CN109614821A - A kind of data exchange server and data transmission system based on block chain - Google Patents
A kind of data exchange server and data transmission system based on block chain Download PDFInfo
- Publication number
- CN109614821A CN109614821A CN201811519586.7A CN201811519586A CN109614821A CN 109614821 A CN109614821 A CN 109614821A CN 201811519586 A CN201811519586 A CN 201811519586A CN 109614821 A CN109614821 A CN 109614821A
- Authority
- CN
- China
- Prior art keywords
- data
- request
- client
- supplier
- communication interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Abstract
The present embodiments relate to block chain technical fields, specifically disclose a kind of data exchange server and data transmission system based on block chain, data exchange server includes: the first data communication interface, processor and the second data communication interface, first data communication interface, for receiving the request of data of party in request's client transmission, and feed back to processor;Processor, for request of data to be sent to supplier's client by the second data communication interface;Second data communication interface is also used to, and receives encrypted demand data, and feed back to processor;Processor is used to feed back encrypted demand data to party in request's client by the first data communication interface.By the above-mentioned means, can not only guarantee " mutual trust " between each operational agency, data sharing can also be realized, improve the work efficiency of each operational agency.
Description
Technical field
The present embodiments relate to block chain technical fields, and in particular to a kind of data exchange server based on block chain
And data transmission system.
Background technique
Due to requirements of one's work, require to cooperate with each other between many operational agencies, shared data.But each kiosk
Due to region restricted problem, trust problem etc. between structure, the shared of complete data can not achieve.If some operational agency wishes
Obtain a certain data, it will there are problems that two.First, it is unclear which operational agency this goes to obtain the data;Second, even if
Understand which operational agency this goes to obtain data, but due to trust problem, the operational agency with data dare not incite somebody to action oneself easily
The source data that body possesses is shared with the operational agency easily.Worry that big data can be replicated, be modified by the operational agency, nothing
Method controls the flow direction of data again, so as to cause the benefit damage of oneself operational agency.
And this also counteracts cooperating with each other between related service mechanism, affects working efficiency.So how to realize each
" mutual trust " between operational agency realizes data sharing, so that the work efficiency for improving government affairs organ becomes urgently to be resolved
The technical issues of.
Summary of the invention
For this purpose, the embodiment of the present invention provides a kind of data exchange server and data transmission system based on block chain, use
To solve to trust each other between existing related service mechanism, data cannot be shared, to influence the working effect of government affairs organ
The problem of rate.
To achieve the goals above, embodiments of the present invention provide the following technical solutions:
In the first aspect of embodiments of the present invention, a kind of data exchange server based on block chain is provided,
Data exchange server belongs to a kind of data exchange system based on block chain, and system includes: party in request's client, data exchange
Server and supplier's client;Data exchange server includes: the first data communication interface, processor and the second data communication
Interface, data exchange server establish two-way communication link by the first data communication interface and party in request's client, and data are handed over
It changes server and two-way communication link is established by the second data communication interface and supplier's client;
First data communication interface for receiving the request of data of party in request's client transmission, and feeds back to processor, number
Include information corresponding with demand data, intelligent contract and vendor ID information according to request, includes demand on intelligent contract
Square identification information;Information corresponding with demand data, intelligent contract and vendor ID information are that party in request hangs from block chain
It inquires and obtains in the data directory of load, the public key of party in request, intelligence is written by party in request's client in party in request on intelligent contract
Energy contract includes the request qualifications for demand data, and saves request process record;
Processor is supplied for request of data to be sent to supplier's client by the second data communication interface to work as
When the side's of answering client determines that request of data is legal according to intelligent contract and vendor ID information, according to corresponding with demand data
Information calls demand data;Demand data is encrypted and fed back using public key;
Second data communication interface is also used to, and receives encrypted demand data, and feed back to processor;
Processor is used to feed back encrypted demand data to party in request's client by the first data communication interface.
In one embodiment of the invention, the first data communication interface is specifically used for, and receives party in request's client and passes through
The request of data that first middle layer is sent.
In another embodiment of the invention, the second data communication interface is specifically used for, and receives supplier's client and passes through
The encrypted demand data that second middle layer is sent, and feed back to processor.
In yet another embodiment of the present invention, information corresponding with demand data includes at least: corresponding with demand data
Critical field information and data request path;
Second data communication interface is specifically used for according to request of data path, will critical field corresponding with demand data
Information, intelligent contract and vendor ID information are sent to supplier's client.
In yet another embodiment of the present invention, when supplier contains at least two, the second data communication interface with extremely
First supplier's client in few two supplier's clients establishes two-way communication link, and receives first supplier's client
The encrypted demand data of feedback, first supplier's client are that at least two supplier's clients are determined according to preset protocol
Supplier's client, first supplier's client be used for receive processor pass through the second data communication interface send number
Each of at least two supplier's clients supplier's client is distributed to according to request, and by request of data;And it also uses
In receiving the sub- demand data fed back according to request of data of each supplier's client, and all sub- demand datas are converged
It is total to constitute demand data, processor is fed back to by the second data communication interface after encryption.
In yet another embodiment of the present invention, when supplier contains at least two, the second data communication interface difference
Two-way communication link is established with each supplier's client;
Processor sends request of data to each supplier's client by the second data communication interface respectively;
Second data communication interface is also used to and receives the encrypted demand of each supplier's client feedback respectively
Sub- demand data, and feed back to processor.
In the second aspect of embodiments of the present invention, a kind of data transmission system based on block chain is provided, number
It include: the data exchange server of party in request's client, supplier's client and such as first aspect according to Transmission system;
Party in request's client, for from inquiry obtains letter corresponding with demand data in the data directory of carry on block chain
Breath, intelligent contract and vendor ID information, are written the public key of party in request on intelligent contract;
Will after information corresponding with demand data, intelligent contract and vendor ID information constitutes a request of data,
It is sent to data exchange server;
Supplier's client, for requesting legitimacy according to vendor ID information and intelligent contract verify data;
And when request of data is legal, according to information corresponding with demand data, demand data is called;Using public key to need
It asks data to be encrypted and feeds back to data exchange server.
Embodiment according to the present invention, on block chain only provided by each operational agency of carry with owned number
According to corresponding data directory.The data that party in request can inquire oneself needs according to the data directory of carry on block chain are present in
Which operational agency, information corresponding with demand data etc..Party in request can send request of data to data by client
Request of data is sent to supplier's client by data exchange server by swap server.In this process, party in request needs
To abide by intelligent contract, intelligent contract is that supplier hang on block chain, to constrain party in request to data ask for and
It utilizes.For example limitation data can only be read primary, then just failure by party in request.Furthermore, it would be desirable to record the complete of request of data
Process.In this way, the whereabouts and utilization rate of data can be controlled effectively.And in request of data, supplier, which also needs to verify, to be asked
The legitimacy for the side of asking, therefore to determine whether request of data is legal according to intelligent contract and vendor ID information.Only closing
In the case of method, demand data is called;Demand data is encrypted and fed back using public key.To guarantee the safety of data transmission
Property.By the above-mentioned means, can not only guarantee " mutual trust " between each operational agency, it can also realize data sharing, mention
The work efficiency of Gao Ge operational agency.
Detailed description of the invention
It, below will be to embodiment party in order to illustrate more clearly of embodiments of the present invention or technical solution in the prior art
Formula or attached drawing needed to be used in the description of the prior art are briefly described.It should be evident that the accompanying drawings in the following description is only
It is merely exemplary, it for those of ordinary skill in the art, without creative efforts, can also basis
The attached drawing of offer, which is extended, obtains other implementation attached drawings.
Fig. 1 is a kind of data exchange server structural schematic diagram based on block chain that one embodiment of the invention provides;
Fig. 2 is a kind of data transmission system structure chart based on block chain that another embodiment of the present invention provides.
Specific embodiment
Embodiments of the present invention are illustrated by particular specific embodiment below, those skilled in the art can be by this explanation
Content disclosed by book is understood other advantages and efficacy of the present invention easily, it is clear that described embodiment is the present invention one
Section Example, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
The embodiment of the present invention 1 provides a kind of data exchange server based on block chain, specifically as shown in Figure 1, the number
Belong to a kind of data exchange system based on block chain according to swap server, which includes data exchange server, party in request
Client and supplier's client.Data exchange server includes: the first data communication interface 101, processor 102 and the second number
According to communication interface 103, data exchange server establishes two-way communication by the first data communication interface 101 and party in request's client
Connection, data exchange server establish two-way communication link by the second data communication interface 103 and supplier's client.
First data communication interface 101 for receiving the request of data of party in request's client transmission, and feeds back to processor
102。
Specifically, request of data includes information corresponding with demand data, intelligent contract and vendor ID information, intelligence
It can include party in request's identification information on contract;Information corresponding with demand data, intelligent contract and vendor ID information are to need
From inquiry obtains in the data directory of carry on block chain, party in request is write on intelligent contract by party in request's client for the side of asking
The public key for entering party in request, as the identification information of party in request, intelligent contract includes the request qualifications for demand data, and
Save request process record.
Before this, it needs to do some preparations in advance.For example, supplier needs to count the data itself possessed.
Classify to data, then extracts the attribute information of every a kind of data according to certain rules.Remembered in the form of critical field
It is downloaded on data directory.Each supplier has a data directory corresponding on block chain.In addition, data directory up to
It less can also include that the corresponding request of data path of every a kind of data and the identification information of supplier oneself, i.e. supplier mark
Know information.Meanwhile supplier can also formulate intelligent contract, the intelligence contract is to bound data party in request to the data of request
Use.For example, can limit party in request's identity information of request data, using data area permission, using data when
Between and using data times etc..Pass through intelligent contract, it is ensured that the use of data belongs to the range that supplier can control
It is interior.And then promote the degree of belief between supplier and party in request.
And when party in request needs to supplier's request data, need to write the public key of oneself on intelligent contract, to
Supplier can identify party in request's identity of request data.
And the overall process that intelligent contract also needs to record request of data and use.Once the use convenient for subsequent data occurs
Any accident can carry out retrospect corresponding responsibility according to record.
Processor 102, for request of data to be sent to supplier's client by the second data communication interface 103, with
When convenient supplier's client determines that request of data is legal according to intelligent contract and vendor ID information, according to demand data
Corresponding information calls demand data;Demand data is encrypted and fed back using public key.
Optionally, it is included at least with the corresponding information of demand data: critical field information sum number corresponding with demand data
According to request path.Request of data is sent to supplier's client, the second data communication interface 103 is specifically used for: according to data
Critical field information corresponding with demand data, intelligent contract and vendor ID information are sent to supply by request path
Square client.
Supplier's client can determine whether request of data is legal according to intelligent contract and vendor ID information.
That is, determining that the request is destined to oneself according to vendor ID information first, oneself is needed to handle.So
Afterwards, it is also necessary to the identity of party in request is determined according to signing messages.Determine that there is request data in the party in request according to intelligent contract
Permission.If met above, it can prove that the request of data is legal.Supplier can call from the database of itself to be needed
Data are sought, then the public key of party in request are recycled to encrypt demand data, and feed back to data exchange server.
Specific implementation procedure are as follows: supplier's client encrypts demand data using the public key of party in request, then
Processor 102 is fed back to by the second data communication interface 103.
That is, the second data communication interface 103 is also used to, encrypted demand data is received, and feeds back to processor 102.
Processor 102 is used to feed back encrypted demand data to party in request client by the first data communication interface 101
End.
Optionally, when supplier contains at least two, the second data communication interface 103 and at least two supplier clients
First supplier's client in end establishes two-way communication link, and receives the encrypted need of first supplier's client feedback
Data are sought, first supplier's client is the supplier client that at least two supplier's clients are determined according to preset protocol
End, first supplier's client are used to receive processor 102 and pass through the request of data that the second data communication interface 103 is sent, and
Request of data is distributed to each of at least two supplier's clients supplier's client;And it is also used to receive every
The sub- demand data that one supplier's client is fed back according to request of data, and all sub- demand datas are carried out to summarize composition need
Data are sought, processor 102 is fed back to by the second data communication interface 103 after encryption.
Alternatively, when supplier contains at least two, the second data communication interface 103 respectively with each supplier client
Two-way communication link is established at end;Request of data is distributed to each supply by the second data communication interface 103 by processor 102
Square client;Second data communication interface 103 is also used to receive the encrypted need of each supplier's client feedback respectively
Seek subdata, and feed back to processor 102, by processor 102 carry out it is same summarize constitute demand data.
Specifically, supplier in order to prevent let out by oneself source data if party in request is it is desirable that result data
It is close, it can also that is to say in supplier's client and operation is carried out according to source data and corresponding algorithm, be tied in itself side
After fruit data, the second data communication interface 103 is fed back to.
Or if the data that party in request requires need multiple suppliers to provide respectively, such as a supplier provides
Algorithm, a supplier provide source data.So, supplier can summarize all the elements with customized supplier's client,
Including algorithm and source data, then unify to feed back to processor 102 by the second data communication interface 103.And processor 102 will
Algorithm and source data feed back to party in request's client together.Alternatively, the data of oneself are passed through second respectively by each supplier
Data communication interface 103 is sent to processor 102, and processor 102 is uniformly sent to party in request's client.
It is set according to intelligent contract, party in request's client will not be immediately seen algorithm and data, but need to pass through sandbox
Operation obtains result.It that is to say, what party in request can be seen by client is still result data, and can't see source data
And algorithm.
It optionally, can between party in request's client and the first data communication interface 101 in order to promote data transmission performance
To be carried out data transmission by the first middle layer.That is, the first data communication interface 101 is specifically used for, party in request's client is received
The request of data sent by the first middle layer.
And the second data communication interface 103 is specifically used for, and receives supplier's client and is added by what the second middle layer was sent
Demand data after close, and feed back to processor 102.
And demand data is transmitted to party in request's client by the first data communication interface 101 by processor 102.And it passes
When transporting to party in request's client, the transmission of the first middle layer again may be by.Here practical middle layer is exactly to party in request visitor
Calling interface far call agreement (Remote Procedure Call between family end and data exchange server
Protocol, abbreviation RPC) interface is packaged.And the calling between supplier's client and data exchange server is connect
Mouth RPC interface is packaged.In a specific example, party in request's client and supplier's client can be agent machine.In
Interbed main function is decoupling, while simplifying agent function, is added to message queue in the intermediate layer, utilizes a set of distribution
Message Queuing Services, the corresponding information node of each agent, the processing that agent can be concurrent to the message of message queue,
To improve data transmission performance.
A kind of data exchange server based on block chain provided in an embodiment of the present invention, only carry is each on block chain
Data directory corresponding with owned data provided by operational agency.Party in request can be according to the data of carry on block chain
Which operational agency is the data that directory oneself needs be present in, information corresponding with demand data etc..Party in request can be with
Request of data is sent to data exchange server by client, and request of data is sent to supplier by data exchange server
Client.In this process, party in request needs to abide by intelligent contract, and intelligent contract is that supplier hangs on block chain,
To constrain party in request's asking for and utilizing to data.For example limitation data can only be read primary, then just failure by party in request.
Furthermore, it would be desirable to record the overall process of request of data.In this way, the whereabouts and utilization rate of data can be controlled effectively.And in number
When according to request, supplier also needs the legitimacy of checking request side, therefore true according to intelligent contract and vendor ID information
Whether legal determine request of data.Only in legal situation, demand data is called;Demand data is encrypted simultaneously using public key
Feedback.To guarantee the safety of data transmission.By the above-mentioned means, can not only guarantee " mutual between each operational agency
Trust ", it can also realize data sharing, improve the work efficiency of each operational agency.
Corresponding with above-described embodiment, the embodiment of the present invention 2 additionally provides a kind of data transmission system based on block chain
System, specifically as shown in Fig. 2, the system includes: to introduce in party in request's client 20, supplier's client 30 and an embodiment as above
Data exchange server 10.
Party in request's client 20, for from block chain in the data directory of carry inquiry obtain it is corresponding with demand data
Information, intelligent contract and vendor ID information, are written the public key of party in request on intelligent contract;
Will after information corresponding with demand data, intelligent contract and vendor ID information constitutes a request of data,
It is sent to data exchange server 10;
Supplier's client 30, for requesting legitimacy according to vendor ID information and intelligent contract verify data;
And when request of data is legal, according to information corresponding with demand data, demand data is called;Using public key to need
It asks data to be encrypted and feeds back to data exchange server 10.
Function performed by data exchange server 10 has been discussed in detail in a upper embodiment, does not do here
It repeats more.
A kind of data transmission system based on block chain provided in an embodiment of the present invention, the only each industry of carry on block chain
Data directory corresponding with owned data provided by the mechanism that is engaged in.Party in request can be according to the data mesh of carry on block chain
Which operational agency is the data that record inquiry needs oneself be present in, information corresponding with demand data etc..Party in request can lead to
It crosses client and sends request of data to data exchange server, request of data is sent to supplier visitor by data exchange server
Family end.In this process, party in request needs to abide by intelligent contract, and intelligent contract is that supplier hangs on block chain, uses
To constrain party in request's asking for and utilizing to data.For example limitation data can only be read primary, then just failure by party in request.And
And, it is also necessary to record the overall process of request of data.In this way, the whereabouts and utilization rate of data can be controlled effectively.And in data
When request, supplier also needs the legitimacy of checking request side, therefore to be determined according to intelligent contract and vendor ID information
Whether request of data is legal.Only in legal situation, demand data is called;Demand data encrypt using public key and anti-
Feedback.To guarantee the safety of data transmission.By the above-mentioned means, can not only guarantee " the phase mutual trust between each operational agency
Appoint ", it can also realize data sharing, improve the work efficiency of each operational agency.
Although above having used general explanation and specific embodiment, the present invention is described in detail, at this
On the basis of invention, it can be made some modifications or improvements, this will be apparent to those skilled in the art.Therefore,
These modifications or improvements without departing from theon the basis of the spirit of the present invention are fallen within the scope of the claimed invention.
Claims (7)
1. a kind of data exchange server based on block chain, which is characterized in that the data exchange server belongs to a kind of base
In the data exchange system of block chain, the system comprises: party in request's client, data exchange server and supplier client
End;The data exchange server includes: the first data communication interface, processor and the second data communication interface, the data
Swap server establishes two-way communication link, the data by first data communication interface and party in request's client
Swap server establishes two-way communication link by second data communication interface and supplier's client;
First data communication interface for receiving the request of data of party in request's client transmission, and feeds back to the processor, institute
Stating request of data includes information corresponding with demand data, intelligent contract and vendor ID information, on the intelligence contract
Include party in request's identification information;The information corresponding with demand data, intelligent contract and vendor ID information are party in request
From inquiry obtains in the data directory of carry on block chain, the party in request is by party in request's client, in the intelligence
The public key of the party in request is written on contract, the intelligence contract includes the request qualifications for demand data, and is saved
Request process record;
Processor, for the request of data to be sent to supplier's client by second data communication interface,
So as to when supplier's client determines that request of data is legal according to the intelligent contract and vendor ID information, according to need
The corresponding information of data is sought, demand data is called;The demand data is encrypted and fed back using the public key;
Second data communication interface is also used to, and receives encrypted demand data, and feeds back to the processor;
The processor is used to feed back the encrypted demand data to the demand by first data communication interface
Square client.
2. data exchange server according to claim 1, which is characterized in that first data communication interface is specifically used
In reception party in request's client passes through the request of data that the first middle layer is sent.
3. data exchange server according to claim 1 or 2, which is characterized in that the second data communication interface tool
Body is used for, and is received supplier's client and is passed through the encrypted demand data that the second middle layer is sent, and feeds back to
The processor.
4. data exchange server according to claim 1, which is characterized in that the information corresponding with demand data is extremely
It less include: critical field information corresponding with demand data and data request path;
Second data communication interface is specifically used for according to the request of data path, will be described corresponding with demand data
Critical field information, the intelligent contract and vendor ID information are sent to supplier's client.
5. according to claim 1,2 or 4 described in any item data exchange servers, which is characterized in that when the supplier wraps
When containing at least two, second data communication interface is built with first supplier's client at least two supplier's clients
Vertical two-way communication link, and the encrypted demand data of the first supplier client feedback is received, first supply
Supplier's client that square client determines for at least two suppliers client according to preset protocol, described first
Supplier's client is used to receive the request of data that the processor is sent by second data communication interface, and will be described
Request of data is distributed to each of at least two suppliers client supplier's client;And it is also used to receive
The sub- demand data that each supplier's client is fed back according to the request of data, and all sub- demand datas are summarized
Demand data is constituted, the processor is fed back to by second data communication interface after encryption.
6. according to claim 1,2 or 4 described in any item data exchange servers, which is characterized in that when the supplier wraps
When containing at least two, second data communication interface establishes two-way communication link with each supplier's client respectively;
The processor sends request of data to each supplier's client by second data communication interface respectively;
Second data communication interface is also used to and receives the encrypted demand of each supplier's client feedback respectively
Sub- demand data, and feed back to the processor.
7. a kind of data transmission system based on block chain, which is characterized in that the data transmission system includes: party in request client
End, supplier's client and data exchange server as claimed in any one of claims 1 to 6;
Party in request's client, for from inquiry obtains letter corresponding with demand data in the data directory of carry on block chain
The public key of the party in request is written in breath, intelligent contract and vendor ID information on the intelligent contract;
After the information corresponding with demand data, intelligent contract and vendor ID information are constituted a request of data,
It is sent to data exchange server;
Supplier's client, for legal according to the vendor ID information and the intelligent contract verify data request
Property;
And when the request of data is legal, according to information corresponding with demand data, demand data is called;Utilize the public key
The demand data is encrypted and feeds back to data exchange server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811519586.7A CN109614821B (en) | 2018-12-12 | 2018-12-12 | Data exchange server and data transmission system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811519586.7A CN109614821B (en) | 2018-12-12 | 2018-12-12 | Data exchange server and data transmission system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109614821A true CN109614821A (en) | 2019-04-12 |
CN109614821B CN109614821B (en) | 2023-04-11 |
Family
ID=66007617
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811519586.7A Active CN109614821B (en) | 2018-12-12 | 2018-12-12 | Data exchange server and data transmission system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109614821B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110442632A (en) * | 2019-08-09 | 2019-11-12 | 泰康保险集团股份有限公司 | Data processing method and device |
CN110868443A (en) * | 2019-07-05 | 2020-03-06 | 方欣科技有限公司 | Block chain-based core levee data decoupling method and device |
CN111209262A (en) * | 2020-01-10 | 2020-05-29 | 浪潮天元通信信息系统有限公司 | Large-scale distributed safe storage system based on block chain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107292181A (en) * | 2017-06-20 | 2017-10-24 | 无锡井通网络科技有限公司 | Database Systems based on block chain and the application method using the system |
CN108234457A (en) * | 2017-12-18 | 2018-06-29 | 苏州涞泽信息科技有限公司 | A kind of credible government data based on block chain shares network system and sharing method |
CN108234515A (en) * | 2018-01-25 | 2018-06-29 | 中国科学院合肥物质科学研究院 | A kind of Self-certified digital identity management system and its method based on intelligent contract |
CN108765070A (en) * | 2018-05-22 | 2018-11-06 | 深圳市元征科技股份有限公司 | A kind of service providing method, system, equipment and computer readable storage medium |
CN108881160A (en) * | 2018-05-07 | 2018-11-23 | 北京信任度科技有限公司 | Medical treatment & health data managing method and system based on block chain intelligence contract |
-
2018
- 2018-12-12 CN CN201811519586.7A patent/CN109614821B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107292181A (en) * | 2017-06-20 | 2017-10-24 | 无锡井通网络科技有限公司 | Database Systems based on block chain and the application method using the system |
CN108234457A (en) * | 2017-12-18 | 2018-06-29 | 苏州涞泽信息科技有限公司 | A kind of credible government data based on block chain shares network system and sharing method |
CN108234515A (en) * | 2018-01-25 | 2018-06-29 | 中国科学院合肥物质科学研究院 | A kind of Self-certified digital identity management system and its method based on intelligent contract |
CN108881160A (en) * | 2018-05-07 | 2018-11-23 | 北京信任度科技有限公司 | Medical treatment & health data managing method and system based on block chain intelligence contract |
CN108765070A (en) * | 2018-05-22 | 2018-11-06 | 深圳市元征科技股份有限公司 | A kind of service providing method, system, equipment and computer readable storage medium |
Non-Patent Citations (1)
Title |
---|
王洁等: "基于区块链的科技金融大数据开放共享体系研究", 《现代计算机(专业版)》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110868443A (en) * | 2019-07-05 | 2020-03-06 | 方欣科技有限公司 | Block chain-based core levee data decoupling method and device |
CN110868443B (en) * | 2019-07-05 | 2022-10-25 | 方欣科技有限公司 | Block chain-based core levee data decoupling method and device |
CN110442632A (en) * | 2019-08-09 | 2019-11-12 | 泰康保险集团股份有限公司 | Data processing method and device |
CN111209262A (en) * | 2020-01-10 | 2020-05-29 | 浪潮天元通信信息系统有限公司 | Large-scale distributed safe storage system based on block chain |
CN111209262B (en) * | 2020-01-10 | 2023-06-16 | 浪潮通信信息系统有限公司 | Large-scale distributed secure storage system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN109614821B (en) | 2023-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3355217B1 (en) | Hardware blockchain acceleration | |
CN109510846B (en) | API calling system, method and device, electronic equipment and storage medium | |
JP5337702B2 (en) | Securing distributed application information delivery | |
US7467399B2 (en) | Context-sensitive confidentiality within federated environments | |
US7478402B2 (en) | Configurable message pipelines | |
WO2021115449A1 (en) | Cross-domain access system, method and device, storage medium, and electronic device | |
Singer et al. | Design and comparison of command shaping methods for controlling residual vibration | |
US20150381580A1 (en) | System and method to use a cloud-based platform supported by an api to authenticate remote users and to provide pki- and pmi- based distributed locking of content and distributed unlocking of protected content | |
CN109614822A (en) | A kind of Information Resource Access method, apparatus and system based on block chain | |
CN110266817B (en) | Cross-channel data sharing model, method and device based on block chain | |
CN109614821A (en) | A kind of data exchange server and data transmission system based on block chain | |
US10764276B2 (en) | Certificate-initiated access to services | |
JPH05274266A (en) | Method for providing security function for remote system management | |
JP2013522773A (en) | Pluggable token provider model that enforces authentication across multiple web services | |
US7702923B2 (en) | Storage service | |
EA012640B1 (en) | Arrangement for using erp-system on, preferably, mobile devices | |
US7519602B2 (en) | Systems and methods for information exchange using object warehousing | |
CN109361753A (en) | A kind of Internet of things system framework and encryption method | |
WO2022193984A1 (en) | Cross-chain data transmission method and apparatus, and computer device, storage medium and computer program product | |
KR102080230B1 (en) | System and method for multiway call processing of rest api service | |
EP1353470A2 (en) | Method for deployment of a workable public key infrastructure | |
CN102754386A (en) | Hierarchical key management for secure communications in multimedia communication system | |
JP2007128349A (en) | Network system, proxy server, session management method, and program | |
US9100277B2 (en) | Client credentials data structure and method of employing the same | |
CN113643134B (en) | Internet of things blockchain transaction method and system based on multi-key homomorphic encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |