CN110263560A - By means of the ad click data cochain method and its equipment of block chain - Google Patents
By means of the ad click data cochain method and its equipment of block chain Download PDFInfo
- Publication number
- CN110263560A CN110263560A CN201910546949.4A CN201910546949A CN110263560A CN 110263560 A CN110263560 A CN 110263560A CN 201910546949 A CN201910546949 A CN 201910546949A CN 110263560 A CN110263560 A CN 110263560A
- Authority
- CN
- China
- Prior art keywords
- client
- click data
- click
- public key
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0248—Avoiding fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Abstract
This application discloses the ad click data cochain method and its equipment by means of block chain, block chain node receives the ad click data cochain request that the first client is sent;Triggering verifies intelligent contract, the intelligent contract of the verification verifies the identity of first client, after verification passes through, the ad click data are encrypted with first client public key, and execute the cochain process of the ad click data of the first client public key encryption;The block chain node receives the inquiry request of the ad click data of the second client, and the inquiry request of the ad click data includes the second client public key;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client.The application can disclose ad click data cochain credible.
Description
Technical field
This application involves block chain technical fields, more particularly to by means of block chain ad click data cochain method and
Its equipment.
Background technique
Currently, block chain technology is the peer-to-peer network based on decentralization, with open source software Cryptography Principles, when ordinal number
It is combined according to common recognition mechanism, to ensure the coherent of each node in distributed data base and continue, so that information is verified immediately, can
Retrospect, but be difficult to tamper with and can not shield, to create a set of privacy, shareable value system efficiently, safe.
Existing ad click platform is all the database using centralization, when saving the ad click of commodity or service
Between, the contents such as the mobile phone that uses of the ad click of ad click number and user;However, the database of ad click platform,
There is data to be tampered, the authenticity of data cannot be guaranteed, and the operation platform of ad click modifies the advertisement of certain commodity
Touching quantity.Also, for commodity or service advertisement, be charged according to its commodity or the ad click amount of service, if
Because ad data it is untrue due to pay, affect the experience of advertising user.
In addition, especially all being obtained to some small ad click platforms, ad click Information Security and authenticity
Less than guarantee: and commodity or the ad click content of service are untrue, do not have reference value, consequently, it is possible to being produced to user
It is raw to mislead, also influence the experience of user.
Therefore, how can not distort based on block chain, the data of ad click platform are stored in area by believable mode
On block chain, become urgent problem to be solved.
Above content is only used for the technical solution that auxiliary understands the application, does not represent and recognizes that above content is existing skill
Art.
Summary of the invention
To solve the above-mentioned problems, the application provides the ad click data cochain method by means of block chain and its sets
Standby, this method can allow the data cochain of ad click, so that the ad click data on chain are credible, it is open and clear.
The application first aspect provides the ad click data cochain method by means of block chain, which comprises
Block chain node receives the ad click data cochain that the first client is sent and requests, in the ad click data
Chain request includes first client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, verifies
By rear, the ad click data are encrypted with first client public key, and it is public to execute first client
The cochain process of the ad click data of key encryption;
The block chain node receives the inquiry request of the ad click data of the second client, the ad click
The inquiry request of data includes the second client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client, verifies
By rear, the ad click data are encrypted with second client public key, and it is public to execute second client
The cochain process of the ad click data of key encryption.
In a kind of possible embodiment, the method also includes: the block chain node receives second client
End sends ad click data inquiry request;
The block chain node sends ad click data query and responds to second client, the ad click number
It is investigated that the ad click data that response includes the encryption of the second client public key are ask, in order to the second client own private key
The ad click data of second client public key encryption are decrypted.
In a kind of possible embodiment, the ad click data are the corresponding user of first client wide
Accuse the operation data for clicking platform, including ad click content, ad click time and ad click number.
In a kind of possible embodiment, the first client own public key adds the ad click data
It is close, specifically: first client carries out the encryption of preset ratio with own public key to the ad click data.
In a kind of possible embodiment, the ad click data include relating attribute and dereferenced attribute;Wherein,
The attribute value of the ad click data correlation attribute is superimposed automatically.
The application second aspect provides the ad click data cochain equipment by means of block chain, and the equipment is block chain
Node, the equipment include receiving unit and processing unit;Wherein,
The receiving unit receives the ad click data cochain request that the first client is sent, the ad click number
It include first client public key according to cochain request;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client
It is verified, after verification passes through, the ad click data is encrypted with first client public key, and described in execution
The cochain process of the ad click data of first client public key encryption;
The receiving unit receives the inquiry request of the ad click data of the second client, the ad click
The inquiry request of data includes the second client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of second client
It is verified, after verification passes through, the ad click data is encrypted with second client public key, and described in execution
The cochain process of the ad click data of second client public key encryption.
In a kind of possible embodiment, the equipment includes transmission unit;The receiving unit receives described second
Client sends ad click data inquiry request;
The transmission unit sends ad click data query and responds to second client, the ad click number
It is investigated that the ad click data that response includes the encryption of the second client public key are ask, in order to the second client own private key
The ad click data of second client public key encryption are decrypted.
In a kind of possible embodiment, the ad click data are the corresponding user of first client wide
Accuse the operation data for clicking platform, including ad click content, ad click time and ad click number.
In a kind of possible embodiment, the first client own public key adds the ad click data
It is close, specifically: first client carries out the encryption of preset ratio with own public key to the ad click data.
In a kind of possible embodiment, the ad click data include relating attribute and dereferenced attribute;Wherein,
The attribute value for stating ad click data correlation attribute is superimposed automatically.
The application can allow the data cochain of ad click, so that the ad click data on chain are credible, it is open and clear.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 is the ad click data cochain method flow schematic diagram provided by the embodiments of the present application by means of block chain;
Fig. 2 is that ad click data cochain method flow provided by the embodiments of the present application and by means of block chain is illustrated
Figure;
Fig. 3 is the ad click data cochain device structure schematic diagram provided by the embodiments of the present application by means of block chain.
Specific embodiment
For the clearer general idea for illustrating the application, carry out in an illustrative manner with reference to the accompanying drawings of the specification detailed
It describes in detail bright.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Similar object, without being used to describe a particular order or precedence order.It should be understood that the sequence used in this way is in appropriate feelings
It can be interchanged under condition, so that the embodiment of the present invention described herein can be other than those of illustrating or describing herein
Sequence implement.
In addition, term " includes " and " having " and their any deformation, it is intended that covering non-exclusive includes example
Such as, the process, method, system, product or equipment for containing a series of steps or units those of are not necessarily limited to be clearly listed
Step or unit, but may include being not clearly listed or intrinsic for these process, methods, product or equipment other
Step or unit.
So-called block chain node and client in the embodiment of the present application, it can be understood as respond extraneous certain trigger item
Part, and the abstract machine that state is converted is done by certain rule, it can be mobile phone, tablet computer, palm PC, individual's PC computer etc.
It can be according to application software and the equipment that can be networked.
As shown in Figure 1, the method includes the steps S101- by means of the ad click data cochain method of block chain
S104。
S101, block chain node receive the ad click data cochain request that the first client is sent, the ad click
The request of data cochain includes first client public key.
S102, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of first client,
After verification passes through, the ad click data are encrypted with first client public key, and execute first client
Hold the cochain process of the ad click data of public key encryption.
S103, the block chain node receives the inquiry request of the ad click data of the second client, described wide
The inquiry request for accusing click data includes the second client public key.
S104, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of second client,
After verification passes through, the ad click data are encrypted with second client public key, and execute second client
Hold the cochain process of the ad click data of public key encryption.
In one example, the method also includes: the block chain node receives second client and sends advertisement
Click data inquiry request;
The block chain node sends ad click data query and responds to second client, the ad click number
It is investigated that the ad click data that response includes the encryption of the second client public key are ask, in order to the second client own private key
The ad click data of second client public key encryption are decrypted.
In one example, the ad click data are the corresponding user of first client in ad click platform
Operation data, including ad click content, ad click time and ad click number.
In one example, the first client own public key is to the ad click data encryption, specifically: institute
State the encryption that the first client carries out preset ratio with own public key to the ad click data.
In one example, the ad click data include relating attribute and dereferenced attribute;Wherein, the advertisement point
The attribute value for hitting data correlation attribute is superimposed automatically.
In above-mentioned example, operator of first client as ad click data, the second client is as ad click
The inquiry of data;For some specific ad click platform, every user either ad click data operator,
It is also possible to the inquiry of ad click data.
Below by taking Fig. 2 as an example, to the application be applied to block chain on ad click data cochain method flow into
Row explanation, this method includes S201-S209.
S201, the first client sends ad click data cochain and requests to give block chain node, in the ad click data
It include the first client public key in chain request.
S202, triggers the verification intelligence contract on block chain, the verification intelligence contract to the identity of first client into
Row verification, and the ad click data are encrypted with first client public key, and first client public key is encrypted
Ad click data execute cochain process.
Block chain node encrypts ad click data with the first client public key, which can be advertisement point
It hits data whole field to be encrypted, is also possible to encrypt the part field of the ad click data, such as: only to relating to
And the content of privacy is encrypted;It is also possible to not encrypt the ad click data.
In addition, the ad click data include being divided into two attribute, relating attribute and dereferenced attribute.Such as: Yong Huguang
It accuses and clicks the time, belong to dereferenced attribute, the ad click time of every user may be stored on block chain;Such as: certain
The click volume of a advertisement is exactly relating attribute, includes ad click amount in the data format of ad click, as long as there is ad click
The advertisement, the attribute value of the click volume of the advertisement can be superimposed automatically.
The verification refer to judge first client whether be the ad click platform user, the only ad click is flat
The user of platform, which can just have permission, carries out cochain for the ad click data.
It should be noted that upper chain process is the conventional process of this field, without being described in detail.Such as: in workload
It proves to be packaged data under PoW common recognition mode, verify, the block chain node for getting book keeping operation power can be by the packing block
It is placed on next block of current block, as new block cochain.
Ad click type includes cinema sign click, TV play ad click, prepare for the postgraduate qualifying examination ad click and mother and baby's advertisement
Click etc., user may be stored on chain in the data for clicking various advertisements, and can not distort, and guarantee the true of data
Property.To avoid appearance, the case where ad click platform arbitrarily increases ad click quantity;And then promote user experience.
S203, the block chain node send ad click data cochain and respond to first client.
S204, the second client send the ad click data inquiry request and give block chain node, the ad click data
Inquiry request includes second client public key.
At this point, the corresponding user of the second client can be after seeing the ad click data, to the ad click number
According to being inquired.The first client and the second client are all to be equipped with the terminal of decentralization application software to set in the application
It is standby, row information directly can be clicked through with the block chain link on block chain interact.
S205, triggers the verification intelligence contract on block chain, which carries out the identity of the second client
Verification encrypts the ad click data with second client public key after verification passes through, and second client is public
The ad click data of key encryption execute cochain process.
After verification passes through, process is performed the next step;Verification does not pass through, Flow ends.
S206, the block chain node sending advertisement click data inquiry response give the second client.
S207, the second client send ad click data inquiry request and give block chain node.
S208, the block chain node send ad click data query and respond to second client, the ad click number
It is investigated that asking the ad click data that response includes the encryption of the second client public key.
S209, the second client are solved with the ad click data that own private key encrypts second client public key
It is close, obtain the ad click data.
The application can allow the data cochain of ad click, and the cochain process is open and clear, same ad click platform
Any user can check the ad click data;It ensure that the authenticity of ad click data.
It should be noted that client is directly to carry out the interaction of information, block chain with the node of block chain in the application
Information is stored directly on block chain by node, not the server of centralization, so that allowing ad click data more to disclose can
Letter;Rather than existing client and the server of centralization interact.
As shown in figure 3, the equipment is block chain node, institute by means of the ad click data cochain equipment of block chain
Stating equipment includes receiving unit and processing unit.
The receiving unit receives the ad click data cochain request that the first client is sent, the ad click number
It include first client public key according to cochain request;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client
It is verified, after verification passes through, the ad click data is encrypted with first client public key, and described in execution
The cochain process of the ad click data of first client public key encryption;
The receiving unit receives the inquiry request of the ad click data of the second client, the ad click
The inquiry request of data includes the second client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of second client
It is verified, after verification passes through, the ad click data is encrypted with second client public key, and described in execution
The cochain process of the ad click data of second client public key encryption.
In one example, the equipment includes transmission unit;The receiving unit receives second client and sends
Ad click data inquiry request;
The transmission unit sends ad click data query and responds to second client, the ad click number
It is investigated that the ad click data that response includes the encryption of the second client public key are ask, in order to the second client own private key
The ad click data of second client public key encryption are decrypted.
In one example, the ad click data are the corresponding user of first client in ad click platform
Operation data, including ad click content, ad click time and ad click number.
In one example, the first client own public key is to the ad click data encryption, specifically: institute
State the encryption that the first client carries out preset ratio with own public key to the ad click data.
In one example, the ad click data include relating attribute and dereferenced attribute;Wherein, the advertisement point
The attribute value for hitting data correlation attribute is superimposed automatically.
The application can allow the data cochain of ad click, and the cochain process is open and clear, same ad click platform
Any user can check the ad click data;It ensure that the authenticity of ad click data.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure
Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate
The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description.
These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.
Professional technician can use different methods to achieve the described function each specific application, but this realization
It is not considered that exceeding scope of the present application.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (10)
1. by means of the ad click data cochain method of block chain, which is characterized in that the described method includes:
Block chain node receives the ad click data cochain request that the first client is sent, and the ad click data cochain is asked
It asks including first client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and verification passes through
Afterwards, the ad click data are encrypted with first client public key, and executes first client public key and adds
The cochain process of close ad click data;
The block chain node receives the inquiry request of the ad click data of the second client, the ad click data
Inquiry request include the second client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client, and verification passes through
Afterwards, the ad click data are encrypted with second client public key, and executes second client public key and adds
The cochain process of close ad click data.
2. the method according to claim 1, wherein the method also includes:
The block chain node receives second client and sends ad click data inquiry request;
The block chain node sends ad click data query and responds to second client, and the ad click data are looked into
The ad click data that response includes the encryption of the second client public key are ask, in order to which the second client own private key is to institute
The ad click data for stating the encryption of the second client public key are decrypted.
3. the method according to claim 1, wherein the ad click data are corresponding for first client
Operation data of the user in ad click platform, including ad click content, ad click time and ad click number.
4. the method according to claim 1, wherein the first client own public key is to the advertisement point
Data encryption is hit, specifically:
First client carries out the encryption of preset ratio with own public key to the ad click data.
5. the method according to claim 1, wherein the ad click data include relating attribute and dereferenced
Attribute;Wherein,
The attribute value of the ad click data correlation attribute is superimposed automatically.
6. by means of the ad click data cochain equipment of block chain, which is characterized in that the equipment is block chain node, described
Equipment includes receiving unit and processing unit;Wherein,
The receiving unit receives the ad click data cochain that the first client is sent and requests, in the ad click data
Chain request includes first client public key;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of first client
Verification encrypts the ad click data with first client public key, and execute described first after verification passes through
The cochain process of the ad click data of client public key encryption;
The receiving unit receives the inquiry request of the ad click data of the second client, the ad click data
Inquiry request include the second client public key;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of second client
Verification encrypts the ad click data with second client public key, and execute described second after verification passes through
The cochain process of the ad click data of client public key encryption.
7. equipment according to claim 6, which is characterized in that the equipment includes transmission unit;
The receiving unit receives second client and sends ad click data inquiry request;
The transmission unit sends ad click data query and responds to second client, and the ad click data are looked into
The ad click data that response includes the encryption of the second client public key are ask, in order to which the second client own private key is to institute
The ad click data for stating the encryption of the second client public key are decrypted.
8. equipment according to claim 6, which is characterized in that the ad click data are corresponding for first client
Operation data of the user in ad click platform, including ad click content, ad click time and ad click number.
9. equipment according to claim 6, which is characterized in that the first client own public key is to the advertisement point
Data encryption is hit, specifically:
First client carries out the encryption of preset ratio with own public key to the ad click data.
10. equipment according to claim 6, which is characterized in that the ad click data include relating attribute and non-pass
It is attribute;Wherein,
The attribute value of the ad click data correlation attribute is superimposed automatically.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910546949.4A CN110263560A (en) | 2019-06-24 | 2019-06-24 | By means of the ad click data cochain method and its equipment of block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910546949.4A CN110263560A (en) | 2019-06-24 | 2019-06-24 | By means of the ad click data cochain method and its equipment of block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110263560A true CN110263560A (en) | 2019-09-20 |
Family
ID=67920691
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910546949.4A Pending CN110263560A (en) | 2019-06-24 | 2019-06-24 | By means of the ad click data cochain method and its equipment of block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110263560A (en) |
-
2019
- 2019-06-24 CN CN201910546949.4A patent/CN110263560A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110401677A (en) | Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key | |
CN112199622A (en) | Page jump method, system and storage medium | |
CN110247918A (en) | Number cochain method and its equipment are shaken applied to block chain | |
CN110247923A (en) | Number cochain method and its equipment are shaken based on block chain | |
CN110263563A (en) | By means of the ad click data cochain method and its equipment of block chain | |
CN110266698A (en) | Pass through the Knowledge Sharing data cochain method and its equipment of block chain | |
CN110232287A (en) | Pass through the shared economic data cochain method and its equipment of block chain | |
CN110263529A (en) | Number cochain method and its equipment are shaken using intelligent contract | |
CN110263100A (en) | Using the shared economic data cochain method and its equipment of intelligent contract | |
CN110266696A (en) | A kind of evaluation data cochain method and its equipment applied to block chain | |
CN110247921A (en) | A kind of polled data cochain method and its equipment for applying intelligent contract | |
JP2022501671A (en) | Improve data integrity with trusted code proof tokens | |
CN110278270A (en) | A kind of polled data cochain method and its equipment based on block chain | |
CN110213294A (en) | By means of the community data cochain method and its equipment of block chain | |
CN110263560A (en) | By means of the ad click data cochain method and its equipment of block chain | |
CN110266699A (en) | Prize drawing data cochain method and its equipment applied to block chain | |
JP7250112B2 (en) | Using crowdsourcing to combat disinformation | |
CN110245512A (en) | Lottery data cochain method and its equipment applied to block chain | |
CN110233853A (en) | It is a kind of to thumb up data cochain method and its equipment applied to block chain | |
CN110233852A (en) | Prize drawing data cochain method and its equipment based on block chain | |
CN110263269A (en) | By means of the ad click data cochain method and its equipment of intelligent contract | |
CN111125734B (en) | Data processing method and system | |
CN110266691A (en) | Credit data cochain method and its equipment based on block chain | |
CN110213296A (en) | It is a kind of that data cochain method and its equipment are thumbed up based on block chain | |
CN110264205A (en) | A kind of electric quotient data cochain method and its equipment applied to block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication |