CN110210961A - Data capture method, server and computer storage medium based on alliance's chain - Google Patents
Data capture method, server and computer storage medium based on alliance's chain Download PDFInfo
- Publication number
- CN110210961A CN110210961A CN201910423146.XA CN201910423146A CN110210961A CN 110210961 A CN110210961 A CN 110210961A CN 201910423146 A CN201910423146 A CN 201910423146A CN 110210961 A CN110210961 A CN 110210961A
- Authority
- CN
- China
- Prior art keywords
- node
- data
- mentioned
- chain
- alliance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Abstract
The embodiment of the present application discloses a kind of data capture method based on alliance's chain, server and computer-readable medium, it is related to block storage system and block data structures technology, wherein method includes: that the first node based on the intelligent contract on alliance's chain on alliance's chain sends information acquisition request, the information acquisition request carries target data mark, and the target data is identified as the mark for determining the target data;The target information abstract from the first node is received, the target information abstract includes the data origin information of the Data Identification and the corresponding target data of the Data Identification;Determine that second node, Xiang Suoshu second node send the target information abstract, can increase data acquisition source, reduce the cost of data acquisition and data maintenance in alliance's chain based on the intelligent contract.
Description
Technical field
This application involves alliance's chain technical field more particularly to a kind of data capture methods based on alliance's chain, server
And computer storage medium.
Background technique
Reference is to acquire, arrange in accordance with the law, saving, processing the credit information of natural person, legal person and its hetero-organization, and externally mentioning
For services such as credit report, credit evaluation, credit information consultings, client's judgement, control credit risk are helped, credit management is carried out
Activity, it provides the shared platform of credit information for specialized credit mechanism.
Current, credit investigation system centralization generally obtains reference report by people's row reference or main strategies mechanism,
Data source is more single, and procurement cost is high.And other enterprises and mechanism for thering is data acquisition to need, also without safe enough
The effective mode collected, arrange data.
Summary of the invention
The embodiment of the present application provides a kind of data capture method based on alliance's chain, server and computer-readable medium,
It is related to block storage system and block data structures technology, data acquisition source can be increased, reduces data acquisition and data dimension
The cost of shield.
In a first aspect, the embodiment of the present application provides a kind of data capture method based on alliance's chain, it is applied to server,
The described method includes:
The data sharing request from first node is received, the data sharing request carries first node information and target
Informative abstract, the target information abstract include the Data Identification and source letter for the target data that the first node is shared
Breath;
According to the first node information and default proof rule, judge whether the first node has in alliance's chain
Shared information permission;
If having, the target information abstract is broadcasted in the main chain of alliance's chain.
As a kind of possible embodiment, the first node information includes first node address;It is described according to
First node information and default proof rule, judge whether the first node has the shared information permission packet in alliance's chain
It includes:
Judge the white list address whether the first node address belongs in the default proof rule;
If belonging to, the first node has the shared information permission in alliance's chain;If being not belonging to, the first segment
Point does not have the shared information permission in alliance's chain.
As a kind of possible embodiment, the method also includes:
When the first node address is not belonging to the white list address in the default proof rule, obtain and described first
The associated verifying address of node of node;
The shared authentication to the first node is sent to the verifying node according to the verifying address of node to request;
When receiving from the confirmation instruction that the verifying node requests the shared authentication, the first segment is determined
Point has the shared information permission in alliance's chain;Verify what node requested the shared authentication from described receiving
When refusal instruction, determine that the first node does not have the shared information permission in alliance's chain.
As a kind of possible embodiment, described before receiving the data sharing request from first node, it is described
Method further include:
It receives the addition to alliance's chain from the first node to request, the addition request includes described first
Nodal information;
Determine that the node type of the first node, the node type include enterprise's section according to the first node information
Point, credit information service's node and government organs' node;
The corresponding node rule for application of node type for obtaining the first node, according to institute's node rule for application to described
First node carries out authentication;
If the authentication passes through, the shared information permission of alliance's chain is opened for the first node.
As a kind of possible embodiment, the method also includes:
The data acquisition request from second node is received, the data acquisition request carries the Data Identification;
Determine that the corresponding target information abstract, Xiang Suoshu second node send the target according to the Data Identification
Informative abstract.
As a kind of possible embodiment, the method also includes:
The data analysis request from the second node is received, the data analysis request carries the Data Identification;
Data analysis node into alliance's chain, which is sent, carries the Data Identification and the second node address
The data analysis instructions, the data analysis instructions analyze the target data for the data analysis node.
As a kind of possible embodiment, the main chain of alliance's chain is realized based on super account book Project Technical.
Second aspect, the embodiment of the present application provide a kind of server, comprising: transmission module, judgment module and broadcast mould
Block, in which:
The transmission module, for receiving the data sharing request from first node, the data sharing request is carried
First node information and target information abstract, the target information abstract include the target data that the first node is shared
Data Identification and source-information;
The judgment module, for judging the first node according to the first node information and default proof rule
Whether shared information permission in alliance chain is had;
The broadcast module, if having the shared information permission in alliance's chain for the first node, described
The target information abstract is broadcasted in the main chain of alliance's chain.
The third aspect, the embodiment of the present application also provides a kind of servers, including processor, input equipment, output equipment
And memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing
Computer program, the computer program include program instruction, and the processor is configured for calling described program instruction, are held
Method of the row as described in first aspect and its any possible embodiment.
Fourth aspect, the embodiment of the present application provide a kind of computer storage medium, the computer storage medium storage
There is computer program, the computer program includes program instruction, and described program instruction makes the place when being executed by a processor
The method that reason device executes above-mentioned first aspect and its any possible embodiment.
The embodiment of the present application is by sending letter based on first node of the intelligent contract on alliance's chain on above-mentioned alliance's chain
Acquisition request is ceased, above- mentioned information acquisition request carries target data mark, and above-mentioned target data is identified as determining above-mentioned mesh
The mark for marking data may also receive from the target information abstract of above-mentioned first node, and above-mentioned target information abstract includes upper
The data origin information of Data Identification and the corresponding target data of above-mentioned Data Identification is stated, then based on above-mentioned intelligent contract upper
It states and determines second node in alliance's chain, Xiang Shangshu second node sends above-mentioned target information abstract, is plucked by above-mentioned target information
It wants, the node in alliance's chain can determine data source and then obtain target data, it can increase data acquisition source, and
Safety is higher, reduces the cost of data acquisition and data maintenance.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description
Attached drawing is briefly described.
Fig. 1 is a kind of flow diagram of data capture method based on alliance's chain provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram for data capture method based on alliance's chain that another embodiment of the application provides;
Fig. 3 is a kind of structural schematic diagram of server provided by the embodiments of the present application;
Fig. 4 is the structural schematic diagram of another server provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Herein
" embodiment " is referred to it is meant that a particular feature, structure, or characteristic described may be embodied in the application at least in conjunction with the embodiments
In one embodiment.The phrase, which occurs, in each position in the description might not each mean identical embodiment, nor
With the independent or alternative embodiment of other embodiments mutual exclusion.Those skilled in the art explicitly and implicitly understand,
Embodiment described herein can be combined with other embodiments.
Based on the embodiment in the application, those of ordinary skill in the art are obtained without making creative work
The every other embodiment obtained, shall fall in the protection scope of this application.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that
It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have
It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap
Include other step or units intrinsic for these process, methods, product or equipment.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment
And be not intended to limit the application.As present specification and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to more fully understand the embodiment of the present application, will be situated between below to the method for application the embodiment of the present application
It continues.
The terminal device mentioned in the embodiment of the present application is the equipment that can be communicated with server, above-mentioned server
Claim servomechanism, is to provide the equipment of the service of calculating, can permit multiple terminal devices and access.Above-mentioned terminal device can be
Mobile terminal including the various handheld devices with wireless communication function, wearable device, calculates equipment or is connected to wireless tune
Other processing equipments of modulator-demodulator and various forms of user equipmenies (User Equipment, UE), mobile station
(Mobile Station, MS) etc..
It referring to Figure 1, is a kind of exemplary flow of data capture method based on alliance's chain provided by the embodiments of the present application
Figure, this method as shown in Figure 1 can include:
101, the first node based on the intelligent contract on alliance's chain on above-mentioned alliance's chain sends information acquisition request, on
It states information acquisition request and carries target data mark, above-mentioned target data is identified as the mark for determining above-mentioned target data.
Executing subject in the embodiment of the present application can be the main chain node in alliance's chain, can be above-mentioned server, or
Person is known as main chain server.Above-mentioned main chain server realizes that the data of other nodes are total it can be appreciated that data sharing platform
It enjoys.
Alliance's chain, member and limited third party just for some special group, inside specify multiple preselected nodes
For the people that keeps accounts, each piece of generation is codetermined by all preselected nodes.
Generally according to the difference of alliance's chain network centralization degree, alliance's chain under 3 kinds of different application scenes is differentiated:
(1) the whole network discloses, the block chain of no user licensing scheme, referred to as publicly-owned chain;
(2) network is added in the node for allowing to authorize, and information can be checked according to permission, is often used for inter-agency block
Chain, referred to as alliance's chain or industry chain;
(3) node in all-network all rests in a mechanism hand, referred to as privately owned chain.
Alliance's chain and privately owned chain also referred to collectively as permit chain, publicly-owned chain to be known as unlicensed chain.
Alliance's chain in the embodiment of the present application can be understood as above-mentioned second situation, and the executing subject of this method can be
Main chain server in alliance's chain.It can be deployed with intelligent contract (Smart contract) on alliance's chain, be that one kind is intended to
The computer protocol of contract is propagated, verifies or executed in a manner of information-based.Intelligent contract allows in no third-party situation
Credible transaction is carried out, these transaction are traceable.Each node in above-mentioned alliance's chain can have the database of oneself, data sharing
Chain node and corresponding side chain node.
Above-mentioned first node, which can be any one of alliance's chain, can carry out the node of data sharing.In alliance's chain
Node can upload data and be shared, specifically, intelligent contract can specify that the node trading rules in alliance's chain, be based on
Above-mentioned intelligence contract, in the case where needing first node to provide shared data, main chain server first can be to the first segment
Point transmission above- mentioned information acquisition request, i.e. above- mentioned information acquisition request can be understood as the regulation based on intelligent contract and send out automatically
It rises.
Wherein, above- mentioned information acquisition request can carry above-mentioned target data mark, and above-mentioned Data Identification can be used for really
Fixed target data to be obtained, for example can be data number, data name etc., it can also be the data date of formation, that is, indicate
The target data for needing to obtain is the data generated within the data date of formation.
Optionally, above-mentioned intelligent contract may include the corresponding relationship of the node of data sharing time and data to be shared;
First node of the above-mentioned intelligent contract based on alliance's chain on above-mentioned alliance's chain sends information acquisition request tool
Body may include:
When reaching the first moment in the above-mentioned data sharing time, according to above-mentioned data sharing time and data to be shared
Node corresponding relationship, determine corresponding first node of above-mentioned first moment, Xiang Shangshu first node sends above- mentioned information and obtains
Take request.
Pre-set each nodal information is can store in main chain server, above-mentioned nodal information may include node mark
Know, is determined for node identities, such as the title including node, node serial number and/or node address, can also be stored with
The corresponding relationship of the node of above-mentioned data sharing time and data to be shared, such as the section of data sharing time and data to be shared
The mapping table of point, the corresponding relationship can be stored in the form of above-mentioned intelligent contract.The above-mentioned data sharing time can manage
The uplink time for the above-mentioned shared data that each node that Xie Weiyu provides shared data is reached an agreement.
Specifically, also may include different nodal informations in above-mentioned intelligence contract, and different nodes need to be to be sharing
Data type (can be Data Identification) and every kind of data type need to upload the shared time i.e. above-mentioned data sharing time
(such as once a week or exact date etc.).The observer of intelligent contract is the common recognition reached in advance to the intelligence contract,
For example reached an agreement by digital signature or the node of authentication, then main chain server can lead to according to above-mentioned intelligent contract
The mode for generating above- mentioned information acquisition request is crossed, regularly, with having foundation information acquisition request is initiated to node, obtains target
The acquisition modes of data.
Main chain server can execute step 102 in the case where being sent to first node above- mentioned information acquisition request.
Optionally, before step 101, this method further include:
It receives the addition to above-mentioned alliance's chain from above-mentioned first node to request, above-mentioned addition request includes above-mentioned first
Nodal information;
Determine that the node type of above-mentioned first node, above-mentioned node type include enterprise's section according to above-mentioned first node information
Point, credit information service's node and government organs' node;
The corresponding node rule for application of node type for obtaining above-mentioned first node, according to institute's node rule for application to above-mentioned
First node carries out authentication;
If above-mentioned authentication passes through, the above-mentioned shared information permission of above-mentioned alliance's chain is opened for above-mentioned first node.
Alliance's chain can permit the addition of node and exit, wherein node type may include: enterprise's node (as interconnected
Net financing corporation, business bank, payment platform, insurance company, securities broker company, room hand over institute etc.), credit information service's node (such as people's row
Reference, main strategies mechanism) and government organs' node etc..
Specifically, can be sent to the main chain server of alliance's chain when first node is not belonging to the node in alliance's chain
On the addition of above-mentioned alliance's chain is requested, above-mentioned addition request includes above-mentioned first node information, receives to come in main chain server
From after the addition request to above-mentioned alliance's chain of above-mentioned first node, above-mentioned first can be determined according to above-mentioned first node information
The node type of node.The node identification for including in available above-mentioned first node information, according to the node identification that prestores with
The corresponding relationship of node type determines that the corresponding node type of node identification obtained is the node type of the node, and main chain
In intelligent contract can also include that at least one node rule for application and node type are corresponding with node rule for application
Relationship, then it is possible to further obtain the corresponding node rule for application of node type of above-mentioned first node, further according to acquisition
Node rule for application carries out authentication to above-mentioned first node.
Optionally, above-mentioned verification process can also be executed by the authorization node in alliance's chain, can be recorded in intelligent contract
There is above-mentioned authorization node, for carrying out authentication to node.Above-mentioned authentication may include the number label for verifying the node
Name, the scoring of node-agent people biological information, node, node historic transmission record or node storage data quantity etc., do not limit herein
System.
102, the target information abstract from above-mentioned first node is received, above-mentioned target information abstract includes above-mentioned data mark
The data origin information of knowledge and the corresponding target data of above-mentioned Data Identification.
Main chain server can execute step 102 in the case where being sent to first node above- mentioned information acquisition request.The
One node can obtain Data Identification therein in response to above- mentioned information acquisition request, according to above-mentioned Data Identification go obtain or
Person searches corresponding target data, this is this shared data.Optionally, first node can obtain in the local database
Above-mentioned target data generates above- mentioned information abstract.
Informative abstract in the embodiment of the present application can be understood as the corresponding relationship of data and data source, i.e., a kind of data
The catalogue of acquisition modes.
Above-mentioned target information abstract may include the Data Identification and data for the target data that above-mentioned first node is shared
Source-information, above-mentioned Data Identification are determined for target data, the above-mentioned data origin information i.e. offer of the target data
Side is data source node, can be the data source node identification or data source node address of the target data.Wherein,
Above-mentioned source Nodes can be the first node, i.e. the first node directly uploads the data of oneself shared, and optionally, this comes
Source node is also possible to other nodes in alliance's chain, by the first node carry out data sharing, such as with the first segment
Point belongs to the node in same side chain.
Above-mentioned target information abstract can be before first node sends above-mentioned data sharing request, by above-mentioned data source
Node generates.Optionally, it can also actively apply for shared data by first node, first node, which can be sent, carries above-mentioned target
The data sharing of informative abstract is requested, and main chain server can execute step in the case where receiving above-mentioned data sharing request
Rapid 102.
Optionally, default proof rule has been can store in main chain server, for verifying whether above-mentioned first node has
Shared information permission in standby alliance's chain.Above-mentioned data sharing request can also include above-mentioned first node information, receive
To after above-mentioned data sharing request, first node information in available data sharing request, to determine first node,
And then above-mentioned first node information is audited according to above-mentioned default proof rule, judge whether the first node can provide
Shared data.
It may include to data transmission, the data sharing under different situations in above-mentioned default proof rule in intelligent contract
Node verification mode, specifically, such as judging whether the first node has by judging the node type of first node
Shared information permission in standby alliance's chain, part of nodes type have above-mentioned shared information permission, and part of nodes type does not have
Standby above-mentioned shared information permission;Node level is also based on to audit whether the node has above-mentioned shared information permission, than
It is previously stored with the first permission threshold value in such as alliance's chain, is just had when the node level of first node is higher than above-mentioned first threshold
Standby above-mentioned shared information permission, does not have above-mentioned shared letter then when the node level of first node is not higher than above-mentioned first threshold
Cease permission etc..
Optionally, above-mentioned first node information includes first node address;It is above-mentioned according to above-mentioned first node information and pre-
If proof rule, judge whether above-mentioned first node has the shared information permission in alliance's chain and include:
Judge the white list address whether above-mentioned first node address belongs in above-mentioned default proof rule;
If belonging to, above-mentioned first node has the shared information permission in above-mentioned alliance's chain;If being not belonging to, above-mentioned first segment
Point does not have the shared information permission in above-mentioned alliance's chain.In the case, if above-mentioned first node has in above-mentioned alliance's chain
Shared information permission, step 103 can be executed;If not having, step 103 is not executed.
After receiving the target information abstract from above-mentioned first node, step 103 can be executed.
103, determine that second node, Xiang Shangshu second node send above-mentioned in above-mentioned alliance's chain based on above-mentioned intelligent contract
Target information abstract.
The side of acquisition of different shared datas, i.e., above-mentioned second node are may further specify that in intelligent contract.Above-mentioned
Two nodes can be one or more.After receiving the target information abstract from above-mentioned first node, it can pass through
Intelligent contract judges the receiving node i.e. second node of target information abstract, then forwards above-mentioned target information to pluck to second node
It wants, second node is enable to get the target data by above-mentioned target information abstract.
Above-mentioned second node receives the local that the second node can be stored it in after above-mentioned target information is made a summary
In database or in side chain belonging to the second node (node).
Optionally, it broadcast them target information can also make a summary in above-mentioned alliance's chain.
Specifically, the node in above-mentioned alliance's chain can have local database, but the mode of shared data is not that will count
According to directly upload, but data to be shared can be generated into informative abstract, then be uploaded to store in main chain and issue in other words.
It is made a summary by above- mentioned information, can determine the source (node) of data.Such as the data a of A nodes sharing, data
Source-information in the A node address can be provided.
Optionally, this method further include:
The data acquisition request from second node is received, above-mentioned data acquisition request carries above-mentioned Data Identification;
Determine that corresponding above-mentioned target information abstract, Xiang Shangshu second node send above-mentioned target according to above-mentioned Data Identification
Informative abstract.
In the main chain of alliance's chain, it can store multiple above- mentioned information abstracts, that is, have the section of above-mentioned shared information permission
Point can be carried out data sharing.
Above-mentioned target information abstract can store in main chain, and above-mentioned second node can be that first is removed in above-mentioned alliance's chain
Node other than node, and when above-mentioned second node needs to obtain shared target data, it is only necessary to believed according to above-mentioned target
The source-information of digest challenge shared data is ceased, determines the source Nodes obtained, then send data acquisition to the source Nodes and ask
It asks.
In the case where above-mentioned second node did not received above-mentioned target information abstract, can be sent out with chain linked to owner server
It serves and states data acquisition request, including the Data Identification of target data to be obtained, receive in primary server from
It is available to above-mentioned Data Identification corresponding target information abstract when the data acquisition request of two nodes, then to above-mentioned second
Node sends above-mentioned target information abstract, then second node can be mentioned according to the determination of the source-information in the eap-message digest received
For the node (address) of data, apply obtaining target data to it.
Optionally, after node gets above-mentioned shared target data, target data can be integrated, then deposit
Enter the local data base of the node, voluntarily can obtain and check later.
The embodiment of the present application is by sending letter based on first node of the intelligent contract on alliance's chain on above-mentioned alliance's chain
Acquisition request is ceased, above- mentioned information acquisition request carries target data mark, and above-mentioned target data is identified as determining above-mentioned mesh
The mark of data is marked, later, can receive the target information abstract from above-mentioned first node, above-mentioned target information abstract includes
The data origin information of above-mentioned Data Identification and the corresponding target data of above-mentioned Data Identification, then existed based on above-mentioned intelligent contract
Determine that second node, Xiang Shangshu second node send above-mentioned target information abstract, pass through above-mentioned target information in above-mentioned alliance's chain
It makes a summary, the node in alliance's chain can determine data source and then obtain target data, it can increase data acquisition source, and
And safety is higher, reduces the cost of data acquisition and data maintenance.
It referring to fig. 2, is the exemplary flow of another data capture method based on alliance's chain provided by the embodiments of the present application
Figure, embodiment shown in Fig. 2, which can be, to be obtained on the basis of embodiment shown in Fig. 1, and this method as shown in Figure 2 can wrap
It includes:
201, the first node based on the intelligent contract on alliance's chain on above-mentioned alliance's chain sends information acquisition request, on
It states information acquisition request and carries target data mark, above-mentioned target data is identified as the mark for determining above-mentioned target data.
202, the target information abstract from above-mentioned first node is received, above-mentioned target information abstract includes above-mentioned data mark
The data origin information of knowledge and the corresponding target data of above-mentioned Data Identification.
Wherein, above-mentioned steps 201 and step 202 can refer to the step 101 and step 102 of embodiment illustrated in fig. 1 respectively
In specific descriptions, details are not described herein again.
203, judge that above-mentioned target data identifies whether to belong to the first Data Identification set based on above-mentioned intelligent contract.
Data in the embodiment of the present application can be collage-credit data, and first node and second node can be credit information service's section
Point, government organs' node or enterprise's node, third node can be the data analysis node as analysis collage-credit data.Main chain
In can store above-mentioned first Data Identification set, can be and recorded by above-mentioned intelligent contract, it can be understood as, this first
Data corresponding to Data Identification in Data Identification set are can to carry out the shared data of full main chain.It is also understood that be,
One data logo collection can correspond to a node cluster, and shared data corresponding to these Data Identifications is respectively from this
Node in node cluster, i.e. node in the node cluster can share mutually above- mentioned information abstract with shared data, in reality
There is privacy while existing data sharing.
It can first judge that target data identifies above-mentioned target data and identifies whether to belong to the first Data Identification set, if belonging to
In step 204 can be executed;If being not belonging to, step 204 can not be executed, step 205 can be executed.
204, broadcast them target information is made a summary in above-mentioned alliance's chain.
Broadcast (Broadcasting) is the most common form of multicast, it delivers one point to each point of destination
The copy of group.It can be completed by the delivery that multiple singles are grouped, the copy that can also be grouped by individually connecting transmitting,
Until each recipient receives a copy.It by way of broadcast, obtain the node in alliance's chain can
Take the mode of the target data, but it is different establish a capital to have permission obtain the target data, can also be according to other verification modes
It could be obtained after being verified, to improve safety.
It is not data each time to be changed to direct broadcast encryption, but generate one and be similar in the embodiment of the present application
The encryption string of informative abstract is broadcasted, data can be made even be decrypted (this is also almost impossible certainly) will not reveal it is any
Private data.
205, determine that second node, Xiang Shangshu second node send above-mentioned in above-mentioned alliance's chain based on above-mentioned intelligent contract
Target information abstract.
Wherein, above-mentioned steps 205 can refer to the specific descriptions in the step 103 of embodiment illustrated in fig. 1, no longer superfluous herein
It states.
206, the data analysis request from third node is received, above-mentioned data analysis request carries above-mentioned target data mark
Know, above-mentioned third node is determined as in above-mentioned alliance's chain based on above-mentioned intelligent contract, the target analysis of data analysis service is provided
Node.
The step 206 can execute after step 204 or step 205.Above-mentioned third node can be above-mentioned alliance's chain
In node in addition to first node, can in alliance's chain request data, since main chain can provide big data simultaneously
Analysis interface, third node can also request to analyze data.It can specify that execution data analyze function in intelligent contract
At least one analysis node of energy, can specifically include the corresponding relationship of node and analysis node, an analysis node can be right
One or more other node is answered, the data analysis task of other above-mentioned nodes is responsible for.It can by the above-mentioned big data interface
To communicate with the target analysis node for the data analysis function for executing first node, above-mentioned target analysis node can be used as alliance
The special joint of chain, can be different with the permission of other nodes.
The main chain server of alliance's chain after receiving the data analysis request from above-mentioned third node, it is available on
Target data mark is stated, the data analysis instructions for carrying above-mentioned target data mark is generated, executes step 207.
207, Xiang Shangshu target analysis node sends data analysis instructions, and above-mentioned data analysis instructions are used to indicate above-mentioned mesh
Mark analysis node obtains target data to be analyzed.
Can be understood as main chain server can forward the data analysis request of third node, Xiang Shangshu target analysis node
Above-mentioned data analysis instructions are sent, analyze above-mentioned target analysis node to target data.Specifically, target analysis node
On can be deployed with data analysis algorithm, can also according to above-mentioned Data Identification obtain target information abstract, obtain target data
Carry out data analysis.Optionally, after completing data analysis, data analysis result can be sent to third node, it can also be with
It is to be forwarded based on main chain server to the third node.It can be connected to data silo by this method, and more data can be obtained
Source, and then data analysis is safely and accurately completed, real big data analysis can be created based on data sharing platform.
The main chain of alliance's chain of the embodiment of the present application can ((Hyperledger) Project Technical be realized based on super account book.
Super account book is the open source projects for being intended to push the inter-trade application of block chain.It provides a modular framework, frame
The execution (being known as " chaincode " in Fabric project) of node, intelligent contract in structure and configurable common recognition and member
Service.One Fabric network includes that companion's node (" Peer nodes ") executes chaincode contract, accesses account book data,
The interface of endorsement transaction and referred to as application program.Mandator node (" Orderer nodes ") is responsible for ensuring the one of this block chain
Cause property simultaneously conveys the transaction endorsed to the companions in network;And MSP service, mainly as certificate authority
X.509 certificate is used to verify member identities and role for (Certificate Authority) management.It, can based on super account book
There are at least four class special joints: endorsement node, confirmation node, ordering joint, certificate node.
Alliance's chain in the embodiment of the present application can carry out intelligent contract exploitation based on Go or Java, and the above method can be with
Intelligent contract is written to realize, all kinds of nodes is set, message is broadcasted, sort, know together, is confirmed and is write on chain.Wherein authenticate
Node (above-mentioned verifying node) and authorization node may be implemented certain nodes and form a small-sized cluster, be carried out using encrypted tunnel
Communication interaction, and other lack of competence nodes can not then participate in interacting, and increase safety, the flexibility of data transmission.
In the embodiment of the present application, by being sent based on first node of the intelligent contract on alliance's chain on above-mentioned alliance's chain
Information acquisition request, above- mentioned information acquisition request carry target data mark, and above-mentioned target data is identified as above-mentioned for determining
The mark of target data receives the target information abstract from above-mentioned first node, and above-mentioned target information abstract includes above-mentioned number
According to the data origin information of mark and the corresponding target data of above-mentioned Data Identification, then, based on above-mentioned intelligent contract judgement
Above-mentioned target data identifies whether to belong to the first Data Identification set, if belonging to, can in above-mentioned alliance's chain broadcast them mesh
Informative abstract is marked, if being not belonging to, second node, Xiang Shangshu second can be determined in above-mentioned alliance's chain based on above-mentioned intelligent contract
Node sends above-mentioned target information abstract, is made a summary by above-mentioned target information, the node in alliance's chain can determine data source
And then obtain target data, it can increase data acquisition source, and safety is higher, reduce data acquisition and data maintenance
Cost.It may also receive from the data analysis request of third node, above-mentioned data analysis request carries above-mentioned target data
Mark is determined as above-mentioned third node based on above-mentioned intelligent contract in above-mentioned alliance's chain and provides the target point of data analysis service
Node is analysed, Xiang Shangshu target analysis node sends data analysis instructions, and above-mentioned data analysis instructions are used to indicate above-mentioned target point
Analysis node obtains target data to be analyzed, can create real big data analysis based on data sharing platform, both ensure that
Privacy, and realize data sharing and analysis integration.
It is above-mentioned that mainly the scheme of the embodiment of the present application is described from the angle of method side implementation procedure.It is understood that
, in order to realize the above functions, it comprises execute the corresponding hardware configuration of each function and/or software mould for electronic equipment
Block.Those skilled in the art should be readily appreciated that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, the present invention can be realized with the combining form of hardware or hardware and computer software.Some function actually with
Hardware or computer software drive the mode of hardware to execute, the specific application and design constraint item depending on technical solution
Part.Professional technician can be to specifically realizing described function using distinct methods, but this realization is not
It is considered as beyond the scope of this invention.
The embodiment of the present application can carry out the division of functional module according to above method example to electronic equipment, for example, can
With each functional module of each function division of correspondence, two or more functions can also be integrated in a processing module
In.Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It needs
It is noted that be schematical, only a kind of logical function partition to the division of module in the embodiment of the present application, it is practical real
It is current that there may be another division manner.
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of server provided by the embodiments of the present application, the server 300 packet
Include information acquisition module 310 and information sharing module 320, in which:
Above- mentioned information acquisition module 310, for the first segment based on the intelligent contract on alliance's chain on above-mentioned alliance's chain
Point sends information acquisition request, and above- mentioned information acquisition request carries target data mark, and above-mentioned target data is identified as true
The mark of fixed above-mentioned target data;
Above- mentioned information acquisition module 310 is also used to receive the target information abstract from above-mentioned first node, above-mentioned target
Informative abstract includes the data origin information of above-mentioned Data Identification and the corresponding target data of above-mentioned Data Identification;
Above- mentioned information sharing module 320, for determining second node in above-mentioned alliance's chain based on above-mentioned intelligent contract, to
Above-mentioned second node sends above-mentioned target information abstract.
Optionally, above-mentioned intelligent contract includes the corresponding relationship of the node of data sharing time and data to be shared;
Above- mentioned information sharing module 320, specifically for when reaching the first moment in above-mentioned data sharing time, according to
The corresponding relationship of the node of above-mentioned data sharing time and data to be shared, determines corresponding first node of above-mentioned first moment,
Above- mentioned information acquisition request is sent to above-mentioned first node.
Optionally, above-mentioned server 300 further includes judgment module 330, is used for
Above-mentioned intelligent contract before determining second node, is based in above-mentioned alliance's chain based on above-mentioned intelligent contract above-mentioned
Judge that above-mentioned target data identifies whether to belong to the first Data Identification set;
Above- mentioned information sharing module 320 is also used to, if above-mentioned target data mark belongs to above-mentioned first Data Identification set,
Broadcast them target information is made a summary in above-mentioned alliance's chain.
Optionally, above- mentioned information sharing module 320 is specifically used for, and obtains the above-mentioned first segment recorded in above-mentioned intelligent contract
The associated nodes set of point determines that at least one node in above-mentioned associated nodes set is above-mentioned second node.
Optionally, above-mentioned server further includes analysis and Control module 340, is used for:
The data analysis request from third node is received, above-mentioned data analysis request carries above-mentioned target data mark;
It is determined as above-mentioned third node in above-mentioned alliance's chain based on above-mentioned intelligent contract and the mesh of data analysis service is provided
Mark analysis node;
Data analysis instructions are sent to above-mentioned target analysis node, above-mentioned data analysis instructions are used to indicate above-mentioned target point
Analysis node obtains target data to be analyzed.
According to the specific embodiment of the embodiment of the present application, Fig. 1 and the data capture method shown in Fig. 2 based on alliance's chain
The step 101 being related to~103,201~207 modules that can be in server 300 as shown in Figure 3 are performed.
By the server 300 of the embodiment of the present application, server 300 can by based on the intelligent contract on alliance's chain to
First node on above-mentioned alliance's chain sends information acquisition request, and above- mentioned information acquisition request carries target data mark, above-mentioned
Target data is identified as the mark for determining above-mentioned target data, later, can receive the target from above-mentioned first node
Informative abstract, above-mentioned target information abstract include the data of above-mentioned Data Identification and the corresponding target data of above-mentioned Data Identification
Source-information, then determine that second node, Xiang Shangshu second node send above-mentioned in above-mentioned alliance's chain based on above-mentioned intelligent contract
Target information abstract, is made a summary by above-mentioned target information, and the node in alliance's chain can determine data source and then obtain target
Data, it can increase data acquisition source, and safety is higher, reduce the cost of data acquisition and data maintenance.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another kind server disclosed in the embodiment of the present application.As shown in figure 4,
The server 400 includes processor 401 and memory 402, wherein server 400 can also include bus 403, processor 401
It can be connected with each other by bus 403 with memory 402, bus 403 can be Peripheral Component Interconnect standard (Peripheral
Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard
Architecture, EISA) bus etc..Bus 403 can be divided into address bus, data/address bus, control bus etc..For convenient for table
Show, only indicated with a thick line in Fig. 4, it is not intended that an only bus or a type of bus.Wherein, server
400 can also include input-output equipment 404, and input-output equipment 404 may include display screen, such as liquid crystal display.It deposits
Reservoir 402 is used to store one or more programs comprising instruction;Processor 401 is stored in memory 402 for calling
Method and step some or all of is mentioned in the above-mentioned Fig. 1 and Fig. 2 embodiment of instruction execution.
It should be appreciated that in the embodiment of the present application, alleged processor 401 can be central processing unit (Central
Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
Reason device is also possible to any conventional processor etc..
Input equipment 402 may include that Trackpad, fingerprint adopt sensor (for acquiring the finger print information and fingerprint of user
Directional information), microphone etc., output equipment 403 may include display (LCD etc.), loudspeaker etc..
The memory 404 may include read-only memory and random access memory, and to processor 401 provide instruction and
Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited
Store up the information of device type.
By the server 400 of the embodiment of the present application, server 400 can be based on the intelligent contract on alliance's chain to above-mentioned
First node on alliance's chain sends information acquisition request, and above- mentioned information acquisition request carries target data mark, above-mentioned target
Data Identification is that the mark for determining above-mentioned target data can receive the target information from above-mentioned first node later
Abstract, above-mentioned target information abstract include the data source of above-mentioned Data Identification and the corresponding target data of above-mentioned Data Identification
Information, then determine that second node, Xiang Shangshu second node send above-mentioned target in above-mentioned alliance's chain based on above-mentioned intelligent contract
Informative abstract is made a summary by above-mentioned target information, and the node in alliance's chain can determine data source and then obtain target data,
Data acquisition source can be increased, and safety is higher, reduce the cost of data acquisition and data maintenance.
The embodiment of the present application also provides a kind of computer storage medium, wherein computer storage medium storage is for electricity
The computer program of subdata exchange, it is as any in recorded in above method embodiment which execute computer
A kind of some or all of the data capture method based on alliance's chain step.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, it is only a kind of
Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or module,
It can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module
The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple
On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
If the integrated module is realized in the form of software function module and sells or use as independent product
When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or
Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products
Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment
(can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention
Step.And memory above-mentioned includes: USB flash disk, read-only memory (Read-Only Memory, ROM), random access memory
The various media that can store program code such as (Random Access Memory, RAM), mobile hard disk, magnetic or disk.
Claims (10)
1. a kind of data capture method based on alliance's chain is applied to server, which is characterized in that the described method includes:
First node based on the intelligent contract on alliance's chain on alliance's chain sends information acquisition request, and the information obtains
Request is taken to carry target data mark, the target data is identified as the mark for determining the target data;
The target information abstract from the first node is received, the target information abstract includes the Data Identification and institute
State the data origin information of the corresponding target data of Data Identification;
Determine that second node, Xiang Suoshu second node send the target information in alliance's chain based on the intelligent contract
Abstract.
2. the method according to claim 1, wherein the intelligence contract include the data sharing time with it is to be shared
The corresponding relationship of the node of data;
First node of the intelligent contract based on alliance's chain on alliance's chain sends information acquisition request
When reaching the first moment in the data sharing time, according to the section of the data sharing time and data to be shared
The corresponding relationship of point determines that first moment corresponding first node, Xiang Suoshu first node send the acquisition of information and ask
It asks.
3. method according to claim 1 or 2, which is characterized in that described to be based on the intelligent contract in alliance's chain
Before middle determining second node, the method also includes:
Judge that the target data identifies whether to belong to the first Data Identification set based on the intelligent contract;
If belonging to, the target information abstract is broadcasted in alliance's chain.
4. according to the method described in claim 3, it is characterized in that, described true in alliance's chain based on the intelligent contract
Determining second node includes:
The associated nodes set for obtaining the first node recorded in the intelligent contract, determines in the associated nodes set
At least one node be the second node.
5. according to the method in claim 2 or 3, which is characterized in that the method also includes:
The data analysis request from third node is received, the data analysis request carries the target data mark;
It is determined as the third node in alliance's chain based on the intelligent contract and the target point of data analysis service is provided
Analyse node;
Data analysis instructions are sent to the target analysis node, the data analysis instructions are used to indicate the target analysis section
Point obtains target data to be analyzed.
6. a kind of server characterized by comprising information acquisition module and information sharing module, in which:
The information acquisition module, for sending letter based on first node of the intelligent contract on alliance's chain on alliance's chain
Acquisition request is ceased, the information acquisition request carries target data mark, and the target data is identified as determining the mesh
Mark the mark of data;
The information acquisition module, is also used to receive the target information abstract from the first node, and the target information is plucked
It to include the data origin information of the Data Identification and the corresponding target data of the Data Identification;
The information sharing module, for based on the intelligent contract in alliance's chain determination second node, Xiang Suoshu the
Two nodes send the target information abstract.
7. server according to claim 6, which is characterized in that the intelligence contract include the data sharing time with to altogether
Enjoy the corresponding relationship of the node of data;
The information sharing module, specifically for when reaching the first moment in data sharing time, according to the number
According to the corresponding relationship of shared time and the node of data to be shared, first moment corresponding first node, Xiang Suoshu are determined
First node sends the information acquisition request.
8. server according to claim 6 or 7, which is characterized in that further include judgment module, be used for:
Before determining second node, judged based on the intelligent contract in alliance's chain described based on the intelligent contract
The target data identifies whether to belong to the first Data Identification set;
The information sharing module is also used to, if target data mark belongs to the first Data Identification set, described
The target information abstract is broadcasted in alliance's chain.
9. a kind of server, which is characterized in that including processor, input equipment, output equipment and memory, the processor,
Input equipment, output equipment and memory are connected with each other, wherein the memory is for storing computer program, the calculating
Machine program includes program instruction, and the processor is configured for calling described program instruction, is executed as claim 1-5 is any
Method described in.
10. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with computer program, described
Computer program includes program instruction, and described program instruction makes the processor execute such as claim when being executed by a processor
The described in any item methods of 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910423146.XA CN110210961A (en) | 2019-05-21 | 2019-05-21 | Data capture method, server and computer storage medium based on alliance's chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910423146.XA CN110210961A (en) | 2019-05-21 | 2019-05-21 | Data capture method, server and computer storage medium based on alliance's chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110210961A true CN110210961A (en) | 2019-09-06 |
Family
ID=67787955
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910423146.XA Pending CN110210961A (en) | 2019-05-21 | 2019-05-21 | Data capture method, server and computer storage medium based on alliance's chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110210961A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110727894A (en) * | 2019-10-12 | 2020-01-24 | 腾讯科技(深圳)有限公司 | Target material setting method, device, equipment and storage medium |
CN110928880A (en) * | 2019-11-19 | 2020-03-27 | 腾讯科技(深圳)有限公司 | Data processing method, device, terminal and medium based on block chain |
CN111046078A (en) * | 2019-11-11 | 2020-04-21 | 北京海益同展信息科技有限公司 | Block chain-based credit investigation query method and device and electronic equipment |
CN111080337A (en) * | 2019-11-04 | 2020-04-28 | 广州亚美信息科技有限公司 | Vehicle evaluation information acquisition method, device, system and equipment based on alliance chain |
CN111091900A (en) * | 2019-11-25 | 2020-05-01 | 中电健康云科技有限公司 | Medical grading diagnosis and treatment method and system based on block chain intelligent contracts |
CN111327623A (en) * | 2020-02-28 | 2020-06-23 | 上海哈世科技有限公司 | Alliance link information transmission method, device, equipment and storage medium |
CN111415252A (en) * | 2020-01-23 | 2020-07-14 | 众安信息技术服务有限公司 | Privacy transaction processing method and device based on block chain |
CN111598531A (en) * | 2020-04-27 | 2020-08-28 | 傲林科技有限公司 | Multi-block chain service cooperation method and device and electronic equipment |
CN111881472A (en) * | 2020-07-22 | 2020-11-03 | 云账户技术(天津)有限公司 | Data access control method, system, authority management system and medium |
CN112163034A (en) * | 2020-09-03 | 2021-01-01 | 中国联合网络通信集团有限公司 | Model sharing method, node and block chain system |
CN112235360A (en) * | 2020-09-26 | 2021-01-15 | 建信金融科技有限责任公司 | Data sharing method, device and system based on alliance chain, electronic equipment and computer readable storage medium |
CN112434082A (en) * | 2020-11-25 | 2021-03-02 | 平安普惠企业管理有限公司 | Operation and maintenance resource management method, device, equipment and medium |
CN113765875A (en) * | 2020-11-17 | 2021-12-07 | 北京京东乾石科技有限公司 | Feedback method and device of data verification information |
CN113812965A (en) * | 2021-08-19 | 2021-12-21 | 杭州回车电子科技有限公司 | Sleep state recognition method, device, electronic device and storage medium |
CN114124943A (en) * | 2020-08-14 | 2022-03-01 | 北京金山云网络技术有限公司 | Processing method, device and system for block chain nodes and electronic device |
CN114760325A (en) * | 2020-12-25 | 2022-07-15 | 中移动信息技术有限公司 | Business data processing method, device, storage medium and sharing platform |
CN111881472B (en) * | 2020-07-22 | 2024-04-26 | 云账户技术(天津)有限公司 | Data access control method, system, authority management system and medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109003078A (en) * | 2018-06-27 | 2018-12-14 | 阿里巴巴集团控股有限公司 | Intelligent contract call method and device, electronic equipment based on block chain |
CN109492419A (en) * | 2018-11-27 | 2019-03-19 | 众安信息技术服务有限公司 | For obtaining the method, apparatus and storage medium of the data in block chain |
CN109600441A (en) * | 2018-12-14 | 2019-04-09 | 深圳壹账通智能科技有限公司 | Alliance's chain information distribution control method and terminal device |
-
2019
- 2019-05-21 CN CN201910423146.XA patent/CN110210961A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109003078A (en) * | 2018-06-27 | 2018-12-14 | 阿里巴巴集团控股有限公司 | Intelligent contract call method and device, electronic equipment based on block chain |
CN109492419A (en) * | 2018-11-27 | 2019-03-19 | 众安信息技术服务有限公司 | For obtaining the method, apparatus and storage medium of the data in block chain |
CN109600441A (en) * | 2018-12-14 | 2019-04-09 | 深圳壹账通智能科技有限公司 | Alliance's chain information distribution control method and terminal device |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110727894A (en) * | 2019-10-12 | 2020-01-24 | 腾讯科技(深圳)有限公司 | Target material setting method, device, equipment and storage medium |
CN110727894B (en) * | 2019-10-12 | 2023-09-01 | 腾讯科技(深圳)有限公司 | Target material setting method, device, equipment and storage medium |
CN111080337A (en) * | 2019-11-04 | 2020-04-28 | 广州亚美信息科技有限公司 | Vehicle evaluation information acquisition method, device, system and equipment based on alliance chain |
CN111046078A (en) * | 2019-11-11 | 2020-04-21 | 北京海益同展信息科技有限公司 | Block chain-based credit investigation query method and device and electronic equipment |
CN111046078B (en) * | 2019-11-11 | 2023-09-05 | 京东科技信息技术有限公司 | Credit investigation method and device based on block chain and electronic equipment |
CN110928880A (en) * | 2019-11-19 | 2020-03-27 | 腾讯科技(深圳)有限公司 | Data processing method, device, terminal and medium based on block chain |
CN110928880B (en) * | 2019-11-19 | 2024-01-12 | 腾讯科技(深圳)有限公司 | Data processing method, device, terminal and medium based on block chain |
CN111091900A (en) * | 2019-11-25 | 2020-05-01 | 中电健康云科技有限公司 | Medical grading diagnosis and treatment method and system based on block chain intelligent contracts |
CN111415252A (en) * | 2020-01-23 | 2020-07-14 | 众安信息技术服务有限公司 | Privacy transaction processing method and device based on block chain |
CN111327623A (en) * | 2020-02-28 | 2020-06-23 | 上海哈世科技有限公司 | Alliance link information transmission method, device, equipment and storage medium |
CN111598531A (en) * | 2020-04-27 | 2020-08-28 | 傲林科技有限公司 | Multi-block chain service cooperation method and device and electronic equipment |
CN111598531B (en) * | 2020-04-27 | 2023-09-01 | 傲林科技有限公司 | Multi-block-chain service cooperation method and device and electronic equipment |
CN111881472A (en) * | 2020-07-22 | 2020-11-03 | 云账户技术(天津)有限公司 | Data access control method, system, authority management system and medium |
CN111881472B (en) * | 2020-07-22 | 2024-04-26 | 云账户技术(天津)有限公司 | Data access control method, system, authority management system and medium |
CN114124943A (en) * | 2020-08-14 | 2022-03-01 | 北京金山云网络技术有限公司 | Processing method, device and system for block chain nodes and electronic device |
CN112163034A (en) * | 2020-09-03 | 2021-01-01 | 中国联合网络通信集团有限公司 | Model sharing method, node and block chain system |
CN112235360A (en) * | 2020-09-26 | 2021-01-15 | 建信金融科技有限责任公司 | Data sharing method, device and system based on alliance chain, electronic equipment and computer readable storage medium |
CN113765875A (en) * | 2020-11-17 | 2021-12-07 | 北京京东乾石科技有限公司 | Feedback method and device of data verification information |
CN112434082A (en) * | 2020-11-25 | 2021-03-02 | 平安普惠企业管理有限公司 | Operation and maintenance resource management method, device, equipment and medium |
CN114760325A (en) * | 2020-12-25 | 2022-07-15 | 中移动信息技术有限公司 | Business data processing method, device, storage medium and sharing platform |
CN113812965A (en) * | 2021-08-19 | 2021-12-21 | 杭州回车电子科技有限公司 | Sleep state recognition method, device, electronic device and storage medium |
CN113812965B (en) * | 2021-08-19 | 2024-04-09 | 杭州回车电子科技有限公司 | Sleep state identification method, sleep state identification device, electronic device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110210961A (en) | Data capture method, server and computer storage medium based on alliance's chain | |
CN110266648A (en) | Data capture method, server and computer storage medium based on alliance's chain | |
Rathee et al. | A secure communicating things network framework for industrial IoT using blockchain technology | |
CN110246017A (en) | Data capture method, terminal device and computer storage medium based on alliance's chain | |
CN110222529A (en) | Assets management method, electronic equipment and computer storage medium based on alliance's chain | |
CN109450910A (en) | Data sharing method, data sharing network and electronic equipment based on block chain | |
CN109525671A (en) | Date storage method, electronic equipment and storage medium based on block chain | |
CN110223157A (en) | Data capture method, electronic equipment and computer storage medium based on alliance's chain | |
CN110599181A (en) | Data processing method, device and equipment based on block chain and storage medium | |
CN109753815A (en) | Data processing method, data processing network and electronic equipment based on block chain | |
US9946984B2 (en) | System and method for transporting a document between a first service provider and a second service provider | |
CN110245185A (en) | Data processing method, terminal device and computer storage medium based on alliance's chain | |
CN110633963A (en) | Electronic bill processing method, electronic bill processing device, computer-readable storage medium and equipment | |
CN111506928B (en) | Just information sharing system based on block chain | |
CN110263025A (en) | Data liquidation method, electronic equipment and computer storage medium based on alliance's chain | |
CN109190881A (en) | A kind of data assets management method, system and equipment | |
CN110246040A (en) | Trade management method, electronic equipment and computer storage medium based on alliance's chain | |
CN110365711B (en) | Multi-platform user identity association method and device, computer equipment and computer readable storage medium | |
CN112163954B (en) | Transaction method and device based on block chain | |
CN112150149A (en) | Data tracing method and device based on block chain, computer equipment and storage medium | |
CN112702402A (en) | System, method, device, processor and storage medium for realizing government affair information resource sharing and exchange based on block chain technology | |
Gruber et al. | Unifying lightweight blockchain client implementations | |
CN114881757A (en) | Letter method, system and electronic equipment | |
Yang et al. | Leveraging blockchain for scaffolding work management in construction | |
CN110458507A (en) | A kind of authorization method and device of the trustship of public platform business |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |