CN110210961A - Data capture method, server and computer storage medium based on alliance's chain - Google Patents

Data capture method, server and computer storage medium based on alliance's chain Download PDF

Info

Publication number
CN110210961A
CN110210961A CN201910423146.XA CN201910423146A CN110210961A CN 110210961 A CN110210961 A CN 110210961A CN 201910423146 A CN201910423146 A CN 201910423146A CN 110210961 A CN110210961 A CN 110210961A
Authority
CN
China
Prior art keywords
node
data
mentioned
chain
alliance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910423146.XA
Other languages
Chinese (zh)
Inventor
陈子豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201910423146.XA priority Critical patent/CN110210961A/en
Publication of CN110210961A publication Critical patent/CN110210961A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The embodiment of the present application discloses a kind of data capture method based on alliance's chain, server and computer-readable medium, it is related to block storage system and block data structures technology, wherein method includes: that the first node based on the intelligent contract on alliance's chain on alliance's chain sends information acquisition request, the information acquisition request carries target data mark, and the target data is identified as the mark for determining the target data;The target information abstract from the first node is received, the target information abstract includes the data origin information of the Data Identification and the corresponding target data of the Data Identification;Determine that second node, Xiang Suoshu second node send the target information abstract, can increase data acquisition source, reduce the cost of data acquisition and data maintenance in alliance's chain based on the intelligent contract.

Description

Data capture method, server and computer storage medium based on alliance's chain
Technical field
This application involves alliance's chain technical field more particularly to a kind of data capture methods based on alliance's chain, server And computer storage medium.
Background technique
Reference is to acquire, arrange in accordance with the law, saving, processing the credit information of natural person, legal person and its hetero-organization, and externally mentioning For services such as credit report, credit evaluation, credit information consultings, client's judgement, control credit risk are helped, credit management is carried out Activity, it provides the shared platform of credit information for specialized credit mechanism.
Current, credit investigation system centralization generally obtains reference report by people's row reference or main strategies mechanism, Data source is more single, and procurement cost is high.And other enterprises and mechanism for thering is data acquisition to need, also without safe enough The effective mode collected, arrange data.
Summary of the invention
The embodiment of the present application provides a kind of data capture method based on alliance's chain, server and computer-readable medium, It is related to block storage system and block data structures technology, data acquisition source can be increased, reduces data acquisition and data dimension The cost of shield.
In a first aspect, the embodiment of the present application provides a kind of data capture method based on alliance's chain, it is applied to server, The described method includes:
The data sharing request from first node is received, the data sharing request carries first node information and target Informative abstract, the target information abstract include the Data Identification and source letter for the target data that the first node is shared Breath;
According to the first node information and default proof rule, judge whether the first node has in alliance's chain Shared information permission;
If having, the target information abstract is broadcasted in the main chain of alliance's chain.
As a kind of possible embodiment, the first node information includes first node address;It is described according to First node information and default proof rule, judge whether the first node has the shared information permission packet in alliance's chain It includes:
Judge the white list address whether the first node address belongs in the default proof rule;
If belonging to, the first node has the shared information permission in alliance's chain;If being not belonging to, the first segment Point does not have the shared information permission in alliance's chain.
As a kind of possible embodiment, the method also includes:
When the first node address is not belonging to the white list address in the default proof rule, obtain and described first The associated verifying address of node of node;
The shared authentication to the first node is sent to the verifying node according to the verifying address of node to request;
When receiving from the confirmation instruction that the verifying node requests the shared authentication, the first segment is determined Point has the shared information permission in alliance's chain;Verify what node requested the shared authentication from described receiving When refusal instruction, determine that the first node does not have the shared information permission in alliance's chain.
As a kind of possible embodiment, described before receiving the data sharing request from first node, it is described Method further include:
It receives the addition to alliance's chain from the first node to request, the addition request includes described first Nodal information;
Determine that the node type of the first node, the node type include enterprise's section according to the first node information Point, credit information service's node and government organs' node;
The corresponding node rule for application of node type for obtaining the first node, according to institute's node rule for application to described First node carries out authentication;
If the authentication passes through, the shared information permission of alliance's chain is opened for the first node.
As a kind of possible embodiment, the method also includes:
The data acquisition request from second node is received, the data acquisition request carries the Data Identification;
Determine that the corresponding target information abstract, Xiang Suoshu second node send the target according to the Data Identification Informative abstract.
As a kind of possible embodiment, the method also includes:
The data analysis request from the second node is received, the data analysis request carries the Data Identification;
Data analysis node into alliance's chain, which is sent, carries the Data Identification and the second node address The data analysis instructions, the data analysis instructions analyze the target data for the data analysis node.
As a kind of possible embodiment, the main chain of alliance's chain is realized based on super account book Project Technical.
Second aspect, the embodiment of the present application provide a kind of server, comprising: transmission module, judgment module and broadcast mould Block, in which:
The transmission module, for receiving the data sharing request from first node, the data sharing request is carried First node information and target information abstract, the target information abstract include the target data that the first node is shared Data Identification and source-information;
The judgment module, for judging the first node according to the first node information and default proof rule Whether shared information permission in alliance chain is had;
The broadcast module, if having the shared information permission in alliance's chain for the first node, described The target information abstract is broadcasted in the main chain of alliance's chain.
The third aspect, the embodiment of the present application also provides a kind of servers, including processor, input equipment, output equipment And memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing Computer program, the computer program include program instruction, and the processor is configured for calling described program instruction, are held Method of the row as described in first aspect and its any possible embodiment.
Fourth aspect, the embodiment of the present application provide a kind of computer storage medium, the computer storage medium storage There is computer program, the computer program includes program instruction, and described program instruction makes the place when being executed by a processor The method that reason device executes above-mentioned first aspect and its any possible embodiment.
The embodiment of the present application is by sending letter based on first node of the intelligent contract on alliance's chain on above-mentioned alliance's chain Acquisition request is ceased, above- mentioned information acquisition request carries target data mark, and above-mentioned target data is identified as determining above-mentioned mesh The mark for marking data may also receive from the target information abstract of above-mentioned first node, and above-mentioned target information abstract includes upper The data origin information of Data Identification and the corresponding target data of above-mentioned Data Identification is stated, then based on above-mentioned intelligent contract upper It states and determines second node in alliance's chain, Xiang Shangshu second node sends above-mentioned target information abstract, is plucked by above-mentioned target information It wants, the node in alliance's chain can determine data source and then obtain target data, it can increase data acquisition source, and Safety is higher, reduces the cost of data acquisition and data maintenance.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description Attached drawing is briefly described.
Fig. 1 is a kind of flow diagram of data capture method based on alliance's chain provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram for data capture method based on alliance's chain that another embodiment of the application provides;
Fig. 3 is a kind of structural schematic diagram of server provided by the embodiments of the present application;
Fig. 4 is the structural schematic diagram of another server provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Herein " embodiment " is referred to it is meant that a particular feature, structure, or characteristic described may be embodied in the application at least in conjunction with the embodiments In one embodiment.The phrase, which occurs, in each position in the description might not each mean identical embodiment, nor With the independent or alternative embodiment of other embodiments mutual exclusion.Those skilled in the art explicitly and implicitly understand, Embodiment described herein can be combined with other embodiments.
Based on the embodiment in the application, those of ordinary skill in the art are obtained without making creative work The every other embodiment obtained, shall fall in the protection scope of this application.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap Include other step or units intrinsic for these process, methods, product or equipment.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment And be not intended to limit the application.As present specification and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to more fully understand the embodiment of the present application, will be situated between below to the method for application the embodiment of the present application It continues.
The terminal device mentioned in the embodiment of the present application is the equipment that can be communicated with server, above-mentioned server Claim servomechanism, is to provide the equipment of the service of calculating, can permit multiple terminal devices and access.Above-mentioned terminal device can be Mobile terminal including the various handheld devices with wireless communication function, wearable device, calculates equipment or is connected to wireless tune Other processing equipments of modulator-demodulator and various forms of user equipmenies (User Equipment, UE), mobile station (Mobile Station, MS) etc..
It referring to Figure 1, is a kind of exemplary flow of data capture method based on alliance's chain provided by the embodiments of the present application Figure, this method as shown in Figure 1 can include:
101, the first node based on the intelligent contract on alliance's chain on above-mentioned alliance's chain sends information acquisition request, on It states information acquisition request and carries target data mark, above-mentioned target data is identified as the mark for determining above-mentioned target data.
Executing subject in the embodiment of the present application can be the main chain node in alliance's chain, can be above-mentioned server, or Person is known as main chain server.Above-mentioned main chain server realizes that the data of other nodes are total it can be appreciated that data sharing platform It enjoys.
Alliance's chain, member and limited third party just for some special group, inside specify multiple preselected nodes For the people that keeps accounts, each piece of generation is codetermined by all preselected nodes.
Generally according to the difference of alliance's chain network centralization degree, alliance's chain under 3 kinds of different application scenes is differentiated:
(1) the whole network discloses, the block chain of no user licensing scheme, referred to as publicly-owned chain;
(2) network is added in the node for allowing to authorize, and information can be checked according to permission, is often used for inter-agency block Chain, referred to as alliance's chain or industry chain;
(3) node in all-network all rests in a mechanism hand, referred to as privately owned chain.
Alliance's chain and privately owned chain also referred to collectively as permit chain, publicly-owned chain to be known as unlicensed chain.
Alliance's chain in the embodiment of the present application can be understood as above-mentioned second situation, and the executing subject of this method can be Main chain server in alliance's chain.It can be deployed with intelligent contract (Smart contract) on alliance's chain, be that one kind is intended to The computer protocol of contract is propagated, verifies or executed in a manner of information-based.Intelligent contract allows in no third-party situation Credible transaction is carried out, these transaction are traceable.Each node in above-mentioned alliance's chain can have the database of oneself, data sharing Chain node and corresponding side chain node.
Above-mentioned first node, which can be any one of alliance's chain, can carry out the node of data sharing.In alliance's chain Node can upload data and be shared, specifically, intelligent contract can specify that the node trading rules in alliance's chain, be based on Above-mentioned intelligence contract, in the case where needing first node to provide shared data, main chain server first can be to the first segment Point transmission above- mentioned information acquisition request, i.e. above- mentioned information acquisition request can be understood as the regulation based on intelligent contract and send out automatically It rises.
Wherein, above- mentioned information acquisition request can carry above-mentioned target data mark, and above-mentioned Data Identification can be used for really Fixed target data to be obtained, for example can be data number, data name etc., it can also be the data date of formation, that is, indicate The target data for needing to obtain is the data generated within the data date of formation.
Optionally, above-mentioned intelligent contract may include the corresponding relationship of the node of data sharing time and data to be shared;
First node of the above-mentioned intelligent contract based on alliance's chain on above-mentioned alliance's chain sends information acquisition request tool Body may include:
When reaching the first moment in the above-mentioned data sharing time, according to above-mentioned data sharing time and data to be shared Node corresponding relationship, determine corresponding first node of above-mentioned first moment, Xiang Shangshu first node sends above- mentioned information and obtains Take request.
Pre-set each nodal information is can store in main chain server, above-mentioned nodal information may include node mark Know, is determined for node identities, such as the title including node, node serial number and/or node address, can also be stored with The corresponding relationship of the node of above-mentioned data sharing time and data to be shared, such as the section of data sharing time and data to be shared The mapping table of point, the corresponding relationship can be stored in the form of above-mentioned intelligent contract.The above-mentioned data sharing time can manage The uplink time for the above-mentioned shared data that each node that Xie Weiyu provides shared data is reached an agreement.
Specifically, also may include different nodal informations in above-mentioned intelligence contract, and different nodes need to be to be sharing Data type (can be Data Identification) and every kind of data type need to upload the shared time i.e. above-mentioned data sharing time (such as once a week or exact date etc.).The observer of intelligent contract is the common recognition reached in advance to the intelligence contract, For example reached an agreement by digital signature or the node of authentication, then main chain server can lead to according to above-mentioned intelligent contract The mode for generating above- mentioned information acquisition request is crossed, regularly, with having foundation information acquisition request is initiated to node, obtains target The acquisition modes of data.
Main chain server can execute step 102 in the case where being sent to first node above- mentioned information acquisition request.
Optionally, before step 101, this method further include:
It receives the addition to above-mentioned alliance's chain from above-mentioned first node to request, above-mentioned addition request includes above-mentioned first Nodal information;
Determine that the node type of above-mentioned first node, above-mentioned node type include enterprise's section according to above-mentioned first node information Point, credit information service's node and government organs' node;
The corresponding node rule for application of node type for obtaining above-mentioned first node, according to institute's node rule for application to above-mentioned First node carries out authentication;
If above-mentioned authentication passes through, the above-mentioned shared information permission of above-mentioned alliance's chain is opened for above-mentioned first node.
Alliance's chain can permit the addition of node and exit, wherein node type may include: enterprise's node (as interconnected Net financing corporation, business bank, payment platform, insurance company, securities broker company, room hand over institute etc.), credit information service's node (such as people's row Reference, main strategies mechanism) and government organs' node etc..
Specifically, can be sent to the main chain server of alliance's chain when first node is not belonging to the node in alliance's chain On the addition of above-mentioned alliance's chain is requested, above-mentioned addition request includes above-mentioned first node information, receives to come in main chain server From after the addition request to above-mentioned alliance's chain of above-mentioned first node, above-mentioned first can be determined according to above-mentioned first node information The node type of node.The node identification for including in available above-mentioned first node information, according to the node identification that prestores with The corresponding relationship of node type determines that the corresponding node type of node identification obtained is the node type of the node, and main chain In intelligent contract can also include that at least one node rule for application and node type are corresponding with node rule for application Relationship, then it is possible to further obtain the corresponding node rule for application of node type of above-mentioned first node, further according to acquisition Node rule for application carries out authentication to above-mentioned first node.
Optionally, above-mentioned verification process can also be executed by the authorization node in alliance's chain, can be recorded in intelligent contract There is above-mentioned authorization node, for carrying out authentication to node.Above-mentioned authentication may include the number label for verifying the node Name, the scoring of node-agent people biological information, node, node historic transmission record or node storage data quantity etc., do not limit herein System.
102, the target information abstract from above-mentioned first node is received, above-mentioned target information abstract includes above-mentioned data mark The data origin information of knowledge and the corresponding target data of above-mentioned Data Identification.
Main chain server can execute step 102 in the case where being sent to first node above- mentioned information acquisition request.The One node can obtain Data Identification therein in response to above- mentioned information acquisition request, according to above-mentioned Data Identification go obtain or Person searches corresponding target data, this is this shared data.Optionally, first node can obtain in the local database Above-mentioned target data generates above- mentioned information abstract.
Informative abstract in the embodiment of the present application can be understood as the corresponding relationship of data and data source, i.e., a kind of data The catalogue of acquisition modes.
Above-mentioned target information abstract may include the Data Identification and data for the target data that above-mentioned first node is shared Source-information, above-mentioned Data Identification are determined for target data, the above-mentioned data origin information i.e. offer of the target data Side is data source node, can be the data source node identification or data source node address of the target data.Wherein, Above-mentioned source Nodes can be the first node, i.e. the first node directly uploads the data of oneself shared, and optionally, this comes Source node is also possible to other nodes in alliance's chain, by the first node carry out data sharing, such as with the first segment Point belongs to the node in same side chain.
Above-mentioned target information abstract can be before first node sends above-mentioned data sharing request, by above-mentioned data source Node generates.Optionally, it can also actively apply for shared data by first node, first node, which can be sent, carries above-mentioned target The data sharing of informative abstract is requested, and main chain server can execute step in the case where receiving above-mentioned data sharing request Rapid 102.
Optionally, default proof rule has been can store in main chain server, for verifying whether above-mentioned first node has Shared information permission in standby alliance's chain.Above-mentioned data sharing request can also include above-mentioned first node information, receive To after above-mentioned data sharing request, first node information in available data sharing request, to determine first node, And then above-mentioned first node information is audited according to above-mentioned default proof rule, judge whether the first node can provide Shared data.
It may include to data transmission, the data sharing under different situations in above-mentioned default proof rule in intelligent contract Node verification mode, specifically, such as judging whether the first node has by judging the node type of first node Shared information permission in standby alliance's chain, part of nodes type have above-mentioned shared information permission, and part of nodes type does not have Standby above-mentioned shared information permission;Node level is also based on to audit whether the node has above-mentioned shared information permission, than It is previously stored with the first permission threshold value in such as alliance's chain, is just had when the node level of first node is higher than above-mentioned first threshold Standby above-mentioned shared information permission, does not have above-mentioned shared letter then when the node level of first node is not higher than above-mentioned first threshold Cease permission etc..
Optionally, above-mentioned first node information includes first node address;It is above-mentioned according to above-mentioned first node information and pre- If proof rule, judge whether above-mentioned first node has the shared information permission in alliance's chain and include:
Judge the white list address whether above-mentioned first node address belongs in above-mentioned default proof rule;
If belonging to, above-mentioned first node has the shared information permission in above-mentioned alliance's chain;If being not belonging to, above-mentioned first segment Point does not have the shared information permission in above-mentioned alliance's chain.In the case, if above-mentioned first node has in above-mentioned alliance's chain Shared information permission, step 103 can be executed;If not having, step 103 is not executed.
After receiving the target information abstract from above-mentioned first node, step 103 can be executed.
103, determine that second node, Xiang Shangshu second node send above-mentioned in above-mentioned alliance's chain based on above-mentioned intelligent contract Target information abstract.
The side of acquisition of different shared datas, i.e., above-mentioned second node are may further specify that in intelligent contract.Above-mentioned Two nodes can be one or more.After receiving the target information abstract from above-mentioned first node, it can pass through Intelligent contract judges the receiving node i.e. second node of target information abstract, then forwards above-mentioned target information to pluck to second node It wants, second node is enable to get the target data by above-mentioned target information abstract.
Above-mentioned second node receives the local that the second node can be stored it in after above-mentioned target information is made a summary In database or in side chain belonging to the second node (node).
Optionally, it broadcast them target information can also make a summary in above-mentioned alliance's chain.
Specifically, the node in above-mentioned alliance's chain can have local database, but the mode of shared data is not that will count According to directly upload, but data to be shared can be generated into informative abstract, then be uploaded to store in main chain and issue in other words.
It is made a summary by above- mentioned information, can determine the source (node) of data.Such as the data a of A nodes sharing, data Source-information in the A node address can be provided.
Optionally, this method further include:
The data acquisition request from second node is received, above-mentioned data acquisition request carries above-mentioned Data Identification;
Determine that corresponding above-mentioned target information abstract, Xiang Shangshu second node send above-mentioned target according to above-mentioned Data Identification Informative abstract.
In the main chain of alliance's chain, it can store multiple above- mentioned information abstracts, that is, have the section of above-mentioned shared information permission Point can be carried out data sharing.
Above-mentioned target information abstract can store in main chain, and above-mentioned second node can be that first is removed in above-mentioned alliance's chain Node other than node, and when above-mentioned second node needs to obtain shared target data, it is only necessary to believed according to above-mentioned target The source-information of digest challenge shared data is ceased, determines the source Nodes obtained, then send data acquisition to the source Nodes and ask It asks.
In the case where above-mentioned second node did not received above-mentioned target information abstract, can be sent out with chain linked to owner server It serves and states data acquisition request, including the Data Identification of target data to be obtained, receive in primary server from It is available to above-mentioned Data Identification corresponding target information abstract when the data acquisition request of two nodes, then to above-mentioned second Node sends above-mentioned target information abstract, then second node can be mentioned according to the determination of the source-information in the eap-message digest received For the node (address) of data, apply obtaining target data to it.
Optionally, after node gets above-mentioned shared target data, target data can be integrated, then deposit Enter the local data base of the node, voluntarily can obtain and check later.
The embodiment of the present application is by sending letter based on first node of the intelligent contract on alliance's chain on above-mentioned alliance's chain Acquisition request is ceased, above- mentioned information acquisition request carries target data mark, and above-mentioned target data is identified as determining above-mentioned mesh The mark of data is marked, later, can receive the target information abstract from above-mentioned first node, above-mentioned target information abstract includes The data origin information of above-mentioned Data Identification and the corresponding target data of above-mentioned Data Identification, then existed based on above-mentioned intelligent contract Determine that second node, Xiang Shangshu second node send above-mentioned target information abstract, pass through above-mentioned target information in above-mentioned alliance's chain It makes a summary, the node in alliance's chain can determine data source and then obtain target data, it can increase data acquisition source, and And safety is higher, reduces the cost of data acquisition and data maintenance.
It referring to fig. 2, is the exemplary flow of another data capture method based on alliance's chain provided by the embodiments of the present application Figure, embodiment shown in Fig. 2, which can be, to be obtained on the basis of embodiment shown in Fig. 1, and this method as shown in Figure 2 can wrap It includes:
201, the first node based on the intelligent contract on alliance's chain on above-mentioned alliance's chain sends information acquisition request, on It states information acquisition request and carries target data mark, above-mentioned target data is identified as the mark for determining above-mentioned target data.
202, the target information abstract from above-mentioned first node is received, above-mentioned target information abstract includes above-mentioned data mark The data origin information of knowledge and the corresponding target data of above-mentioned Data Identification.
Wherein, above-mentioned steps 201 and step 202 can refer to the step 101 and step 102 of embodiment illustrated in fig. 1 respectively In specific descriptions, details are not described herein again.
203, judge that above-mentioned target data identifies whether to belong to the first Data Identification set based on above-mentioned intelligent contract.
Data in the embodiment of the present application can be collage-credit data, and first node and second node can be credit information service's section Point, government organs' node or enterprise's node, third node can be the data analysis node as analysis collage-credit data.Main chain In can store above-mentioned first Data Identification set, can be and recorded by above-mentioned intelligent contract, it can be understood as, this first Data corresponding to Data Identification in Data Identification set are can to carry out the shared data of full main chain.It is also understood that be, One data logo collection can correspond to a node cluster, and shared data corresponding to these Data Identifications is respectively from this Node in node cluster, i.e. node in the node cluster can share mutually above- mentioned information abstract with shared data, in reality There is privacy while existing data sharing.
It can first judge that target data identifies above-mentioned target data and identifies whether to belong to the first Data Identification set, if belonging to In step 204 can be executed;If being not belonging to, step 204 can not be executed, step 205 can be executed.
204, broadcast them target information is made a summary in above-mentioned alliance's chain.
Broadcast (Broadcasting) is the most common form of multicast, it delivers one point to each point of destination The copy of group.It can be completed by the delivery that multiple singles are grouped, the copy that can also be grouped by individually connecting transmitting, Until each recipient receives a copy.It by way of broadcast, obtain the node in alliance's chain can Take the mode of the target data, but it is different establish a capital to have permission obtain the target data, can also be according to other verification modes It could be obtained after being verified, to improve safety.
It is not data each time to be changed to direct broadcast encryption, but generate one and be similar in the embodiment of the present application The encryption string of informative abstract is broadcasted, data can be made even be decrypted (this is also almost impossible certainly) will not reveal it is any Private data.
205, determine that second node, Xiang Shangshu second node send above-mentioned in above-mentioned alliance's chain based on above-mentioned intelligent contract Target information abstract.
Wherein, above-mentioned steps 205 can refer to the specific descriptions in the step 103 of embodiment illustrated in fig. 1, no longer superfluous herein It states.
206, the data analysis request from third node is received, above-mentioned data analysis request carries above-mentioned target data mark Know, above-mentioned third node is determined as in above-mentioned alliance's chain based on above-mentioned intelligent contract, the target analysis of data analysis service is provided Node.
The step 206 can execute after step 204 or step 205.Above-mentioned third node can be above-mentioned alliance's chain In node in addition to first node, can in alliance's chain request data, since main chain can provide big data simultaneously Analysis interface, third node can also request to analyze data.It can specify that execution data analyze function in intelligent contract At least one analysis node of energy, can specifically include the corresponding relationship of node and analysis node, an analysis node can be right One or more other node is answered, the data analysis task of other above-mentioned nodes is responsible for.It can by the above-mentioned big data interface To communicate with the target analysis node for the data analysis function for executing first node, above-mentioned target analysis node can be used as alliance The special joint of chain, can be different with the permission of other nodes.
The main chain server of alliance's chain after receiving the data analysis request from above-mentioned third node, it is available on Target data mark is stated, the data analysis instructions for carrying above-mentioned target data mark is generated, executes step 207.
207, Xiang Shangshu target analysis node sends data analysis instructions, and above-mentioned data analysis instructions are used to indicate above-mentioned mesh Mark analysis node obtains target data to be analyzed.
Can be understood as main chain server can forward the data analysis request of third node, Xiang Shangshu target analysis node Above-mentioned data analysis instructions are sent, analyze above-mentioned target analysis node to target data.Specifically, target analysis node On can be deployed with data analysis algorithm, can also according to above-mentioned Data Identification obtain target information abstract, obtain target data Carry out data analysis.Optionally, after completing data analysis, data analysis result can be sent to third node, it can also be with It is to be forwarded based on main chain server to the third node.It can be connected to data silo by this method, and more data can be obtained Source, and then data analysis is safely and accurately completed, real big data analysis can be created based on data sharing platform.
The main chain of alliance's chain of the embodiment of the present application can ((Hyperledger) Project Technical be realized based on super account book. Super account book is the open source projects for being intended to push the inter-trade application of block chain.It provides a modular framework, frame The execution (being known as " chaincode " in Fabric project) of node, intelligent contract in structure and configurable common recognition and member Service.One Fabric network includes that companion's node (" Peer nodes ") executes chaincode contract, accesses account book data, The interface of endorsement transaction and referred to as application program.Mandator node (" Orderer nodes ") is responsible for ensuring the one of this block chain Cause property simultaneously conveys the transaction endorsed to the companions in network;And MSP service, mainly as certificate authority X.509 certificate is used to verify member identities and role for (Certificate Authority) management.It, can based on super account book There are at least four class special joints: endorsement node, confirmation node, ordering joint, certificate node.
Alliance's chain in the embodiment of the present application can carry out intelligent contract exploitation based on Go or Java, and the above method can be with Intelligent contract is written to realize, all kinds of nodes is set, message is broadcasted, sort, know together, is confirmed and is write on chain.Wherein authenticate Node (above-mentioned verifying node) and authorization node may be implemented certain nodes and form a small-sized cluster, be carried out using encrypted tunnel Communication interaction, and other lack of competence nodes can not then participate in interacting, and increase safety, the flexibility of data transmission.
In the embodiment of the present application, by being sent based on first node of the intelligent contract on alliance's chain on above-mentioned alliance's chain Information acquisition request, above- mentioned information acquisition request carry target data mark, and above-mentioned target data is identified as above-mentioned for determining The mark of target data receives the target information abstract from above-mentioned first node, and above-mentioned target information abstract includes above-mentioned number According to the data origin information of mark and the corresponding target data of above-mentioned Data Identification, then, based on above-mentioned intelligent contract judgement Above-mentioned target data identifies whether to belong to the first Data Identification set, if belonging to, can in above-mentioned alliance's chain broadcast them mesh Informative abstract is marked, if being not belonging to, second node, Xiang Shangshu second can be determined in above-mentioned alliance's chain based on above-mentioned intelligent contract Node sends above-mentioned target information abstract, is made a summary by above-mentioned target information, the node in alliance's chain can determine data source And then obtain target data, it can increase data acquisition source, and safety is higher, reduce data acquisition and data maintenance Cost.It may also receive from the data analysis request of third node, above-mentioned data analysis request carries above-mentioned target data Mark is determined as above-mentioned third node based on above-mentioned intelligent contract in above-mentioned alliance's chain and provides the target point of data analysis service Node is analysed, Xiang Shangshu target analysis node sends data analysis instructions, and above-mentioned data analysis instructions are used to indicate above-mentioned target point Analysis node obtains target data to be analyzed, can create real big data analysis based on data sharing platform, both ensure that Privacy, and realize data sharing and analysis integration.
It is above-mentioned that mainly the scheme of the embodiment of the present application is described from the angle of method side implementation procedure.It is understood that , in order to realize the above functions, it comprises execute the corresponding hardware configuration of each function and/or software mould for electronic equipment Block.Those skilled in the art should be readily appreciated that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, the present invention can be realized with the combining form of hardware or hardware and computer software.Some function actually with Hardware or computer software drive the mode of hardware to execute, the specific application and design constraint item depending on technical solution Part.Professional technician can be to specifically realizing described function using distinct methods, but this realization is not It is considered as beyond the scope of this invention.
The embodiment of the present application can carry out the division of functional module according to above method example to electronic equipment, for example, can With each functional module of each function division of correspondence, two or more functions can also be integrated in a processing module In.Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It needs It is noted that be schematical, only a kind of logical function partition to the division of module in the embodiment of the present application, it is practical real It is current that there may be another division manner.
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of server provided by the embodiments of the present application, the server 300 packet Include information acquisition module 310 and information sharing module 320, in which:
Above- mentioned information acquisition module 310, for the first segment based on the intelligent contract on alliance's chain on above-mentioned alliance's chain Point sends information acquisition request, and above- mentioned information acquisition request carries target data mark, and above-mentioned target data is identified as true The mark of fixed above-mentioned target data;
Above- mentioned information acquisition module 310 is also used to receive the target information abstract from above-mentioned first node, above-mentioned target Informative abstract includes the data origin information of above-mentioned Data Identification and the corresponding target data of above-mentioned Data Identification;
Above- mentioned information sharing module 320, for determining second node in above-mentioned alliance's chain based on above-mentioned intelligent contract, to Above-mentioned second node sends above-mentioned target information abstract.
Optionally, above-mentioned intelligent contract includes the corresponding relationship of the node of data sharing time and data to be shared;
Above- mentioned information sharing module 320, specifically for when reaching the first moment in above-mentioned data sharing time, according to The corresponding relationship of the node of above-mentioned data sharing time and data to be shared, determines corresponding first node of above-mentioned first moment, Above- mentioned information acquisition request is sent to above-mentioned first node.
Optionally, above-mentioned server 300 further includes judgment module 330, is used for
Above-mentioned intelligent contract before determining second node, is based in above-mentioned alliance's chain based on above-mentioned intelligent contract above-mentioned Judge that above-mentioned target data identifies whether to belong to the first Data Identification set;
Above- mentioned information sharing module 320 is also used to, if above-mentioned target data mark belongs to above-mentioned first Data Identification set, Broadcast them target information is made a summary in above-mentioned alliance's chain.
Optionally, above- mentioned information sharing module 320 is specifically used for, and obtains the above-mentioned first segment recorded in above-mentioned intelligent contract The associated nodes set of point determines that at least one node in above-mentioned associated nodes set is above-mentioned second node.
Optionally, above-mentioned server further includes analysis and Control module 340, is used for:
The data analysis request from third node is received, above-mentioned data analysis request carries above-mentioned target data mark;
It is determined as above-mentioned third node in above-mentioned alliance's chain based on above-mentioned intelligent contract and the mesh of data analysis service is provided Mark analysis node;
Data analysis instructions are sent to above-mentioned target analysis node, above-mentioned data analysis instructions are used to indicate above-mentioned target point Analysis node obtains target data to be analyzed.
According to the specific embodiment of the embodiment of the present application, Fig. 1 and the data capture method shown in Fig. 2 based on alliance's chain The step 101 being related to~103,201~207 modules that can be in server 300 as shown in Figure 3 are performed.
By the server 300 of the embodiment of the present application, server 300 can by based on the intelligent contract on alliance's chain to First node on above-mentioned alliance's chain sends information acquisition request, and above- mentioned information acquisition request carries target data mark, above-mentioned Target data is identified as the mark for determining above-mentioned target data, later, can receive the target from above-mentioned first node Informative abstract, above-mentioned target information abstract include the data of above-mentioned Data Identification and the corresponding target data of above-mentioned Data Identification Source-information, then determine that second node, Xiang Shangshu second node send above-mentioned in above-mentioned alliance's chain based on above-mentioned intelligent contract Target information abstract, is made a summary by above-mentioned target information, and the node in alliance's chain can determine data source and then obtain target Data, it can increase data acquisition source, and safety is higher, reduce the cost of data acquisition and data maintenance.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another kind server disclosed in the embodiment of the present application.As shown in figure 4, The server 400 includes processor 401 and memory 402, wherein server 400 can also include bus 403, processor 401 It can be connected with each other by bus 403 with memory 402, bus 403 can be Peripheral Component Interconnect standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..Bus 403 can be divided into address bus, data/address bus, control bus etc..For convenient for table Show, only indicated with a thick line in Fig. 4, it is not intended that an only bus or a type of bus.Wherein, server 400 can also include input-output equipment 404, and input-output equipment 404 may include display screen, such as liquid crystal display.It deposits Reservoir 402 is used to store one or more programs comprising instruction;Processor 401 is stored in memory 402 for calling Method and step some or all of is mentioned in the above-mentioned Fig. 1 and Fig. 2 embodiment of instruction execution.
It should be appreciated that in the embodiment of the present application, alleged processor 401 can be central processing unit (Central Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at Reason device is also possible to any conventional processor etc..
Input equipment 402 may include that Trackpad, fingerprint adopt sensor (for acquiring the finger print information and fingerprint of user Directional information), microphone etc., output equipment 403 may include display (LCD etc.), loudspeaker etc..
The memory 404 may include read-only memory and random access memory, and to processor 401 provide instruction and Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited Store up the information of device type.
By the server 400 of the embodiment of the present application, server 400 can be based on the intelligent contract on alliance's chain to above-mentioned First node on alliance's chain sends information acquisition request, and above- mentioned information acquisition request carries target data mark, above-mentioned target Data Identification is that the mark for determining above-mentioned target data can receive the target information from above-mentioned first node later Abstract, above-mentioned target information abstract include the data source of above-mentioned Data Identification and the corresponding target data of above-mentioned Data Identification Information, then determine that second node, Xiang Shangshu second node send above-mentioned target in above-mentioned alliance's chain based on above-mentioned intelligent contract Informative abstract is made a summary by above-mentioned target information, and the node in alliance's chain can determine data source and then obtain target data, Data acquisition source can be increased, and safety is higher, reduce the cost of data acquisition and data maintenance.
The embodiment of the present application also provides a kind of computer storage medium, wherein computer storage medium storage is for electricity The computer program of subdata exchange, it is as any in recorded in above method embodiment which execute computer A kind of some or all of the data capture method based on alliance's chain step.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, it is only a kind of Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or module, It can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
If the integrated module is realized in the form of software function module and sells or use as independent product When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment (can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention Step.And memory above-mentioned includes: USB flash disk, read-only memory (Read-Only Memory, ROM), random access memory The various media that can store program code such as (Random Access Memory, RAM), mobile hard disk, magnetic or disk.

Claims (10)

1. a kind of data capture method based on alliance's chain is applied to server, which is characterized in that the described method includes:
First node based on the intelligent contract on alliance's chain on alliance's chain sends information acquisition request, and the information obtains Request is taken to carry target data mark, the target data is identified as the mark for determining the target data;
The target information abstract from the first node is received, the target information abstract includes the Data Identification and institute State the data origin information of the corresponding target data of Data Identification;
Determine that second node, Xiang Suoshu second node send the target information in alliance's chain based on the intelligent contract Abstract.
2. the method according to claim 1, wherein the intelligence contract include the data sharing time with it is to be shared The corresponding relationship of the node of data;
First node of the intelligent contract based on alliance's chain on alliance's chain sends information acquisition request
When reaching the first moment in the data sharing time, according to the section of the data sharing time and data to be shared The corresponding relationship of point determines that first moment corresponding first node, Xiang Suoshu first node send the acquisition of information and ask It asks.
3. method according to claim 1 or 2, which is characterized in that described to be based on the intelligent contract in alliance's chain Before middle determining second node, the method also includes:
Judge that the target data identifies whether to belong to the first Data Identification set based on the intelligent contract;
If belonging to, the target information abstract is broadcasted in alliance's chain.
4. according to the method described in claim 3, it is characterized in that, described true in alliance's chain based on the intelligent contract Determining second node includes:
The associated nodes set for obtaining the first node recorded in the intelligent contract, determines in the associated nodes set At least one node be the second node.
5. according to the method in claim 2 or 3, which is characterized in that the method also includes:
The data analysis request from third node is received, the data analysis request carries the target data mark;
It is determined as the third node in alliance's chain based on the intelligent contract and the target point of data analysis service is provided Analyse node;
Data analysis instructions are sent to the target analysis node, the data analysis instructions are used to indicate the target analysis section Point obtains target data to be analyzed.
6. a kind of server characterized by comprising information acquisition module and information sharing module, in which:
The information acquisition module, for sending letter based on first node of the intelligent contract on alliance's chain on alliance's chain Acquisition request is ceased, the information acquisition request carries target data mark, and the target data is identified as determining the mesh Mark the mark of data;
The information acquisition module, is also used to receive the target information abstract from the first node, and the target information is plucked It to include the data origin information of the Data Identification and the corresponding target data of the Data Identification;
The information sharing module, for based on the intelligent contract in alliance's chain determination second node, Xiang Suoshu the Two nodes send the target information abstract.
7. server according to claim 6, which is characterized in that the intelligence contract include the data sharing time with to altogether Enjoy the corresponding relationship of the node of data;
The information sharing module, specifically for when reaching the first moment in data sharing time, according to the number According to the corresponding relationship of shared time and the node of data to be shared, first moment corresponding first node, Xiang Suoshu are determined First node sends the information acquisition request.
8. server according to claim 6 or 7, which is characterized in that further include judgment module, be used for:
Before determining second node, judged based on the intelligent contract in alliance's chain described based on the intelligent contract The target data identifies whether to belong to the first Data Identification set;
The information sharing module is also used to, if target data mark belongs to the first Data Identification set, described The target information abstract is broadcasted in alliance's chain.
9. a kind of server, which is characterized in that including processor, input equipment, output equipment and memory, the processor, Input equipment, output equipment and memory are connected with each other, wherein the memory is for storing computer program, the calculating Machine program includes program instruction, and the processor is configured for calling described program instruction, is executed as claim 1-5 is any Method described in.
10. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with computer program, described Computer program includes program instruction, and described program instruction makes the processor execute such as claim when being executed by a processor The described in any item methods of 1-5.
CN201910423146.XA 2019-05-21 2019-05-21 Data capture method, server and computer storage medium based on alliance's chain Pending CN110210961A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910423146.XA CN110210961A (en) 2019-05-21 2019-05-21 Data capture method, server and computer storage medium based on alliance's chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910423146.XA CN110210961A (en) 2019-05-21 2019-05-21 Data capture method, server and computer storage medium based on alliance's chain

Publications (1)

Publication Number Publication Date
CN110210961A true CN110210961A (en) 2019-09-06

Family

ID=67787955

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910423146.XA Pending CN110210961A (en) 2019-05-21 2019-05-21 Data capture method, server and computer storage medium based on alliance's chain

Country Status (1)

Country Link
CN (1) CN110210961A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110727894A (en) * 2019-10-12 2020-01-24 腾讯科技(深圳)有限公司 Target material setting method, device, equipment and storage medium
CN110928880A (en) * 2019-11-19 2020-03-27 腾讯科技(深圳)有限公司 Data processing method, device, terminal and medium based on block chain
CN111046078A (en) * 2019-11-11 2020-04-21 北京海益同展信息科技有限公司 Block chain-based credit investigation query method and device and electronic equipment
CN111080337A (en) * 2019-11-04 2020-04-28 广州亚美信息科技有限公司 Vehicle evaluation information acquisition method, device, system and equipment based on alliance chain
CN111091900A (en) * 2019-11-25 2020-05-01 中电健康云科技有限公司 Medical grading diagnosis and treatment method and system based on block chain intelligent contracts
CN111327623A (en) * 2020-02-28 2020-06-23 上海哈世科技有限公司 Alliance link information transmission method, device, equipment and storage medium
CN111415252A (en) * 2020-01-23 2020-07-14 众安信息技术服务有限公司 Privacy transaction processing method and device based on block chain
CN111598531A (en) * 2020-04-27 2020-08-28 傲林科技有限公司 Multi-block chain service cooperation method and device and electronic equipment
CN111881472A (en) * 2020-07-22 2020-11-03 云账户技术(天津)有限公司 Data access control method, system, authority management system and medium
CN112163034A (en) * 2020-09-03 2021-01-01 中国联合网络通信集团有限公司 Model sharing method, node and block chain system
CN112235360A (en) * 2020-09-26 2021-01-15 建信金融科技有限责任公司 Data sharing method, device and system based on alliance chain, electronic equipment and computer readable storage medium
CN112434082A (en) * 2020-11-25 2021-03-02 平安普惠企业管理有限公司 Operation and maintenance resource management method, device, equipment and medium
CN113765875A (en) * 2020-11-17 2021-12-07 北京京东乾石科技有限公司 Feedback method and device of data verification information
CN113812965A (en) * 2021-08-19 2021-12-21 杭州回车电子科技有限公司 Sleep state recognition method, device, electronic device and storage medium
CN114124943A (en) * 2020-08-14 2022-03-01 北京金山云网络技术有限公司 Processing method, device and system for block chain nodes and electronic device
CN114760325A (en) * 2020-12-25 2022-07-15 中移动信息技术有限公司 Business data processing method, device, storage medium and sharing platform
CN111881472B (en) * 2020-07-22 2024-04-26 云账户技术(天津)有限公司 Data access control method, system, authority management system and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109003078A (en) * 2018-06-27 2018-12-14 阿里巴巴集团控股有限公司 Intelligent contract call method and device, electronic equipment based on block chain
CN109492419A (en) * 2018-11-27 2019-03-19 众安信息技术服务有限公司 For obtaining the method, apparatus and storage medium of the data in block chain
CN109600441A (en) * 2018-12-14 2019-04-09 深圳壹账通智能科技有限公司 Alliance's chain information distribution control method and terminal device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109003078A (en) * 2018-06-27 2018-12-14 阿里巴巴集团控股有限公司 Intelligent contract call method and device, electronic equipment based on block chain
CN109492419A (en) * 2018-11-27 2019-03-19 众安信息技术服务有限公司 For obtaining the method, apparatus and storage medium of the data in block chain
CN109600441A (en) * 2018-12-14 2019-04-09 深圳壹账通智能科技有限公司 Alliance's chain information distribution control method and terminal device

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110727894A (en) * 2019-10-12 2020-01-24 腾讯科技(深圳)有限公司 Target material setting method, device, equipment and storage medium
CN110727894B (en) * 2019-10-12 2023-09-01 腾讯科技(深圳)有限公司 Target material setting method, device, equipment and storage medium
CN111080337A (en) * 2019-11-04 2020-04-28 广州亚美信息科技有限公司 Vehicle evaluation information acquisition method, device, system and equipment based on alliance chain
CN111046078A (en) * 2019-11-11 2020-04-21 北京海益同展信息科技有限公司 Block chain-based credit investigation query method and device and electronic equipment
CN111046078B (en) * 2019-11-11 2023-09-05 京东科技信息技术有限公司 Credit investigation method and device based on block chain and electronic equipment
CN110928880A (en) * 2019-11-19 2020-03-27 腾讯科技(深圳)有限公司 Data processing method, device, terminal and medium based on block chain
CN110928880B (en) * 2019-11-19 2024-01-12 腾讯科技(深圳)有限公司 Data processing method, device, terminal and medium based on block chain
CN111091900A (en) * 2019-11-25 2020-05-01 中电健康云科技有限公司 Medical grading diagnosis and treatment method and system based on block chain intelligent contracts
CN111415252A (en) * 2020-01-23 2020-07-14 众安信息技术服务有限公司 Privacy transaction processing method and device based on block chain
CN111327623A (en) * 2020-02-28 2020-06-23 上海哈世科技有限公司 Alliance link information transmission method, device, equipment and storage medium
CN111598531A (en) * 2020-04-27 2020-08-28 傲林科技有限公司 Multi-block chain service cooperation method and device and electronic equipment
CN111598531B (en) * 2020-04-27 2023-09-01 傲林科技有限公司 Multi-block-chain service cooperation method and device and electronic equipment
CN111881472A (en) * 2020-07-22 2020-11-03 云账户技术(天津)有限公司 Data access control method, system, authority management system and medium
CN111881472B (en) * 2020-07-22 2024-04-26 云账户技术(天津)有限公司 Data access control method, system, authority management system and medium
CN114124943A (en) * 2020-08-14 2022-03-01 北京金山云网络技术有限公司 Processing method, device and system for block chain nodes and electronic device
CN112163034A (en) * 2020-09-03 2021-01-01 中国联合网络通信集团有限公司 Model sharing method, node and block chain system
CN112235360A (en) * 2020-09-26 2021-01-15 建信金融科技有限责任公司 Data sharing method, device and system based on alliance chain, electronic equipment and computer readable storage medium
CN113765875A (en) * 2020-11-17 2021-12-07 北京京东乾石科技有限公司 Feedback method and device of data verification information
CN112434082A (en) * 2020-11-25 2021-03-02 平安普惠企业管理有限公司 Operation and maintenance resource management method, device, equipment and medium
CN114760325A (en) * 2020-12-25 2022-07-15 中移动信息技术有限公司 Business data processing method, device, storage medium and sharing platform
CN113812965A (en) * 2021-08-19 2021-12-21 杭州回车电子科技有限公司 Sleep state recognition method, device, electronic device and storage medium
CN113812965B (en) * 2021-08-19 2024-04-09 杭州回车电子科技有限公司 Sleep state identification method, sleep state identification device, electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN110210961A (en) Data capture method, server and computer storage medium based on alliance's chain
CN110266648A (en) Data capture method, server and computer storage medium based on alliance's chain
Rathee et al. A secure communicating things network framework for industrial IoT using blockchain technology
CN110246017A (en) Data capture method, terminal device and computer storage medium based on alliance's chain
CN110222529A (en) Assets management method, electronic equipment and computer storage medium based on alliance's chain
CN109450910A (en) Data sharing method, data sharing network and electronic equipment based on block chain
CN109525671A (en) Date storage method, electronic equipment and storage medium based on block chain
CN110223157A (en) Data capture method, electronic equipment and computer storage medium based on alliance's chain
CN110599181A (en) Data processing method, device and equipment based on block chain and storage medium
CN109753815A (en) Data processing method, data processing network and electronic equipment based on block chain
US9946984B2 (en) System and method for transporting a document between a first service provider and a second service provider
CN110245185A (en) Data processing method, terminal device and computer storage medium based on alliance's chain
CN110633963A (en) Electronic bill processing method, electronic bill processing device, computer-readable storage medium and equipment
CN111506928B (en) Just information sharing system based on block chain
CN110263025A (en) Data liquidation method, electronic equipment and computer storage medium based on alliance's chain
CN109190881A (en) A kind of data assets management method, system and equipment
CN110246040A (en) Trade management method, electronic equipment and computer storage medium based on alliance's chain
CN110365711B (en) Multi-platform user identity association method and device, computer equipment and computer readable storage medium
CN112163954B (en) Transaction method and device based on block chain
CN112150149A (en) Data tracing method and device based on block chain, computer equipment and storage medium
CN112702402A (en) System, method, device, processor and storage medium for realizing government affair information resource sharing and exchange based on block chain technology
Gruber et al. Unifying lightweight blockchain client implementations
CN114881757A (en) Letter method, system and electronic equipment
Yang et al. Leveraging blockchain for scaffolding work management in construction
CN110458507A (en) A kind of authorization method and device of the trustship of public platform business

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination