CN110213296A - It is a kind of that data cochain method and its equipment are thumbed up based on block chain - Google Patents
It is a kind of that data cochain method and its equipment are thumbed up based on block chain Download PDFInfo
- Publication number
- CN110213296A CN110213296A CN201910547113.6A CN201910547113A CN110213296A CN 110213296 A CN110213296 A CN 110213296A CN 201910547113 A CN201910547113 A CN 201910547113A CN 110213296 A CN110213296 A CN 110213296A
- Authority
- CN
- China
- Prior art keywords
- client
- data
- verification
- public key
- intelligent contract
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000012795 verification Methods 0.000 claims abstract description 72
- 230000008569 process Effects 0.000 claims abstract description 23
- 230000004044 response Effects 0.000 claims description 25
- 238000012545 processing Methods 0.000 claims description 9
- 210000003813 thumb Anatomy 0.000 abstract 3
- 238000011156 evaluation Methods 0.000 description 3
- 238000012552 review Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000004804 winding Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
Data cochain method and its equipment are thumbed up based on block chain this application discloses a kind of, which comprises block chain node receives the data cochain that thumbs up that the first client is sent and requests;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and after verification passes through, the cochain process of data is thumbed up described in execution;Receive the inquiry request for thumbing up data of the second client;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client;Receive the inquiry cochain request that first client is sent, which includes that the encryption of the second client public key thumbs up data;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, after verification passes through, executes cochain process for data are thumbed up described in second client public key encryption.The application can will thumb up data cochain, disclose credible.
Description
Technical Field
The present application relates to the field of block chain technologies, and in particular, to a block chain-based method and apparatus for linking praise data.
Background
At present, a block chain technology is based on a decentralized peer-to-peer network, and open source software is used for combining a cryptography principle, time sequence data and a consensus mechanism to ensure the consistency and the persistence of each node in a distributed database, so that information can be immediately verified and traceable, but is difficult to tamper and cannot be shielded, and a set of private, efficient and safe shared value system is created.
The existing praise platform adopts a centralized database, and stores the praise times of commodities, praise time, contents of praise used by users, such as mobile phones, and the like; however, the database of the praise platform has the problems that data is tampered, the authenticity of the data cannot be guaranteed, the praise operation platform modifies the praise times of a certain commodity, and poor comments of users are deleted. Especially for some nonpropriety platforms, the data security and authenticity of the goods cannot be guaranteed: and the content complied with by the goods or services is not real, which can cause misleading to the user and influence the experience of the user.
Therefore, how to store data of a compliment platform on a blockchain in a trusted manner based on the tamper-proof property of the blockchain becomes a problem to be solved urgently.
The above is only for the purpose of assisting understanding of the technical solutions of the present application, and does not represent an admission that the above is prior art.
Disclosure of Invention
In order to solve the above problem, the present application provides a method for linking praise data based on a block chain and an apparatus thereof, where the method enables the praise data to be stored on the block chain, so that the praise data on the chain can be trusted.
A first aspect of the present application provides a block chain-based method for complimentary data uplink, including:
the block link node receives an approval data uplink request sent by a first client, wherein the approval data uplink request comprises approval data encrypted by a public key of the first client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the uplink process of the complied data after the verification is passed;
the block chain node receives a query request of the approval data of a second client;
triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the second client so that the block chain node sends a verification response to the second client after the verification of the verification intelligent contract is passed;
the block chain node receives an inquiry uplink request sent by the first client, wherein the inquiry uplink request comprises praise data encrypted by a public key of the second client; the second client public key is sent to the first client for the block link node;
and triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain process on the praise data encrypted by the public key of the second client after the verification is passed.
In a possible implementation manner, the second client public key is sent to the first client for the block link node, specifically:
the blockchain node receives a query request sent by the first client, and queries whether the compliment data is checked and the identity of a viewer;
and the block chain node sends a query response to the first client, wherein the query response comprises the public key of the second client.
In a possible implementation manner, the like data is operation data of the like platform by the first client, and includes a number of like times, a like time, comment content, and a like type.
In a possible implementation manner, the first client encrypts the praise data with its own public key, specifically:
and the first client encrypts the approval data by using the public key of the first client in a preset proportion.
In one possible implementation, the like data includes an associated attribute and a non-associated attribute; and automatically superposing the attribute values of the associated attributes of the praise data.
A second aspect of the present application provides a block chain-based apparatus for complimentary data uplink, where the apparatus is a block chain node, and the apparatus includes a receiving unit and a processing unit; wherein,
the receiving unit receives an approval data uplink request sent by a first client, wherein the approval data uplink request comprises approval data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, the uplink process of the complied data is executed;
the receiving unit is used for receiving the inquiry request of the approval data of the second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client so that the block chain nodes send verification responses to the second client after the verification of the verification intelligent contract is passed;
the receiving unit is configured to receive an uplink query request sent by the first client, where the uplink query request includes praise data encrypted by the public key of the second client; the second client public key is sent to the first client for the block link node;
and triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain process on the praise data encrypted by the public key of the second client after the verification is passed.
In a possible implementation, the apparatus further comprises a transmitting unit; the second client public key is sent to the first client for the block link node, and specifically includes:
the receiving unit is used for receiving an inquiry request sent by the first client and inquiring whether the approval data is checked or not and the identity of a viewer;
the sending unit sends a query response to the first client, where the query response includes the public key of the second client.
In a possible implementation manner, the like data is operation data of the like platform by the first client, and includes a number of like times, a like time, comment content, and a like type.
In a possible implementation manner, the first client encrypts the praise data with its own public key, specifically:
and the first client encrypts the approval data by using the public key of the first client in a preset proportion.
In one possible implementation, the like data includes an associated attribute and a non-associated attribute; and automatically superposing the attribute values of the associated attributes of the praise data.
The method and the device can link the praise data, so that the praise data on the link is credible, public and transparent; thereby improving the user experience.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application.
Fig. 1 is a flowchart illustrating a block chain-based method for complimentary data uplink according to an embodiment of the present application;
fig. 2 is a flowchart illustrating a method for handling a block chain-based uplink for approved data according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a block chain-based approved data uplink device according to an embodiment of the present application.
Detailed Description
In order to more clearly explain the overall concept of the present application, the following detailed description is given by way of example in conjunction with the accompanying drawings.
The terms "first," "second," and the like in the description and in the claims of the present application and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the order of such use may be interchanged under appropriate circumstances such that embodiments of the invention described herein may be practiced in other orders than those illustrated or described herein.
Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The block link point and the client referred to in the embodiment of the application may be understood as an abstract machine that responds to an external specific trigger condition and performs state conversion according to a certain rule, and may be a device that can be networked according to application software, such as a mobile phone, a tablet computer, a palm computer, a personal PC, and the like.
As shown in fig. 1, a block chain based method for agreeing on data uplink includes steps S101-S106.
S101, a block link receives an ack data uplink request sent by a first client, where the ack data uplink request includes ack data encrypted by a public key of the first client.
And S102, triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the uplink process of the compliment data after the verification is passed.
S103, the block chain node receives the inquiry request of the approval data of the second client.
And S104, triggering a verification intelligent contract, and verifying the identity of the second client by the verification intelligent contract so that the block chain nodes send verification responses to the second client after the verification of the verification intelligent contract is passed.
S105, the block chain node receives an inquiry uplink request sent by the first client, where the inquiry uplink request includes praise data encrypted by the public key of the second client; and the public key of the second client is sent to the first client for the block link nodes.
And S106, triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain linking process on the approval data encrypted by the public key of the second client after the verification is passed.
In one example, the public key of the second client is sent to the first client for the block link node, specifically: the blockchain node receives a query request sent by the first client, and queries whether the compliment data is checked and the identity of a viewer; and the block chain node sends a query response to the first client, wherein the query response comprises the public key of the second client.
In one example, the like data is operation data of the like platform of the first client, and comprises a number of like times, a like time, comment content and a like type.
In one example, the first client encrypts the praise data with its own public key, specifically: and the first client encrypts the approval data by using the public key of the first client in a preset proportion.
In one example, the like data includes an associated attribute and a non-associated attribute; and automatically superposing the attribute values of the associated attributes of the praise data.
In the above example, the first client acts as an operator of the approval data, and the second client acts as an inquirer of the approval data; for a particular complimentary platform, each user can be either an operator or a querier for complimentary data.
The uplink procedure of the positive data on the blockchain is described in detail below with reference to fig. 2, and the procedure includes S201-S215.
S201, the first client encrypts the operation data of the user with the public key of the first client, wherein the operation data of the user comprises data generated by user operation behaviors such as the number of times of approval of the user on an approval platform, approval time, approval type, IP address of the user, account password of the user and the like.
The first client encrypts the generated approval data by using its public key, where the encryption may be to encrypt all fields of the approval data, or to encrypt part of the fields of the approval data, such as: only private comment content is encrypted; or the user does not encrypt the approval data.
In addition, the praise data includes attributes divided into two categories, an associated attribute and a non-associated attribute. For example: the user approval time belongs to the non-associated attribute, and the approval time of each user can be stored in the block chain; for example: the praise number of the user is the correlation attribute, the praise number is included in the data format of one commodity, and the praise number of the commodity can be automatically superposed as long as the user comments on the certain commodity.
The praise types comprise the praise of commodity evaluation content, the praise of personal preference evaluation content, the praise of clothes and apparel matching evaluation content and the like; for example: the individual likes and dislikes season-wise review content, likes and dislikes gourmet review content, likes and dislikes movie review content, and the like.
S202, the first ue sends a request for agreeing on the data uplink to the blockchain node.
And S203, triggering a check intelligent contract on the block chain, checking the identity of the first client by the check intelligent contract, and executing a chain winding process on the complied data after the check is passed.
The checking means determining whether the first ue is a user of the approval platform, and only the user of the approval platform has permission to uplink the approval data.
It should be noted that the uplink process is a conventional process in the art and will not be described in detail. For example: and under the workload certification PoW common mode, packaging and verifying the data, wherein the block link point of the account right can place the packaged block in the next block of the current block as a new block uplink.
S204, the block link node sends a link up response to the first ue.
And S205, the second client sends a query request to the blockchain node, wherein the query request is used for querying the approval data of the first client.
At this time, the user corresponding to the second client may query the approval data after seeing the approval data. In the application, the first client and the second client are both terminal devices provided with decentralized application software, and can directly perform information interaction with the blockchain nodes on the blockchain.
And S206, triggering a check intelligent contract on the block chain, wherein the check intelligent contract checks the identity of the second client and checks whether the second client is a user of the compliment platform.
After the verification is passed, executing the next flow; the check fails and the process terminates.
S207, the block node sends a check response to the second client.
S208, the first client sends a query request to the block chain node, the query request queries whether the approval data is checked, and if the approval data is checked, the public key of the viewer is acquired.
S209, the block node sends a query response to the first client, where the query response includes the public key of the second client.
S210, the first ue sends an inquiry uplink request to the blockchain node, where the inquiry uplink request includes the approval data encrypted by the public key of the second ue.
And S211, triggering a check intelligent contract on the block chain, checking the identity of the first client by the check intelligent contract, and executing a cochain process on the encrypted praise data of the public key of the second client after the check is passed.
S212, the block node sends a search uplink response to the first ue.
S213, the second client sends the approval data query request to the blockchain node.
And S214, the block link node sends an approval data response to the second client, wherein the approval data response comprises the approval data encrypted by the public key of the second client.
S215, the second client decrypts the praise data encrypted by the public key of the second client by using its own private key, so as to obtain the praise data.
The method and the device have the advantages that the praise data can be linked, the link process is public and transparent, and any user of the same praise platform can check the praise data; the authenticity of the praise data is guaranteed. In addition, the user can encrypt or not encrypt the praise data according to the preference of the user, and the user experience is improved.
It should be noted that, in the present application, a client directly performs information interaction with a node of a block chain, and the block chain node directly stores information on the block chain without a centralized server, so that the like data is more open and reliable; rather than the existing client interacting with a centralized server.
As shown in fig. 3, an apparatus for handling uplink for approved data based on a block chain, which is a block chain node, includes a receiving unit and a processing unit.
The receiving unit receives an approval data uplink request sent by a first client, wherein the approval data uplink request comprises approval data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, the uplink process of the complied data is executed;
the receiving unit is used for receiving the inquiry request of the approval data of the second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client so that the block chain nodes send verification responses to the second client after the verification of the verification intelligent contract is passed;
the receiving unit is configured to receive an uplink query request sent by the first client, where the uplink query request includes praise data encrypted by the public key of the second client; the second client public key is sent to the first client for the block link node;
and triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain process on the praise data encrypted by the public key of the second client after the verification is passed.
In one example, the apparatus further comprises a transmitting unit; the second client public key is sent to the first client for the block link node, and specifically includes:
the receiving unit is used for receiving an inquiry request sent by the first client and inquiring whether the approval data is checked or not and the identity of a viewer;
the sending unit sends a query response to the first client, where the query response includes the public key of the second client.
In one example, the like data is operation data of the like platform of the first client, and comprises a number of like times, a like time, comment content and a like type.
In one example, the first client encrypts the praise data with its own public key, specifically: and the first client encrypts the approval data by using the public key of the first client in a preset proportion.
In one example, the like data includes an associated attribute and a non-associated attribute; and automatically superposing the attribute values of the associated attributes of the praise data.
The method and the device have the advantages that the praise data can be linked, the link process is public and transparent, and any user of the same praise platform can check the praise data; the authenticity of the praise data is guaranteed. Moreover, the user can encrypt or not encrypt the like data according to the preference of the user, and the user experience is improved.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (10)
1. A block chain based method for complimentary data uplink, the method comprising:
the block link node receives an approval data uplink request sent by a first client, wherein the approval data uplink request comprises approval data encrypted by a public key of the first client;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing the uplink process of the complied data after the verification is passed;
the block chain node receives a query request of the approval data of a second client;
triggering a verification intelligent contract, wherein the verification intelligent contract verifies the identity of the second client so that the block chain node sends a verification response to the second client after the verification of the verification intelligent contract is passed;
the block chain node receives an inquiry uplink request sent by the first client, wherein the inquiry uplink request comprises praise data encrypted by a public key of the second client; the second client public key is sent to the first client for the block link node;
and triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain process on the praise data encrypted by the public key of the second client after the verification is passed.
2. The method according to claim 1, wherein the second client public key is sent to the first client for the block link node, specifically:
the blockchain node receives a query request sent by the first client, and queries whether the compliment data is checked and the identity of a viewer;
and the block chain node sends a query response to the first client, wherein the query response comprises the public key of the second client.
3. The method of claim 1, wherein the like data is operation data of a user on a like platform corresponding to the first client, and includes a number of like times, a like time, comment content, and a like type.
4. The method according to claim 1, wherein the first client encrypts the like data with its own public key, specifically:
and the first client encrypts the approval data by using the public key of the first client in a preset proportion.
5. The method of claim 1 or 3, wherein the like data comprises an associated attribute and a non-associated attribute; wherein,
and automatically superposing the attribute values of the attribute associated with the like data.
6. An apparatus for handling uplink of complied data based on a block chain, the apparatus being a block chain node, the apparatus comprising a receiving unit and a processing unit; wherein,
the receiving unit receives an approval data uplink request sent by a first client, wherein the approval data uplink request comprises approval data encrypted by a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, the verification intelligent contract is used for verifying the identity of the first client, and after the verification is passed, the uplink process of the complied data is executed;
the receiving unit is used for receiving the inquiry request of the approval data of the second client;
the processing unit is used for triggering a verification intelligent contract, and the verification intelligent contract verifies the identity of the second client so that the block chain nodes send verification responses to the second client after the verification of the verification intelligent contract is passed;
the receiving unit is configured to receive an uplink query request sent by the first client, where the uplink query request includes praise data encrypted by the public key of the second client; the second client public key is sent to the first client for the block link node;
and triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, and executing a chain process on the praise data encrypted by the public key of the second client after the verification is passed.
7. The apparatus of claim 6, wherein the apparatus further comprises a transmitting unit; the second client public key is sent to the first client for the block link node, and specifically includes:
the receiving unit is used for receiving an inquiry request sent by the first client and inquiring whether the approval data is checked or not and the identity of a viewer;
the sending unit sends a query response to the first client, where the query response includes the public key of the second client.
8. The device of claim 6, wherein the like data is operation data of the first client on a like platform, and comprises a number of like times, a like time, comment content and a like type.
9. The device according to claim 6, wherein the first client encrypts the like data with its own public key, specifically:
and the first client encrypts the approval data by using the public key of the first client in a preset proportion.
10. The method of claim 6 or 8, wherein the like data comprises an associated attribute and a non-associated attribute; wherein,
and automatically superposing the attribute values of the attribute associated with the like data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910547113.6A CN110213296A (en) | 2019-06-24 | 2019-06-24 | It is a kind of that data cochain method and its equipment are thumbed up based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910547113.6A CN110213296A (en) | 2019-06-24 | 2019-06-24 | It is a kind of that data cochain method and its equipment are thumbed up based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110213296A true CN110213296A (en) | 2019-09-06 |
Family
ID=67794160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910547113.6A Pending CN110213296A (en) | 2019-06-24 | 2019-06-24 | It is a kind of that data cochain method and its equipment are thumbed up based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110213296A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113538139A (en) * | 2021-06-29 | 2021-10-22 | 深圳市高德信通信股份有限公司 | Block chain-based secure transaction method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108665343A (en) * | 2018-04-28 | 2018-10-16 | 东莞市华睿电子科技有限公司 | It is a kind of based on the experience sense of cloud platform by feedback method |
CN109784931A (en) * | 2019-02-27 | 2019-05-21 | 成都埃克森尔科技有限公司 | A kind of querying method of the Data Query Platform based on block chain |
CN109858228A (en) * | 2019-01-31 | 2019-06-07 | 上海计算机软件技术开发中心 | Data sharing service platform and method based on block chain |
-
2019
- 2019-06-24 CN CN201910547113.6A patent/CN110213296A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108665343A (en) * | 2018-04-28 | 2018-10-16 | 东莞市华睿电子科技有限公司 | It is a kind of based on the experience sense of cloud platform by feedback method |
CN109858228A (en) * | 2019-01-31 | 2019-06-07 | 上海计算机软件技术开发中心 | Data sharing service platform and method based on block chain |
CN109784931A (en) * | 2019-02-27 | 2019-05-21 | 成都埃克森尔科技有限公司 | A kind of querying method of the Data Query Platform based on block chain |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113538139A (en) * | 2021-06-29 | 2021-10-22 | 深圳市高德信通信股份有限公司 | Block chain-based secure transaction method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110232286B (en) | E-commerce data chaining method and equipment applying intelligent contracts | |
CN110278270A (en) | A kind of polled data cochain method and its equipment based on block chain | |
CN110247923A (en) | Number cochain method and its equipment are shaken based on block chain | |
CN110247918A (en) | Number cochain method and its equipment are shaken applied to block chain | |
CN115130075A (en) | Digital signature method and device, electronic equipment and storage medium | |
CN110263563A (en) | By means of the ad click data cochain method and its equipment of block chain | |
CN110264206A (en) | A kind of electric quotient data cochain method and its equipment based on block chain | |
CN110266696A (en) | A kind of evaluation data cochain method and its equipment applied to block chain | |
CN110266699A (en) | Prize drawing data cochain method and its equipment applied to block chain | |
CN110263529A (en) | Number cochain method and its equipment are shaken using intelligent contract | |
CN110266698A (en) | Pass through the Knowledge Sharing data cochain method and its equipment of block chain | |
CN110247921A (en) | A kind of polled data cochain method and its equipment for applying intelligent contract | |
CN110263100A (en) | Using the shared economic data cochain method and its equipment of intelligent contract | |
CN110213296A (en) | It is a kind of that data cochain method and its equipment are thumbed up based on block chain | |
CN110232287A (en) | Pass through the shared economic data cochain method and its equipment of block chain | |
CN110233853A (en) | It is a kind of to thumb up data cochain method and its equipment applied to block chain | |
CN110210975A (en) | Data trade method and its equipment on block chain | |
CN110266691A (en) | Credit data cochain method and its equipment based on block chain | |
CN110233852A (en) | Prize drawing data cochain method and its equipment based on block chain | |
CN110263562A (en) | A kind of evaluation data cochain method and its equipment based on block chain | |
CN110210861A (en) | Data trade method and its equipment on block chain | |
CN110213294A (en) | By means of the community data cochain method and its equipment of block chain | |
CN110266695A (en) | Using the lottery data cochain method and its equipment of intelligent contract | |
CN110245512A (en) | Lottery data cochain method and its equipment applied to block chain | |
CN110225056A (en) | A kind of evaluation data cochain method and its equipment for applying intelligent contract |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100085 No. 108, 1st Floor, No. 9, Shangdi Jiujie, Haidian District, Beijing Applicant after: Beijing ruice Technology Co., Ltd Address before: 100085 No. 108, 1st Floor, No. 9, Shangdi Jiujie, Haidian District, Beijing Applicant before: BEIJING AIMO RUICE TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190906 |
|
RJ01 | Rejection of invention patent application after publication |