CN110247799A - A kind of cellular infrastructure application implementation method based on data encryption processing technique - Google Patents

A kind of cellular infrastructure application implementation method based on data encryption processing technique Download PDF

Info

Publication number
CN110247799A
CN110247799A CN201910524063.XA CN201910524063A CN110247799A CN 110247799 A CN110247799 A CN 110247799A CN 201910524063 A CN201910524063 A CN 201910524063A CN 110247799 A CN110247799 A CN 110247799A
Authority
CN
China
Prior art keywords
platform
node
port
processing technique
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910524063.XA
Other languages
Chinese (zh)
Other versions
CN110247799B (en
Inventor
郑勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910524063.XA priority Critical patent/CN110247799B/en
Publication of CN110247799A publication Critical patent/CN110247799A/en
Application granted granted Critical
Publication of CN110247799B publication Critical patent/CN110247799B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5041Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
    • H04L41/5051Service on demand, e.g. definition and deployment of services in real time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The cellular infrastructure application implementation method based on data encryption processing technique that the invention discloses a kind of, this approach includes the following steps, step 1: based on data encryption processing technique setting root platform and cache platform, cellular group's layer structure is established using root platform, establishes multiple nodes in cellular group's layer structure;Step 2: determining root platform and cache platform fields according to business demand, resets the root platform in the field and the quantity of cache platform;Step 3: determine that the structural framing of cellular group's layer structure and platform group's layer group divide according to business demand;Step 4: node, definition node, classification node and its group's layer group are created according to business demand and belonged to;Step 5: Encryption Algorithm and its authorization are defined according to business demand.This cellular infrastructure is able to satisfy scientific and technological upgrading and business demand with rapid changepl. never-ending changes and improvements using implementation method, and the solution after information integration is accurate, and this method is timely to the control for runing project cost reason on platform, accurate.

Description

A kind of cellular infrastructure application implementation method based on data encryption processing technique
Technical field
The present invention relates to block chain technical fields, particularly relate to a kind of honeycomb based on data encryption processing technique Formula framework applications implementation method.
Background technique
With the progress of improvement of living standard and science and technology, the more diversification and secret of people's demand, people are to value Requirement it is higher.Demand diversification and secretization can be related to the more extensive information content trusty and more rigorous profession in time Service plan, value dimension need the measurement and accumulation of more Cost Driver information on a timeline.Currently, the record of information, The operations such as storage, encryption, sharing are carried out in the control network of center type, and specific operation is by service organization or third party The network platform or server that mechanism provides execute.
In existing center type control network, network platform node or service that service organization or the third-party institution provide Device node is equivalent to host node therein, and other users node or supervisory organ's node etc. are from node.In general, only from node Can dereference service organization partial information, can not synchronize and the operation such as be written, modified, can not ensure information at the first time Accuracy and authenticity.Existing logic and method have the following problems:
1, information processing capacity is less than normal;Information processing is inefficient;Information storage space is insufficient;
2, ecosphere participation is relatively low;Shared mechanism is insufficient;
3, platform own operations high expensive;Operation cost cannot be converted into income to greatest extent;
4, on platform run project cost reason control not in time, inaccuracy;
5, confidentiality is poor, and degree of belief is low, poor in timeliness;
6, service satisfaction is relatively low, and value does not protrude;
7, logic and method matching degree are not able to satisfy business demand with rapid changepl. never-ending changes and improvements, and the solution after information integration is not accurate;
8, central site network goes wrong the paralysis of entire platform.
Summary of the invention
Aiming at the shortcomings in the prior art, the technical problem to be solved in the present invention is that providing a kind of based on data encryption The cellular infrastructure application implementation method of processing technique.
In order to solve the above technical problems, the present invention is realized by following scheme: one kind being based on data encryption processing technique Cellular infrastructure application implementation method, method includes the following steps:
Step 1: based on data encryption processing technique setting root platform and cache platform, cellular group's layer is established using root platform Structure establishes multiple nodes in cellular group's layer structure;
Step 2: determining root platform and cache platform fields according to business demand, and the root platform for resetting the field is gentle Deposit the quantity of platform;
Step 3: determine that the structural framing of cellular group's layer structure and platform group's layer group divide according to business demand;
Step 4: node, definition node, classification node and its group's layer group are created according to business demand and belonged to;
Step 5: Encryption Algorithm and its authorization are defined according to business demand.
Further, the structural framing of the cellular group layer structure be according to project, event, client, product information And commerce services are needed to belong to and be divided.
Further, described platform is provided with node member's universe service module, node member's universe service Module can be logged in each node;
The node member universe service module is in the cellular group layer structure that root platform is established, according to the portrait of member And the business demand being arranged when applying for member, it is that the node sets distribution recording rules module and its encryption on platform are calculated Method.
Further, the node member universe service module includes the basic information module of member, demand information mould Block;
The basic information module includes at least name, the pet name, the phone, address, age, occupation of member;
The demand information module is member's intention demand to be expressed in universe service, which can be flat by root Node precise positioning on platform enables member to be quickly found out required service recommendation scheme.
Further, described platform is additionally provided with questionnaire survey answer categorization module, the demand information module energy of member It is enough to be gradually completing according to questionnaire survey answer categorization module.
Further, the logical card for establishing node commodity based on data encryption processing technique during the step 4 is more High price value module;
The multi value of the logical card multi value module is the specified specific distributed recording rules of node and secret key, passes through calculation Method realizes digital encryption and classification, to realize corresponding authority in the differentiation and setting of platform or node, with the positioning reality of logical card The multi value of existing node.
Further, the logical card multi value module include a kind of commodity and its attribute or a kind of service and its attribute or A solution and its attribute or a client and its attribute or a condition and its attribute or a credit index and its category Property or a project and its attribute or a reason and its attribute or a kind of contract and its attribute.
Further, described platform further includes the cost engineering hierarchy node application based on data encryption processing technique Scene;The cost engineering hierarchy node application scenarios are the special nodes of setting, and analysis is shared in instant recording storage encryption The reason for generating cost, to realize the moment with commercial activity value maximization and risk control.
Further, described platform further includes on-line off-line complete of the nodeization based on data encryption processing technique platform Domain credit cycle service module;
The universe credit cycle service module is that platform nodes information according to business demand, is passed through multipath port, sharing To line;Meanwhile the client under line is shared information to platform nodes by multipath port, and obtains agreement commercial activity Feedback;To all have in the information of nodes records can not tamper, point-to-point sharing, timeliness, contractual, credit.
Further, the multipath port includes at least the port block chain APP, block chain small routine port, block chain Wechat port, block chain microblogging port, block chain RFID application port, block chain artificial intelligence robot port, block chain meeting Member's credit score exchanges port, block chain finance remittance attribute port, block chain supply chain port, block chain game port, area Block chain reminds port, block chain credit to share code port, block chain Open Source Code intelligence contract port, block chain remote service end Mouthful, the cross-border electric business port of block chain it is one or more.
Compared with the existing technology, the beneficial effects of the present invention are:
1, information processing capacity is big;Information processing efficiency is high;Information storage space is big;
2, ecosphere participation is high;Shared mechanism is abundant;
3, platform own operations are at low cost;Operation cost can be converted into income to greatest extent;
4, timely to the control for runing project cost reason on platform, accurate;
5, good confidentiality, degree of belief is high, timeliness is good;
6, service satisfaction is high, and value protrudes;
7, logic and method matching degree are able to satisfy business demand with rapid changepl. never-ending changes and improvements, and the solution after information integration is accurate;
8, several platforms and cache platform, it is relatively independent mutually to be protected further through data encryption.
Detailed description of the invention
Fig. 1 is that the present invention is based on the cellular infrastructure application implementation method functional block diagrams of data encryption processing technique;
Fig. 2 is the present invention cellular group's layer structural plan schematic diagram;
Fig. 3 is the cellular group's layer structure node schematic diagram of the present invention.
Specific embodiment
The preferred embodiment of the present invention is described in detail with reference to the accompanying drawing, so that advantages and features of the invention energy It is easier to be readily appreciated by one skilled in the art, so as to make a clearer definition of the protection scope of the present invention.
Please refer to attached drawing 1, a kind of cellular infrastructure application implementation method based on data encryption processing technique of the invention, It is characterized in that, method includes the following steps:
Step 1: based on data encryption processing technique setting root platform and cache platform, cellular group's layer is established using root platform Structure establishes multiple nodes in cellular group's layer structure;
Step 2: determining root platform and cache platform fields according to business demand, and the root platform for resetting the field is gentle Deposit the quantity of platform;
Step 3: determine that the structural framing of cellular group's layer structure and platform group's layer group divide according to business demand;
Step 4: node, definition node, classification node and its group's layer group are created according to business demand and belonged to;
Step 5: Encryption Algorithm and its authorization are defined according to business demand.
A kind of optimal technical scheme of the present embodiment: the structural framing of cellular group's layer structure is according to project, thing Part, client, the information of product and commerce services, which need to belong to, to be divided.
A kind of optimal technical scheme of the present embodiment: described platform is provided with node member's universe service module, should Node member's universe service module can be logged in each node;
The node member universe service module is in the cellular group layer structure that root platform is established, according to the portrait of member And the business demand being arranged when applying for member, it is that the node sets distribution recording rules module and its encryption on platform are calculated Method.
A kind of optimal technical scheme of the present embodiment: the node member universe service module includes the basic letter of member Cease module, demand information module;
The basic information module includes at least name, the pet name, the phone, address, age, occupation of member;
The demand information module is member's intention demand to be expressed in universe service, which can be flat by root Node precise positioning on platform enables member to be quickly found out required service recommendation scheme.
A kind of optimal technical scheme of the present embodiment: described platform is additionally provided with questionnaire survey answer categorization module, meeting The demand information module of member can be gradually completing according to questionnaire survey answer categorization module.
A kind of optimal technical scheme of the present embodiment: it is established during the step 4 based on data encryption processing technique The logical card multi value module of node commodity;
The multi value of the logical card multi value module is the specified specific distributed recording rules of node and secret key, passes through calculation Method realizes digital encryption and classification, to realize corresponding authority in the differentiation and setting of platform or node, with the positioning reality of logical card The multi value of existing node.
A kind of optimal technical scheme of the present embodiment: the logical card multi value module include a kind of commodity and its attribute or A kind of service and its attribute or a solution and its attribute or a client and its attribute or a condition and its attribute or One credit index and its attribute or a project and its attribute or a reason and its attribute or a kind of contract and its attribute.
A kind of optimal technical scheme of the present embodiment: described platform further includes the cost based on data encryption processing technique Engineering System node application scenarios;The cost engineering hierarchy node application scenarios are the special nodes of setting, are remembered immediately The reason that analysis generates cost is shared in record storage encryption, to realize the moment with commercial activity value maximization and risk control System.
A kind of optimal technical scheme of the present embodiment: described platform further includes based on data encryption processing technique platform The on-line off-line universe credit cycle service module of nodeization;
The universe credit cycle service module is that platform nodes information according to business demand, is passed through multipath port, sharing To line;Meanwhile the client under line is shared information to platform nodes by multipath port, and obtains agreement commercial activity Feedback;To all have in the information of nodes records can not tamper, point-to-point sharing, timeliness, contractual, credit.
A kind of optimal technical scheme of the present embodiment: the multipath port includes at least the port block chain APP, block chain Small routine port, block chain wechat port, block chain microblogging port, block chain RFID application port, block chain artificial intelligence machine Device people port, block chain member's credit score exchange port, block chain finance remittance attribute port, block chain supply chain port, Block chain game port, block chain remind port, block chain credit to share code port, block chain Open Source Code intelligence contract end Mouth, block chain remote service port, the cross-border electric business port of block chain it is one or more.The unlimitedness of cellular node ensure that The unlimitedness of technology port, to establish infinite machine meeting for science and technology upgrading.
Referring to attached drawing 2, the center of Fig. 2 is the root platform being arranged based on data encryption processing technique and cache platform, periphery Circle represents the cellular group layer structure established using root platform, with the continuous development and update of business and the increasingly liter of science and technology Grade, which is closely connected from inside to outside extends outwardly, and the stain in cellular group's layer structure represents multiple Different nodes.Using data encryption processing technique and Network Connection, multiple cellular groups can be set in the world Layer structure, so that the business demand timely sharing in global range, information are integrated in time, new node is added in time, to greatest extent Operation cost is converted into income.
Referring to attached drawing 3, Fig. 3 is the cellular group's layer structure node schematic diagram of the present invention, these nodes are according to business at present Demand creation, definition, the node sorted out, these nodes connect each other, with science and technology, the continuous development of business and business demand It is continuous to develop, it can be created on honeycomb structure, define new node to constantly update and improve cellular infrastructure application, from And meet business demand with rapid changepl. never-ending changes and improvements, it is serviced whereby to constantly update, continuous extended theorem project and service range.Such as it sets Fixed cost engineering hierarchy node, can instant recording storage encryption share analysis generate cost reason, to realize moment companion With commercial activity value maximization and risk control.
The foregoing is merely the preferred embodiment of the present invention, are not intended to limit the scope of the invention, all benefits The equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content is applied directly or indirectly in other phases The technical field of pass, is included within the scope of the present invention.

Claims (10)

1. a kind of cellular infrastructure application implementation method based on data encryption processing technique, which is characterized in that this method includes Following steps:
Step 1: based on data encryption processing technique setting root platform and cache platform, cellular group's layer is established using root platform Structure establishes multiple nodes in cellular group's layer structure;
Step 2: determining root platform and cache platform fields according to business demand, and the root platform for resetting the field is gentle Deposit the quantity of platform;
Step 3: determine that the structural framing of cellular group's layer structure and platform group's layer group divide according to business demand;
Step 4: node, definition node, classification node and its group's layer group are created according to business demand and belonged to;
Step 5: Encryption Algorithm and its authorization are defined according to business demand.
2. the cellular infrastructure application implementation method according to claim 1 based on data encryption processing technique, feature Be: the structural framing of cellular group's layer structure is according to project, event, client, the information of product and commerce services need Belong to division.
3. the cellular infrastructure application implementation method according to claim 1 based on data encryption processing technique, feature Be: described platform is provided with node member's universe service module, and node member's universe service module can be each Node logs in;
The node member universe service module is in the cellular group layer structure that root platform is established, according to the portrait of member And the business demand being arranged when applying for member, it is that the node sets distribution recording rules module and its encryption on platform are calculated Method.
4. the cellular infrastructure application implementation method according to claim 3 based on data encryption processing technique, feature Be: the node member universe service module includes the basic information module of member, demand information module;
The basic information module includes at least name, the pet name, the phone, address, age, occupation of member;
The demand information module is member's intention demand to be expressed in universe service, which can be flat by root Node precise positioning on platform enables member to be quickly found out required service recommendation scheme.
5. the cellular infrastructure application implementation method according to claim 4 based on data encryption processing technique, feature Be: described platform is additionally provided with questionnaire survey answer categorization module, and the demand information module of member can be according to questionnaire tune Answer categorization module is looked into be gradually completing.
6. the cellular infrastructure application implementation method according to claim 1 based on data encryption processing technique, feature It is: establishes the logical card multi value module of node commodity based on data encryption processing technique during the step 4;
The multi value of the logical card multi value module is the specified specific distributed recording rules of node and secret key, passes through calculation Method realizes digital encryption and classification, to realize corresponding authority in the differentiation and setting of platform or node, with the positioning reality of logical card The multi value of existing node.
7. the cellular infrastructure application implementation method according to claim 6 based on data encryption processing technique, feature Be: the logical card multi value module includes a kind of commodity and its attribute or a kind of service and its attribute or a solution And its attribute or a client and its attribute or a condition and its attribute or a credit index and its attribute or a project And its attribute or a reason and its attribute or a kind of contract and its attribute.
8. the cellular infrastructure described in -7 any one based on data encryption processing technique applies realization side according to claim 1 Method, it is characterised in that: described platform further includes the cost engineering hierarchy node applied field based on data encryption processing technique Scape;The cost engineering hierarchy node application scenarios are the special nodes of setting, and instant recording storage encryption is shared analysis and produced The reason for generating this, to realize the moment with commercial activity value maximization and risk control.
9. the cellular infrastructure application implementation method according to claim 1 based on data encryption processing technique, feature Be: described platform further includes the on-line off-line universe credit period clothes of the nodeization based on data encryption processing technique platform Business module;
The universe credit cycle service module is that platform nodes information according to business demand, is passed through multipath port, sharing To line;Meanwhile the client under line is shared information to platform nodes by multipath port, and obtains agreement commercial activity Feedback;To all have in the information of nodes records can not tamper, point-to-point sharing, timeliness, contractual, credit.
10. the cellular infrastructure application implementation method according to claim 9 based on data encryption processing technique, feature Be: the multipath port includes at least the port block chain APP, block chain small routine port, block chain wechat port, block Chain microblogging port, block chain RFID application port, block chain artificial intelligence robot port, block chain member's credit score are exchanged Port, block chain finance remittance attribute port, block chain supply chain port, block chain game port, block chain remind port, area Block chain credit shares code port, block chain Open Source Code intelligence contract port, block chain remote service port, the cross-border electricity of block chain Quotient port it is one or more.
CN201910524063.XA 2019-06-18 2019-06-18 Honeycomb structure application realizing method based on data encryption processing technology Active CN110247799B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910524063.XA CN110247799B (en) 2019-06-18 2019-06-18 Honeycomb structure application realizing method based on data encryption processing technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910524063.XA CN110247799B (en) 2019-06-18 2019-06-18 Honeycomb structure application realizing method based on data encryption processing technology

Publications (2)

Publication Number Publication Date
CN110247799A true CN110247799A (en) 2019-09-17
CN110247799B CN110247799B (en) 2022-04-08

Family

ID=67887723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910524063.XA Active CN110247799B (en) 2019-06-18 2019-06-18 Honeycomb structure application realizing method based on data encryption processing technology

Country Status (1)

Country Link
CN (1) CN110247799B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537642A (en) * 2018-04-20 2018-09-14 郑勇 A kind of on-line off-line universe credit cycle service system based on block platform chain
US20180322597A1 (en) * 2016-08-31 2018-11-08 Robert Sher Decentralized cryptographic real estate transaction assistance system and method
CN109146372A (en) * 2018-04-26 2019-01-04 宏泰集团(厦门)有限公司 Global wisdom manufactures sales service system
CN109447578A (en) * 2018-10-13 2019-03-08 山东云息网络科技有限公司 A kind of internet sport self-determination cooperation management system and method based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180322597A1 (en) * 2016-08-31 2018-11-08 Robert Sher Decentralized cryptographic real estate transaction assistance system and method
CN108537642A (en) * 2018-04-20 2018-09-14 郑勇 A kind of on-line off-line universe credit cycle service system based on block platform chain
CN109146372A (en) * 2018-04-26 2019-01-04 宏泰集团(厦门)有限公司 Global wisdom manufactures sales service system
CN109447578A (en) * 2018-10-13 2019-03-08 山东云息网络科技有限公司 A kind of internet sport self-determination cooperation management system and method based on block chain

Also Published As

Publication number Publication date
CN110247799B (en) 2022-04-08

Similar Documents

Publication Publication Date Title
Xie et al. A survey of blockchain technology applied to smart cities: Research issues and challenges
Sun et al. Blockchain-based sharing services: What blockchain technology can contribute to smart cities
Sandner et al. Convergence of blockchain, IoT, and AI
CN109829824B (en) Commodity transaction information sharing method based on block chain technology
Liu et al. A novel debt-credit mechanism for blockchain-based data-trading in internet of vehicles
Bhardwaj et al. Blockchain—technology to drive the future
CN110443701A (en) The logical card management method of one kind, supply chain financial system and electronic equipment
Afanasev et al. An application of blockchain and smart contracts for machine-to-machine communications in cyber-physical production systems
CN110166442A (en) A kind of data processing method and device based on block chain
US20190164136A1 (en) Beacon network with enterprise smart contracts having a centralized ledger
CN105913244A (en) Multi-user business data processing method and system
Muzylyov et al. Blockchain technology in transportation as a part of the efficiency in industry 4.0 strategy
CN109377352A (en) A kind of wisdom chemical industrial park data increasing letter method based on block chain
CN112862303B (en) Crowdsourcing quality evaluation system and method based on block chain
Owen et al. How blockchain technology can monetize new music ventures: an examination of new business models
CN108427554A (en) A kind of the cloud mode software method for automatically constructing and system of table- driven
Bothos et al. Leveraging blockchain for open mobility-as-a-service ecosystems
CN112200604A (en) Point management and transaction system based on block chain technology
CN108564461A (en) A kind of resource allocation method, computer readable storage medium and terminal device
CN114219342A (en) Carbon asset management method and device based on non-homogeneous evidence
CN110247799A (en) A kind of cellular infrastructure application implementation method based on data encryption processing technique
WO2021249208A1 (en) Digital currency model, method, system and device using code chain block
KR102550647B1 (en) System and method for sharing power data based on block chain
CN111489239A (en) Public chain-based cloud manufacturing service platform construction method
Hibti et al. Towards Swarm Intelligence Architectural Patterns: an IoT-Big Data-AI-Blockchain convergence perspective

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant