates the first object identity corresponding with first data object;It obtains and first object identity
Corresponding first object data information, by first object data information and first object identity and described first
User identifier associated storage is into block chain network;
ID management server, suitable for when receiving Object Management group request, obtaining include in Object Management group request the
Two user identifiers and the second object identity judge corresponding to the second user mark according to preset Authority Verification rule
Whether user has permission management second object identity;If so, being requested according to the Object Management group to the block chain network
In the second object data information corresponding with second object identity be managed.
8. system according to claim 7, wherein authorization administration information is further included in the object registration request,
And the mark storage server is particularly adapted to: by the authorization administration information and the first object identity associated storage;
Then the ID management server is particularly adapted to:
According to authorization administration information corresponding to second object identity, the corresponding user of the second user mark is determined
Whether management second object identity is had permission.
9. a kind of electronic equipment, comprising: processor, memory, communication interface and communication bus, the processor, the storage
Device and the communication interface complete mutual communication by the communication bus;
The memory executes the processor as right is wanted for storing an at least executable instruction, the executable instruction
Ask the corresponding operation of the method for managing object based on block chain described in any one of 1-6.
10. a kind of computer storage medium, an at least executable instruction, the executable instruction are stored in the storage medium
Processor is set to execute such as the corresponding operation of the method for managing object of any of claims 1-6 based on block chain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811511899.8A CN109587146A (en) | 2018-12-11 | 2018-12-11 | Method for managing object and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811511899.8A CN109587146A (en) | 2018-12-11 | 2018-12-11 | Method for managing object and system based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109587146A true CN109587146A (en) | 2019-04-05 |
Family
ID=65928124
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811511899.8A Pending CN109587146A (en) | 2018-12-11 | 2018-12-11 | Method for managing object and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109587146A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110222086A (en) * | 2019-05-07 | 2019-09-10 | 深圳壹账通智能科技有限公司 | Data managing method, device, equipment and storage medium based on block chain |
CN110401631A (en) * | 2019-06-19 | 2019-11-01 | 深圳壹账通智能科技有限公司 | System upgrade information acquisition method, device, storage medium and block chain node |
CN110727894A (en) * | 2019-10-12 | 2020-01-24 | 腾讯科技(深圳)有限公司 | Target material setting method, device, equipment and storage medium |
CN110826103A (en) * | 2019-11-13 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Block chain-based document authority processing method, device, equipment and storage medium |
CN110866740A (en) * | 2019-11-14 | 2020-03-06 | 百度在线网络技术(北京)有限公司 | Processing method and device for block chain transaction request, electronic equipment and medium |
CN111368230A (en) * | 2020-02-19 | 2020-07-03 | 北京邮电大学 | Block chain-based industrial internet identification processing method and device |
CN112039892A (en) * | 2020-08-31 | 2020-12-04 | 中国信息通信研究院 | Data sharing method and related device |
CN112367360A (en) * | 2020-10-23 | 2021-02-12 | 中通信息服务有限公司 | Method and device for expanding public cloud data processing capacity |
CN113489669A (en) * | 2020-09-23 | 2021-10-08 | 青岛海信电子产业控股股份有限公司 | User data protection method and device |
CN114978740A (en) * | 2022-06-06 | 2022-08-30 | 中国互联网络信息中心 | Block chain-based identification association and verification analysis method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106600405A (en) * | 2016-11-17 | 2017-04-26 | 复旦大学 | Block-chain-based data rights protection method |
CN106992990A (en) * | 2017-05-19 | 2017-07-28 | 北京牛链科技有限公司 | Data sharing method and system and block catenary system and computing device |
US20170230189A1 (en) * | 2016-02-04 | 2017-08-10 | Nasdaq Technology Ab | Systems and methods for storing and sharing transactional data using a distributed computing systems |
CN107241360A (en) * | 2017-08-04 | 2017-10-10 | 北京明朝万达科技股份有限公司 | A kind of data safety shares exchange method and data safety shares switching plane system |
CN107294709A (en) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, apparatus and system |
CN108615150A (en) * | 2018-04-24 | 2018-10-02 | 深圳市轱辘车联数据技术有限公司 | Vehicle related information processing method and processing device based on block chain |
-
2018
- 2018-12-11 CN CN201811511899.8A patent/CN109587146A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170230189A1 (en) * | 2016-02-04 | 2017-08-10 | Nasdaq Technology Ab | Systems and methods for storing and sharing transactional data using a distributed computing systems |
CN106600405A (en) * | 2016-11-17 | 2017-04-26 | 复旦大学 | Block-chain-based data rights protection method |
CN106992990A (en) * | 2017-05-19 | 2017-07-28 | 北京牛链科技有限公司 | Data sharing method and system and block catenary system and computing device |
CN107294709A (en) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, apparatus and system |
CN107241360A (en) * | 2017-08-04 | 2017-10-10 | 北京明朝万达科技股份有限公司 | A kind of data safety shares exchange method and data safety shares switching plane system |
CN108615150A (en) * | 2018-04-24 | 2018-10-02 | 深圳市轱辘车联数据技术有限公司 | Vehicle related information processing method and processing device based on block chain |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020224246A1 (en) * | 2019-05-07 | 2020-11-12 | 深圳壹账通智能科技有限公司 | Block chain-based data management method and apparatus, device and storage medium |
CN110222086A (en) * | 2019-05-07 | 2019-09-10 | 深圳壹账通智能科技有限公司 | Data managing method, device, equipment and storage medium based on block chain |
CN110401631A (en) * | 2019-06-19 | 2019-11-01 | 深圳壹账通智能科技有限公司 | System upgrade information acquisition method, device, storage medium and block chain node |
CN110727894A (en) * | 2019-10-12 | 2020-01-24 | 腾讯科技(深圳)有限公司 | Target material setting method, device, equipment and storage medium |
CN110727894B (en) * | 2019-10-12 | 2023-09-01 | 腾讯科技(深圳)有限公司 | Target material setting method, device, equipment and storage medium |
CN110826103A (en) * | 2019-11-13 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Block chain-based document authority processing method, device, equipment and storage medium |
CN110866740A (en) * | 2019-11-14 | 2020-03-06 | 百度在线网络技术(北京)有限公司 | Processing method and device for block chain transaction request, electronic equipment and medium |
CN111368230A (en) * | 2020-02-19 | 2020-07-03 | 北京邮电大学 | Block chain-based industrial internet identification processing method and device |
CN112039892A (en) * | 2020-08-31 | 2020-12-04 | 中国信息通信研究院 | Data sharing method and related device |
CN112039892B (en) * | 2020-08-31 | 2022-11-29 | 中国信息通信研究院 | Data sharing method and related device |
CN113489669A (en) * | 2020-09-23 | 2021-10-08 | 青岛海信电子产业控股股份有限公司 | User data protection method and device |
CN113489669B (en) * | 2020-09-23 | 2023-04-18 | 青岛海信电子产业控股股份有限公司 | User data protection method and device |
CN112367360A (en) * | 2020-10-23 | 2021-02-12 | 中通信息服务有限公司 | Method and device for expanding public cloud data processing capacity |
CN114978740A (en) * | 2022-06-06 | 2022-08-30 | 中国互联网络信息中心 | Block chain-based identification association and verification analysis method |
CN114978740B (en) * | 2022-06-06 | 2023-06-23 | 中国互联网络信息中心 | Identification association and verification analysis method based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109587146A (en) | Method for managing object and system based on block chain | |
JP7236992B2 (en) | Methods and systems implemented by blockchain | |
CN111316278B (en) | Secure identity and profile management system | |
CN110535833B (en) | Data sharing control method based on block chain | |
CN105659559B (en) | The safety of authenticating remote server | |
CN102170440B (en) | Method suitable for safely migrating data between storage clouds | |
KR20190042567A (en) | Dynamic access control on block chaining | |
CN107171785A (en) | A kind of digital copyright management method based on block chain technology | |
CN110199288A (en) | Crossover-platform surrounds area's seal data | |
US20190238319A1 (en) | Rights management of content | |
CN109600366A (en) | The method and device of protection user data privacy based on block chain | |
CN105516110A (en) | Mobile equipment secure data transmission method | |
CN110197082A (en) | Data processing method, data processing equipment and computer system | |
CN110226167A (en) | It is abstract to surround area's identity | |
CN110214323A (en) | Surround area's abstract model | |
CN105450750A (en) | Secure interaction method for intelligent terminal | |
Lee et al. | MEXchange: a privacy-preserving blockchain-based framework for health information exchange using ring signature and stealth address | |
CN112967054B (en) | Data management method, device and equipment | |
CN111444492A (en) | Digital identity verification method based on medical block chain | |
CN111340483A (en) | Data management method based on block chain and related equipment | |
CN111612452A (en) | Intellectual property management system and method based on block chain | |
CN115510492A (en) | Electronic medical record management system and method based on intelligent contracts | |
CN102075518A (en) | Trust negotiation building method and system based on history roles | |
CN106358246B (en) | Access token issuing method and related equipment | |
CN117012324A (en) | Block chain-based health data wallet management method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190405 |
|
RJ01 | Rejection of invention patent application after publication |