CN110247799A - A kind of cellular infrastructure application implementation method based on data encryption processing technique - Google Patents
A kind of cellular infrastructure application implementation method based on data encryption processing technique Download PDFInfo
- Publication number
- CN110247799A CN110247799A CN201910524063.XA CN201910524063A CN110247799A CN 110247799 A CN110247799 A CN 110247799A CN 201910524063 A CN201910524063 A CN 201910524063A CN 110247799 A CN110247799 A CN 110247799A
- Authority
- CN
- China
- Prior art keywords
- platform
- node
- port
- processing technique
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5041—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
- H04L41/5051—Service on demand, e.g. definition and deployment of services in real time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Abstract
The cellular infrastructure application implementation method based on data encryption processing technique that the invention discloses a kind of, this approach includes the following steps, step 1: based on data encryption processing technique setting root platform and cache platform, cellular group's layer structure is established using root platform, establishes multiple nodes in cellular group's layer structure;Step 2: determining root platform and cache platform fields according to business demand, resets the root platform in the field and the quantity of cache platform;Step 3: determine that the structural framing of cellular group's layer structure and platform group's layer group divide according to business demand;Step 4: node, definition node, classification node and its group's layer group are created according to business demand and belonged to;Step 5: Encryption Algorithm and its authorization are defined according to business demand.This cellular infrastructure is able to satisfy scientific and technological upgrading and business demand with rapid changepl. never-ending changes and improvements using implementation method, and the solution after information integration is accurate, and this method is timely to the control for runing project cost reason on platform, accurate.
Description
Technical field
The present invention relates to block chain technical fields, particularly relate to a kind of honeycomb based on data encryption processing technique
Formula framework applications implementation method.
Background technique
With the progress of improvement of living standard and science and technology, the more diversification and secret of people's demand, people are to value
Requirement it is higher.Demand diversification and secretization can be related to the more extensive information content trusty and more rigorous profession in time
Service plan, value dimension need the measurement and accumulation of more Cost Driver information on a timeline.Currently, the record of information,
The operations such as storage, encryption, sharing are carried out in the control network of center type, and specific operation is by service organization or third party
The network platform or server that mechanism provides execute.
In existing center type control network, network platform node or service that service organization or the third-party institution provide
Device node is equivalent to host node therein, and other users node or supervisory organ's node etc. are from node.In general, only from node
Can dereference service organization partial information, can not synchronize and the operation such as be written, modified, can not ensure information at the first time
Accuracy and authenticity.Existing logic and method have the following problems:
1, information processing capacity is less than normal;Information processing is inefficient;Information storage space is insufficient;
2, ecosphere participation is relatively low;Shared mechanism is insufficient;
3, platform own operations high expensive;Operation cost cannot be converted into income to greatest extent;
4, on platform run project cost reason control not in time, inaccuracy;
5, confidentiality is poor, and degree of belief is low, poor in timeliness;
6, service satisfaction is relatively low, and value does not protrude;
7, logic and method matching degree are not able to satisfy business demand with rapid changepl. never-ending changes and improvements, and the solution after information integration is not accurate;
8, central site network goes wrong the paralysis of entire platform.
Summary of the invention
Aiming at the shortcomings in the prior art, the technical problem to be solved in the present invention is that providing a kind of based on data encryption
The cellular infrastructure application implementation method of processing technique.
In order to solve the above technical problems, the present invention is realized by following scheme: one kind being based on data encryption processing technique
Cellular infrastructure application implementation method, method includes the following steps:
Step 1: based on data encryption processing technique setting root platform and cache platform, cellular group's layer is established using root platform
Structure establishes multiple nodes in cellular group's layer structure;
Step 2: determining root platform and cache platform fields according to business demand, and the root platform for resetting the field is gentle
Deposit the quantity of platform;
Step 3: determine that the structural framing of cellular group's layer structure and platform group's layer group divide according to business demand;
Step 4: node, definition node, classification node and its group's layer group are created according to business demand and belonged to;
Step 5: Encryption Algorithm and its authorization are defined according to business demand.
Further, the structural framing of the cellular group layer structure be according to project, event, client, product information
And commerce services are needed to belong to and be divided.
Further, described platform is provided with node member's universe service module, node member's universe service
Module can be logged in each node;
The node member universe service module is in the cellular group layer structure that root platform is established, according to the portrait of member
And the business demand being arranged when applying for member, it is that the node sets distribution recording rules module and its encryption on platform are calculated
Method.
Further, the node member universe service module includes the basic information module of member, demand information mould
Block;
The basic information module includes at least name, the pet name, the phone, address, age, occupation of member;
The demand information module is member's intention demand to be expressed in universe service, which can be flat by root
Node precise positioning on platform enables member to be quickly found out required service recommendation scheme.
Further, described platform is additionally provided with questionnaire survey answer categorization module, the demand information module energy of member
It is enough to be gradually completing according to questionnaire survey answer categorization module.
Further, the logical card for establishing node commodity based on data encryption processing technique during the step 4 is more
High price value module;
The multi value of the logical card multi value module is the specified specific distributed recording rules of node and secret key, passes through calculation
Method realizes digital encryption and classification, to realize corresponding authority in the differentiation and setting of platform or node, with the positioning reality of logical card
The multi value of existing node.
Further, the logical card multi value module include a kind of commodity and its attribute or a kind of service and its attribute or
A solution and its attribute or a client and its attribute or a condition and its attribute or a credit index and its category
Property or a project and its attribute or a reason and its attribute or a kind of contract and its attribute.
Further, described platform further includes the cost engineering hierarchy node application based on data encryption processing technique
Scene;The cost engineering hierarchy node application scenarios are the special nodes of setting, and analysis is shared in instant recording storage encryption
The reason for generating cost, to realize the moment with commercial activity value maximization and risk control.
Further, described platform further includes on-line off-line complete of the nodeization based on data encryption processing technique platform
Domain credit cycle service module;
The universe credit cycle service module is that platform nodes information according to business demand, is passed through multipath port, sharing
To line;Meanwhile the client under line is shared information to platform nodes by multipath port, and obtains agreement commercial activity
Feedback;To all have in the information of nodes records can not tamper, point-to-point sharing, timeliness, contractual, credit.
Further, the multipath port includes at least the port block chain APP, block chain small routine port, block chain
Wechat port, block chain microblogging port, block chain RFID application port, block chain artificial intelligence robot port, block chain meeting
Member's credit score exchanges port, block chain finance remittance attribute port, block chain supply chain port, block chain game port, area
Block chain reminds port, block chain credit to share code port, block chain Open Source Code intelligence contract port, block chain remote service end
Mouthful, the cross-border electric business port of block chain it is one or more.
Compared with the existing technology, the beneficial effects of the present invention are:
1, information processing capacity is big;Information processing efficiency is high;Information storage space is big;
2, ecosphere participation is high;Shared mechanism is abundant;
3, platform own operations are at low cost;Operation cost can be converted into income to greatest extent;
4, timely to the control for runing project cost reason on platform, accurate;
5, good confidentiality, degree of belief is high, timeliness is good;
6, service satisfaction is high, and value protrudes;
7, logic and method matching degree are able to satisfy business demand with rapid changepl. never-ending changes and improvements, and the solution after information integration is accurate;
8, several platforms and cache platform, it is relatively independent mutually to be protected further through data encryption.
Detailed description of the invention
Fig. 1 is that the present invention is based on the cellular infrastructure application implementation method functional block diagrams of data encryption processing technique;
Fig. 2 is the present invention cellular group's layer structural plan schematic diagram;
Fig. 3 is the cellular group's layer structure node schematic diagram of the present invention.
Specific embodiment
The preferred embodiment of the present invention is described in detail with reference to the accompanying drawing, so that advantages and features of the invention energy
It is easier to be readily appreciated by one skilled in the art, so as to make a clearer definition of the protection scope of the present invention.
Please refer to attached drawing 1, a kind of cellular infrastructure application implementation method based on data encryption processing technique of the invention,
It is characterized in that, method includes the following steps:
Step 1: based on data encryption processing technique setting root platform and cache platform, cellular group's layer is established using root platform
Structure establishes multiple nodes in cellular group's layer structure;
Step 2: determining root platform and cache platform fields according to business demand, and the root platform for resetting the field is gentle
Deposit the quantity of platform;
Step 3: determine that the structural framing of cellular group's layer structure and platform group's layer group divide according to business demand;
Step 4: node, definition node, classification node and its group's layer group are created according to business demand and belonged to;
Step 5: Encryption Algorithm and its authorization are defined according to business demand.
A kind of optimal technical scheme of the present embodiment: the structural framing of cellular group's layer structure is according to project, thing
Part, client, the information of product and commerce services, which need to belong to, to be divided.
A kind of optimal technical scheme of the present embodiment: described platform is provided with node member's universe service module, should
Node member's universe service module can be logged in each node;
The node member universe service module is in the cellular group layer structure that root platform is established, according to the portrait of member
And the business demand being arranged when applying for member, it is that the node sets distribution recording rules module and its encryption on platform are calculated
Method.
A kind of optimal technical scheme of the present embodiment: the node member universe service module includes the basic letter of member
Cease module, demand information module;
The basic information module includes at least name, the pet name, the phone, address, age, occupation of member;
The demand information module is member's intention demand to be expressed in universe service, which can be flat by root
Node precise positioning on platform enables member to be quickly found out required service recommendation scheme.
A kind of optimal technical scheme of the present embodiment: described platform is additionally provided with questionnaire survey answer categorization module, meeting
The demand information module of member can be gradually completing according to questionnaire survey answer categorization module.
A kind of optimal technical scheme of the present embodiment: it is established during the step 4 based on data encryption processing technique
The logical card multi value module of node commodity;
The multi value of the logical card multi value module is the specified specific distributed recording rules of node and secret key, passes through calculation
Method realizes digital encryption and classification, to realize corresponding authority in the differentiation and setting of platform or node, with the positioning reality of logical card
The multi value of existing node.
A kind of optimal technical scheme of the present embodiment: the logical card multi value module include a kind of commodity and its attribute or
A kind of service and its attribute or a solution and its attribute or a client and its attribute or a condition and its attribute or
One credit index and its attribute or a project and its attribute or a reason and its attribute or a kind of contract and its attribute.
A kind of optimal technical scheme of the present embodiment: described platform further includes the cost based on data encryption processing technique
Engineering System node application scenarios;The cost engineering hierarchy node application scenarios are the special nodes of setting, are remembered immediately
The reason that analysis generates cost is shared in record storage encryption, to realize the moment with commercial activity value maximization and risk control
System.
A kind of optimal technical scheme of the present embodiment: described platform further includes based on data encryption processing technique platform
The on-line off-line universe credit cycle service module of nodeization;
The universe credit cycle service module is that platform nodes information according to business demand, is passed through multipath port, sharing
To line;Meanwhile the client under line is shared information to platform nodes by multipath port, and obtains agreement commercial activity
Feedback;To all have in the information of nodes records can not tamper, point-to-point sharing, timeliness, contractual, credit.
A kind of optimal technical scheme of the present embodiment: the multipath port includes at least the port block chain APP, block chain
Small routine port, block chain wechat port, block chain microblogging port, block chain RFID application port, block chain artificial intelligence machine
Device people port, block chain member's credit score exchange port, block chain finance remittance attribute port, block chain supply chain port,
Block chain game port, block chain remind port, block chain credit to share code port, block chain Open Source Code intelligence contract end
Mouth, block chain remote service port, the cross-border electric business port of block chain it is one or more.The unlimitedness of cellular node ensure that
The unlimitedness of technology port, to establish infinite machine meeting for science and technology upgrading.
Referring to attached drawing 2, the center of Fig. 2 is the root platform being arranged based on data encryption processing technique and cache platform, periphery
Circle represents the cellular group layer structure established using root platform, with the continuous development and update of business and the increasingly liter of science and technology
Grade, which is closely connected from inside to outside extends outwardly, and the stain in cellular group's layer structure represents multiple
Different nodes.Using data encryption processing technique and Network Connection, multiple cellular groups can be set in the world
Layer structure, so that the business demand timely sharing in global range, information are integrated in time, new node is added in time, to greatest extent
Operation cost is converted into income.
Referring to attached drawing 3, Fig. 3 is the cellular group's layer structure node schematic diagram of the present invention, these nodes are according to business at present
Demand creation, definition, the node sorted out, these nodes connect each other, with science and technology, the continuous development of business and business demand
It is continuous to develop, it can be created on honeycomb structure, define new node to constantly update and improve cellular infrastructure application, from
And meet business demand with rapid changepl. never-ending changes and improvements, it is serviced whereby to constantly update, continuous extended theorem project and service range.Such as it sets
Fixed cost engineering hierarchy node, can instant recording storage encryption share analysis generate cost reason, to realize moment companion
With commercial activity value maximization and risk control.
The foregoing is merely the preferred embodiment of the present invention, are not intended to limit the scope of the invention, all benefits
The equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content is applied directly or indirectly in other phases
The technical field of pass, is included within the scope of the present invention.
Claims (10)
1. a kind of cellular infrastructure application implementation method based on data encryption processing technique, which is characterized in that this method includes
Following steps:
Step 1: based on data encryption processing technique setting root platform and cache platform, cellular group's layer is established using root platform
Structure establishes multiple nodes in cellular group's layer structure;
Step 2: determining root platform and cache platform fields according to business demand, and the root platform for resetting the field is gentle
Deposit the quantity of platform;
Step 3: determine that the structural framing of cellular group's layer structure and platform group's layer group divide according to business demand;
Step 4: node, definition node, classification node and its group's layer group are created according to business demand and belonged to;
Step 5: Encryption Algorithm and its authorization are defined according to business demand.
2. the cellular infrastructure application implementation method according to claim 1 based on data encryption processing technique, feature
Be: the structural framing of cellular group's layer structure is according to project, event, client, the information of product and commerce services need
Belong to division.
3. the cellular infrastructure application implementation method according to claim 1 based on data encryption processing technique, feature
Be: described platform is provided with node member's universe service module, and node member's universe service module can be each
Node logs in;
The node member universe service module is in the cellular group layer structure that root platform is established, according to the portrait of member
And the business demand being arranged when applying for member, it is that the node sets distribution recording rules module and its encryption on platform are calculated
Method.
4. the cellular infrastructure application implementation method according to claim 3 based on data encryption processing technique, feature
Be: the node member universe service module includes the basic information module of member, demand information module;
The basic information module includes at least name, the pet name, the phone, address, age, occupation of member;
The demand information module is member's intention demand to be expressed in universe service, which can be flat by root
Node precise positioning on platform enables member to be quickly found out required service recommendation scheme.
5. the cellular infrastructure application implementation method according to claim 4 based on data encryption processing technique, feature
Be: described platform is additionally provided with questionnaire survey answer categorization module, and the demand information module of member can be according to questionnaire tune
Answer categorization module is looked into be gradually completing.
6. the cellular infrastructure application implementation method according to claim 1 based on data encryption processing technique, feature
It is: establishes the logical card multi value module of node commodity based on data encryption processing technique during the step 4;
The multi value of the logical card multi value module is the specified specific distributed recording rules of node and secret key, passes through calculation
Method realizes digital encryption and classification, to realize corresponding authority in the differentiation and setting of platform or node, with the positioning reality of logical card
The multi value of existing node.
7. the cellular infrastructure application implementation method according to claim 6 based on data encryption processing technique, feature
Be: the logical card multi value module includes a kind of commodity and its attribute or a kind of service and its attribute or a solution
And its attribute or a client and its attribute or a condition and its attribute or a credit index and its attribute or a project
And its attribute or a reason and its attribute or a kind of contract and its attribute.
8. the cellular infrastructure described in -7 any one based on data encryption processing technique applies realization side according to claim 1
Method, it is characterised in that: described platform further includes the cost engineering hierarchy node applied field based on data encryption processing technique
Scape;The cost engineering hierarchy node application scenarios are the special nodes of setting, and instant recording storage encryption is shared analysis and produced
The reason for generating this, to realize the moment with commercial activity value maximization and risk control.
9. the cellular infrastructure application implementation method according to claim 1 based on data encryption processing technique, feature
Be: described platform further includes the on-line off-line universe credit period clothes of the nodeization based on data encryption processing technique platform
Business module;
The universe credit cycle service module is that platform nodes information according to business demand, is passed through multipath port, sharing
To line;Meanwhile the client under line is shared information to platform nodes by multipath port, and obtains agreement commercial activity
Feedback;To all have in the information of nodes records can not tamper, point-to-point sharing, timeliness, contractual, credit.
10. the cellular infrastructure application implementation method according to claim 9 based on data encryption processing technique, feature
Be: the multipath port includes at least the port block chain APP, block chain small routine port, block chain wechat port, block
Chain microblogging port, block chain RFID application port, block chain artificial intelligence robot port, block chain member's credit score are exchanged
Port, block chain finance remittance attribute port, block chain supply chain port, block chain game port, block chain remind port, area
Block chain credit shares code port, block chain Open Source Code intelligence contract port, block chain remote service port, the cross-border electricity of block chain
Quotient port it is one or more.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910524063.XA CN110247799B (en) | 2019-06-18 | 2019-06-18 | Honeycomb structure application realizing method based on data encryption processing technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910524063.XA CN110247799B (en) | 2019-06-18 | 2019-06-18 | Honeycomb structure application realizing method based on data encryption processing technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110247799A true CN110247799A (en) | 2019-09-17 |
CN110247799B CN110247799B (en) | 2022-04-08 |
Family
ID=67887723
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910524063.XA Active CN110247799B (en) | 2019-06-18 | 2019-06-18 | Honeycomb structure application realizing method based on data encryption processing technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110247799B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108537642A (en) * | 2018-04-20 | 2018-09-14 | 郑勇 | A kind of on-line off-line universe credit cycle service system based on block platform chain |
US20180322597A1 (en) * | 2016-08-31 | 2018-11-08 | Robert Sher | Decentralized cryptographic real estate transaction assistance system and method |
CN109146372A (en) * | 2018-04-26 | 2019-01-04 | 宏泰集团(厦门)有限公司 | Global wisdom manufactures sales service system |
CN109447578A (en) * | 2018-10-13 | 2019-03-08 | 山东云息网络科技有限公司 | A kind of internet sport self-determination cooperation management system and method based on block chain |
-
2019
- 2019-06-18 CN CN201910524063.XA patent/CN110247799B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180322597A1 (en) * | 2016-08-31 | 2018-11-08 | Robert Sher | Decentralized cryptographic real estate transaction assistance system and method |
CN108537642A (en) * | 2018-04-20 | 2018-09-14 | 郑勇 | A kind of on-line off-line universe credit cycle service system based on block platform chain |
CN109146372A (en) * | 2018-04-26 | 2019-01-04 | 宏泰集团(厦门)有限公司 | Global wisdom manufactures sales service system |
CN109447578A (en) * | 2018-10-13 | 2019-03-08 | 山东云息网络科技有限公司 | A kind of internet sport self-determination cooperation management system and method based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN110247799B (en) | 2022-04-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xie et al. | A survey of blockchain technology applied to smart cities: Research issues and challenges | |
Sun et al. | Blockchain-based sharing services: What blockchain technology can contribute to smart cities | |
Sandner et al. | Convergence of blockchain, IoT, and AI | |
CN109829824B (en) | Commodity transaction information sharing method based on block chain technology | |
Liu et al. | A novel debt-credit mechanism for blockchain-based data-trading in internet of vehicles | |
Bhardwaj et al. | Blockchain—technology to drive the future | |
CN110443701A (en) | The logical card management method of one kind, supply chain financial system and electronic equipment | |
Afanasev et al. | An application of blockchain and smart contracts for machine-to-machine communications in cyber-physical production systems | |
CN110166442A (en) | A kind of data processing method and device based on block chain | |
US20190164136A1 (en) | Beacon network with enterprise smart contracts having a centralized ledger | |
CN105913244A (en) | Multi-user business data processing method and system | |
Muzylyov et al. | Blockchain technology in transportation as a part of the efficiency in industry 4.0 strategy | |
CN109377352A (en) | A kind of wisdom chemical industrial park data increasing letter method based on block chain | |
CN112862303B (en) | Crowdsourcing quality evaluation system and method based on block chain | |
Owen et al. | How blockchain technology can monetize new music ventures: an examination of new business models | |
CN108427554A (en) | A kind of the cloud mode software method for automatically constructing and system of table- driven | |
Bothos et al. | Leveraging blockchain for open mobility-as-a-service ecosystems | |
CN112200604A (en) | Point management and transaction system based on block chain technology | |
CN108564461A (en) | A kind of resource allocation method, computer readable storage medium and terminal device | |
CN114219342A (en) | Carbon asset management method and device based on non-homogeneous evidence | |
CN110247799A (en) | A kind of cellular infrastructure application implementation method based on data encryption processing technique | |
WO2021249208A1 (en) | Digital currency model, method, system and device using code chain block | |
KR102550647B1 (en) | System and method for sharing power data based on block chain | |
CN111489239A (en) | Public chain-based cloud manufacturing service platform construction method | |
Hibti et al. | Towards Swarm Intelligence Architectural Patterns: an IoT-Big Data-AI-Blockchain convergence perspective |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |