CN110266648A - Data capture method, server and computer storage medium based on alliance's chain - Google Patents

Data capture method, server and computer storage medium based on alliance's chain Download PDF

Info

Publication number
CN110266648A
CN110266648A CN201910431685.8A CN201910431685A CN110266648A CN 110266648 A CN110266648 A CN 110266648A CN 201910431685 A CN201910431685 A CN 201910431685A CN 110266648 A CN110266648 A CN 110266648A
Authority
CN
China
Prior art keywords
node
chain
mentioned
data
alliance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910431685.8A
Other languages
Chinese (zh)
Inventor
陈子豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201910431685.8A priority Critical patent/CN110266648A/en
Publication of CN110266648A publication Critical patent/CN110266648A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs

Abstract

The embodiment of the present application discloses a kind of data capture method based on alliance's chain, server and computer-readable medium, it is related to block storage system and block data structures technology, wherein method includes: to receive the data sharing request from first node, the data sharing request carries first node information and target information abstract, and the target information abstract includes the Data Identification and source-information for the target data that the first node is shared;According to the first node information and default proof rule, judge whether the first node has the shared information permission in alliance's chain;If having, the target information abstract is broadcasted in the main chain of alliance's chain, can increase data acquisition source, reduce the cost of data acquisition and data maintenance.

Description

Data capture method, server and computer storage medium based on alliance's chain
Technical field
This application involves alliance's chain technical field more particularly to a kind of data capture methods based on alliance's chain, server And computer storage medium.
Background technique
Reference is to acquire, arrange in accordance with the law, saving, processing the credit information of natural person, legal person and its hetero-organization, and externally mentioning For services such as credit report, credit evaluation, credit information consultings, client's judgement, control credit risk are helped, credit management is carried out Activity, it provides the shared platform of credit information for specialized credit mechanism.
Currently, credit investigation system centralization, generally obtains reference report, number by people's row reference or main strategies mechanism More single according to source, procurement cost is high.In addition, other need the enterprise and mechanism of certain data, it also can not be safely and effectively It collects, arrange data.
Summary of the invention
The embodiment of the present application provides a kind of data capture method based on alliance's chain, server and computer-readable medium, It is related to block storage system and block data structures technology, data acquisition source can be increased, reduces data acquisition and data dimension The cost of shield.
In a first aspect, the embodiment of the present application provides a kind of data capture method based on alliance's chain, it is applied to server, The described method includes:
The data sharing request from first node is received, the data sharing request carries first node information and target Informative abstract, the target information abstract include the Data Identification and source letter for the target data that the first node is shared Breath;
According to the first node information and default proof rule, judge whether the first node has in alliance's chain Shared information permission;
If having, the target information abstract is broadcasted in the main chain of alliance's chain.
As a kind of possible embodiment, the first node information includes first node address;It is described according to First node information and default proof rule, judge whether the first node has the shared information permission packet in alliance's chain It includes:
Judge the white list address whether the first node address belongs in the default proof rule;
If belonging to, the first node has the shared information permission in alliance's chain;If being not belonging to, the first segment Point does not have the shared information permission in alliance's chain.
As a kind of possible embodiment, the method also includes:
When the first node address is not belonging to the white list address in the default proof rule, obtain and described first The associated verifying address of node of node;
The shared authentication to the first node is sent to the verifying node according to the verifying address of node to request;
When receiving from the confirmation instruction that the verifying node requests the shared authentication, the first segment is determined Point has the shared information permission in alliance's chain;Verify what node requested the shared authentication from described receiving When refusal instruction, determine that the first node does not have the shared information permission in alliance's chain.
As a kind of possible embodiment, described before receiving the data sharing request from first node, it is described Method further include:
It receives the addition to alliance's chain from the first node to request, the addition request includes described first Nodal information;
Determine that the node type of the first node, the node type include enterprise's section according to the first node information Point, credit information service's node and government organs' node;
The corresponding node rule for application of node type for obtaining the first node, according to institute's node rule for application to described First node carries out authentication;
If the authentication passes through, the shared information permission of alliance's chain is opened for the first node.
As a kind of possible embodiment, the method also includes:
The data acquisition request from second node is received, the data acquisition request carries the Data Identification;
Determine that the corresponding target information abstract, Xiang Suoshu second node send the target according to the Data Identification Informative abstract.
As a kind of possible embodiment, the method also includes:
The data analysis request from the second node is received, the data analysis request carries the Data Identification;
Data analysis node into alliance's chain, which is sent, carries the Data Identification and the second node address The data analysis instructions, the data analysis instructions analyze the target data for the data analysis node.
As a kind of possible embodiment, the main chain of alliance's chain is realized based on super account book Project Technical.
Second aspect, the embodiment of the present application provide a kind of server, comprising: transmission module, judgment module and broadcast mould Block, in which:
The transmission module, for receiving the data sharing request from first node, the data sharing request is carried First node information and target information abstract, the target information abstract include the target data that the first node is shared Data Identification and source-information;
The judgment module, for judging the first node according to the first node information and default proof rule Whether shared information permission in alliance chain is had;
The broadcast module, if having the shared information permission in alliance's chain for the first node, described The target information abstract is broadcasted in the main chain of alliance's chain.
The third aspect, the embodiment of the present application also provides a kind of servers, including processor, input equipment, output equipment And memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing Computer program, the computer program include program instruction, and the processor is configured for calling described program instruction, are held Method of the row as described in first aspect and its any possible embodiment.
Fourth aspect, the embodiment of the present application provide a kind of computer storage medium, the computer storage medium storage There is computer program, the computer program includes program instruction, and described program instruction makes the place when being executed by a processor The method that reason device executes above-mentioned first aspect and its any possible embodiment.
The embodiment of the present application is by receiving the data sharing request from first node, wherein above-mentioned data sharing request First node information and target information abstract are carried, above-mentioned target information abstract includes the number of targets that above-mentioned first node is shared According to Data Identification and source-information judge above-mentioned first node further according to above-mentioned first node information and default proof rule Whether shared information permission in alliance chain is had, if having, the broadcast them target information in the main chain of above-mentioned alliance's chain Abstract, is made a summary by above-mentioned target information, and the node in alliance's chain can determine data source and then obtain target data To increase data acquisition source, and safety is higher, reduces the cost of data acquisition and data maintenance.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description Attached drawing is briefly described.
Fig. 1 is a kind of flow diagram of data capture method based on alliance's chain provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram for data capture method based on alliance's chain that another embodiment of the application provides;
Fig. 3 is a kind of structural schematic diagram of server provided by the embodiments of the present application;
Fig. 4 is the structural schematic diagram of another server provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Herein " embodiment " is referred to it is meant that a particular feature, structure, or characteristic described may be embodied in the application at least in conjunction with the embodiments In one embodiment.The phrase, which occurs, in each position in the description might not each mean identical embodiment, nor With the independent or alternative embodiment of other embodiments mutual exclusion.Those skilled in the art explicitly and implicitly understand, Embodiment described herein can be combined with other embodiments.
Based on the embodiment in the application, those of ordinary skill in the art are obtained without making creative work The every other embodiment obtained, shall fall in the protection scope of this application.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap Include other step or units intrinsic for these process, methods, product or equipment.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment And be not intended to limit the application.As present specification and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to more fully understand the embodiment of the present application, will be situated between below to the method for application the embodiment of the present application It continues.
The terminal device mentioned in the embodiment of the present application is the equipment that can be communicated with server, above-mentioned server Claim servomechanism, is to provide the equipment of the service of calculating, can permit multiple terminal devices and access.Above-mentioned terminal device can be Mobile terminal including the various handheld devices with wireless communication function, wearable device, calculates equipment or is connected to wireless tune Other processing equipments of modulator-demodulator and various forms of user equipmenies (User Equipment, UE), mobile station (Mobile Station, MS) etc..
It referring to Figure 1, is a kind of exemplary flow of data capture method based on alliance's chain provided by the embodiments of the present application Figure, this method as shown in Figure 1 can include:
101, receive the data sharing request from first node, above-mentioned data sharing request carry first node information and Target information abstract, above-mentioned target information abstract include Data Identification and the source for the target data that above-mentioned first node is shared Information.
Executing subject in the embodiment of the present application can be the main chain node in alliance's chain, can be above-mentioned server, or Person is known as main chain server.Above-mentioned main chain server realizes that the data of other nodes are total it can be appreciated that data sharing platform It enjoys.
Alliance's chain, member and limited third party just for some special group, inside specify multiple preselected nodes For the people that keeps accounts, each piece of generation is codetermined by all preselected nodes.
Generally according to the difference of alliance's chain network centralization degree, alliance's chain under 3 kinds of different application scenes is differentiated:
(1) the whole network discloses, the block chain of no user licensing scheme, referred to as publicly-owned chain;
(2) network is added in the node for allowing to authorize, and information can be checked according to permission, is often used for inter-agency block Chain, referred to as alliance's chain or industry chain;
(3) node in all-network all rests in a mechanism hand, referred to as privately owned chain.
Alliance's chain and privately owned chain also referred to collectively as permit chain, publicly-owned chain to be known as unlicensed chain.
Alliance's chain in the embodiment of the present application can be understood as above-mentioned second situation, and the executing subject of this method can be Main chain server in alliance's chain.
Each node in above-mentioned alliance's chain can have the database of oneself, data sharing chain node and corresponding side Chain node.
Node in alliance's chain can upload data and be shared, specifically, in the case where needing shared data, first Node can send above-mentioned data sharing request by chain linked to owner server first, and above-mentioned data sharing request can be made by user's operation It is triggered for the terminal device of first node.
The first node information that above-mentioned data sharing request carries can be understood as the essential information of the first node, above-mentioned First node information may include first node mark, for determining first node identity, for example may include that first node is compiled Number, first node address, one of first node title or a variety of, and may include the authentication information of first node Deng.
Informative abstract in the embodiment of the present application can be understood as the corresponding relationship of data and data source, i.e., a kind of data The catalogue of acquisition modes.
Above-mentioned target information abstract may include Data Identification and the source for the target data that above-mentioned first node is shared Information, above-mentioned Data Identification are determined for target data, provider, that is, data of the i.e. target data of above-mentioned source-information Source Nodes can be the data source node label or data source node address of the target data.Wherein, above-mentioned source Node can be the first node, i.e. the first node directly uploads the data of oneself shared, optionally, the source Nodes It can be other nodes in alliance's chain, data sharing carried out by the first node.
Above-mentioned target information abstract can be before first node initiates above-mentioned data sharing request, by above-mentioned data source Node generates.Main chain server can execute step 102 in the case where receiving above-mentioned data sharing request.
Optionally, before step 101, this method further include:
It receives the addition to above-mentioned alliance's chain from above-mentioned first node to request, above-mentioned addition request includes above-mentioned first Nodal information;
Determine that the node type of above-mentioned first node, above-mentioned node type include enterprise's section according to above-mentioned first node information Point, credit information service's node and government organs' node;
The corresponding node rule for application of node type for obtaining above-mentioned first node, according to institute's node rule for application to above-mentioned First node carries out authentication;
If above-mentioned authentication passes through, the above-mentioned shared information permission of above-mentioned alliance's chain is opened for above-mentioned first node.
Alliance's chain can permit the addition of node and exit, wherein node type may include: enterprise's node (as interconnected Net financing corporation, business bank, payment platform, insurance company, securities broker company, room hand over institute etc.), credit information service's node (such as people's row Reference, main strategies mechanism) and government organs' node etc..
Specifically, can be sent to the main chain server of alliance's chain when first node is not belonging to the node in alliance's chain On the addition of above-mentioned alliance's chain is requested, above-mentioned addition request includes above-mentioned first node information, receives to come in main chain server From after the addition request to above-mentioned alliance's chain of above-mentioned first node, above-mentioned first can be determined according to above-mentioned first node information The node type of node.The node identification for including in available above-mentioned first node information, according to the node identification that prestores with The corresponding relationship of node type determines that the corresponding node type of node identification obtained is the node type of the node, and main chain In can also be stored with the corresponding relationship of at least one node rule for application and node type and node rule for application, then into One step, the corresponding node rule for application of the node type of available above-mentioned first node, further according to the node application of acquisition Rule carries out authentication to above-mentioned first node.
Optionally, above-mentioned verification process can also be executed by the authorization node in alliance's chain.Above-mentioned authentication can wrap Include digital signature, node-agent people biological information, the node scoring for verifying the node, node historic transmission record or node storage Data volume etc., herein with no restrictions.
102, according to above-mentioned first node information and default proof rule, judge whether above-mentioned first node has alliance's chain In shared information permission.
Above-mentioned default proof rule is can store in main chain server, for verifying whether first node has the alliance Shared information permission in chain.After receiving above-mentioned data sharing request, in available data sharing request the One nodal information to determine first node, and then is audited above-mentioned first node information according to above-mentioned default proof rule, Judge whether the first node can provide shared data.
Above-mentioned default proof rule, which can be, is added the proof rule that the part of nodes of alliance's chain is reached common understanding in advance, should It may include the verification mode to the node of data transmission, data sharing under different situations in default proof rule, specifically, For example judge whether the first node has the shared information power in alliance's chain by judging the node type of first node Limit, part of nodes type have above-mentioned shared information permission, and part of nodes type does not have above-mentioned shared information permission;It can be with The node is audited based on node level whether have in above-mentioned shared information permission, such as alliance's chain be previously stored with first Permission threshold value just has above-mentioned shared information permission when the node level of first node is higher than above-mentioned first threshold, when first The node level of node does not have above-mentioned shared information permission etc. then when being not higher than above-mentioned first threshold.
Optionally, above-mentioned first node information includes first node address;It is above-mentioned according to above-mentioned first node information and pre- If proof rule, judge whether above-mentioned first node has the shared information permission in alliance's chain and include:
Judge the white list address whether above-mentioned first node address belongs in above-mentioned default proof rule;
If belonging to, above-mentioned first node has the shared information permission in above-mentioned alliance's chain;If being not belonging to, above-mentioned first segment Point does not have the shared information permission in above-mentioned alliance's chain.
If above-mentioned first node has the shared information permission in above-mentioned alliance's chain, step 103 can be executed.
103, broadcast them target information is made a summary in the main chain of above-mentioned alliance's chain.
Specifically, the node in above-mentioned alliance's chain can have local database, but the mode of shared data is not that will count According to directly upload, but data to be shared can be generated into informative abstract, then be uploaded to store in main chain and issue in other words.
Broadcast (Broadcasting) is the most common form of multicast, it delivers one point to each point of destination The copy of group.It can be completed by the delivery that multiple singles are grouped, the copy that can also be grouped by individually connecting transmitting, Until each recipient receives a copy.It by way of broadcast, obtain the node in alliance's chain can Take the mode of the target data, but it is different establish a capital to have permission obtain the target data, can also be according to other verification modes It could be obtained after being verified, to improve safety.It is not directly to add data change each time in the embodiment of the present application Close broadcast, but generate one be similar to informative abstract encryption string broadcast, data can be made even be decrypted (certainly this It is almost impossible) any private data will not be revealed.
It is made a summary by above- mentioned information, can determine the source (node) of data.Such as the data a of A nodes sharing, data Source-information in the A node address can be provided.
Optionally, this method further include:
The data acquisition request from second node is received, above-mentioned data acquisition request carries above-mentioned Data Identification;
Determine that corresponding above-mentioned target information abstract, Xiang Shangshu second node send above-mentioned target according to above-mentioned Data Identification Informative abstract.
In the main chain of alliance's chain, it can store multiple above- mentioned information abstracts, that is, have the section of above-mentioned shared information permission Point can be carried out data sharing.
Above-mentioned target information abstract can store in main chain, and above-mentioned second node can be that first is removed in above-mentioned alliance's chain Node other than node, and when above-mentioned second node needs to obtain shared target data, it is only necessary to believed according to above-mentioned target The source-information of digest challenge shared data is ceased, determines the source Nodes obtained, then send data acquisition to the source Nodes and ask It asks.
In the case where above-mentioned second node did not received above-mentioned target information abstract, can be sent out with chain linked to owner server It serves and states data acquisition request, including the Data Identification of target data to be obtained, receive in primary server from It is available to above-mentioned Data Identification corresponding target information abstract when the data acquisition request of two nodes, then to above-mentioned second Node sends above-mentioned target information abstract, then second node can be mentioned according to the determination of the source-information in the eap-message digest received For the node (address) of data, apply obtaining target data to it.
Optionally, after node gets above-mentioned shared target data, target data can be integrated, then deposit Enter the local data base of the node, voluntarily can obtain and check later.
The embodiment of the present application is by receiving the data sharing request from first node, wherein above-mentioned data sharing request First node information and target information abstract are carried, above-mentioned target information abstract includes the number of targets that above-mentioned first node is shared According to Data Identification and source-information judge above-mentioned first node further according to above-mentioned first node information and default proof rule Whether shared information permission in alliance chain is had, if having, the broadcast them target information in the main chain of above-mentioned alliance's chain Abstract, is made a summary by above-mentioned target information, and the node in alliance's chain can determine data source and then obtain target data To increase data acquisition source, and safety is higher, reduces the cost of data acquisition and data maintenance.
It referring to fig. 2, is the exemplary flow of another data capture method based on alliance's chain provided by the embodiments of the present application Figure, embodiment shown in Fig. 2, which can be, to be obtained on the basis of embodiment shown in Fig. 1, and this method as shown in Figure 2 can wrap It includes:
201, receive the data sharing request from first node, above-mentioned data sharing request carry first node information and Target information abstract, above-mentioned target information abstract include Data Identification and the source for the target data that above-mentioned first node is shared Information.
Wherein, above-mentioned steps 201 can refer to the specific descriptions in the step 101 of embodiment illustrated in fig. 1, no longer superfluous herein It states.
202, judge the white list address whether above-mentioned first node address belongs in above-mentioned default proof rule.
The default proof rule stored in alliance's chain may include that at least one allows the node address of shared data, I.e. above-mentioned white list address, above-mentioned white list address can preset, can also modify, by some or all of in alliance's chain Node is reached common understanding, and is having node that can first carry out node audit and authentication when above-mentioned white list address is added.
In the data sharing request for receiving first node, first node can be obtained from above-mentioned first node information Address judges that the white list address whether above-mentioned first node address belongs in above-mentioned default proof rule can be held if belonging to Row step 203;If being not belonging to, which does not have shared information permission, does not execute step 203, can execute step 204。
203, broadcast them target information is made a summary in the main chain of above-mentioned alliance's chain.
Wherein, above-mentioned steps 203 can refer to the specific descriptions in the step 103 of embodiment illustrated in fig. 1, no longer superfluous herein It states.
Step 207 can also be performed after step 203.
204, acquisition and the associated verifying address of node of above-mentioned first node, it is upward according to above-mentioned verifying address of node The shared authentication that verifying node is sent to above-mentioned first node is stated to request.
It, can also be to the node when stating the white list address that first node address is not belonging in above-mentioned default proof rule It is verified, if being verified still can carry out data acquisition.Specifically, node association letter can also be stored in alliance's chain Breath, the i.e. information with the associated verifying node of above-mentioned first node, include mainly the verifying address of node, main chain server can With acquisition and the associated verifying address of node of above-mentioned first node, and then can send to above-mentioned verifying node to above-mentioned first The shared authentication of node is requested, and above-mentioned verifying node can be one or more.
After receiving the request of the shared authentication to above-mentioned first node, verifying node can determine above-mentioned first node energy No this data sharing of progress, such as above-mentioned verifying node can be above-mentioned credit information service, government.Specifically, can be the verifying User's manual operation of node judges, can also be examined based on pre-set judgment rule the first node Core, then make decision, it can be requested by sending confirmation instruction or refusal, execute step 205, step 206 respectively.
205, when receiving the confirmation requested from above-mentioned verifying node to above-mentioned shared authentication and instructing, above-mentioned the is determined One node has the shared information permission in above-mentioned alliance's chain.
When above-mentioned first node has the shared information permission in above-mentioned alliance's chain, step 203 can be executed.
206, when receiving the refusal requested from above-mentioned verifying node to above-mentioned shared authentication and instructing, above-mentioned the is determined One node does not have the shared information permission in above-mentioned alliance's chain.
For step 205 and step 206, it should be noted that, can in the case where above-mentioned verifying node is at least two When all sending confirmation request to need all to verify node, above-mentioned first node just has the shared information permission in alliance's chain, It is also possible to be judged according to the verifying regulation that preparatory verifying node is reached common understanding, such as the regulation original that the minority is subordinate to the majority Then, first node is determined as long as the verifying number of nodes for sending confirmation instruction is greater than the verifying number of nodes for sending refusal instruction Has the shared information permission in alliance's chain.
207, the data analysis request from above-mentioned second node is received, above-mentioned data analysis request carries above-mentioned data mark Know.
Above-mentioned second node can be the node in above-mentioned alliance's chain in addition to first node, can request in alliance's chain Data are obtained, since main chain can provide big data analysis interface simultaneously, second node can also request to analyze data. It can be communicated with data analysis node by the above-mentioned big data interface, above-mentioned data analysis node can be used as the spy of alliance's chain Different node, can be different with the permission of other nodes.
The main chain server of alliance's chain after receiving the data analysis request from above-mentioned second node, it is available on Data Identification is stated, the data analysis instructions for carrying above-mentioned Data Identification and above-mentioned second node address are generated, executes step 208.
208, the data analysis node in Xiang Shangshu alliance chain is sent with carrying above-mentioned Data Identification and above-mentioned second node The above-mentioned data analysis instructions of location, above-mentioned data analysis instructions divide above-mentioned target data for above-mentioned data analysis node Analysis.
Can be understood as main chain server can forward the data analysis request of second node, Xiang Shangshu data analysis node Above-mentioned data analysis instructions are sent, analyze above-mentioned data analysis node to target data.Specifically, data analysis node On can be deployed with data analysis algorithm, can also according to above-mentioned Data Identification obtain target data abstract, obtain target data Carry out data analysis.Optionally, after completing data analysis, data analysis result can be sent to second node, it can also be with It is to be forwarded based on main chain server to the second node.It can be connected to data silo by this method, and more data can be obtained Source, and then data analysis is safely and accurately completed, real big data analysis can be created based on data sharing platform.
The main chain of alliance's chain of the embodiment of the present application can ((Hyperledger) Project Technical be realized based on super account book. Super account book is the open source projects for being intended to push the inter-trade application of block chain.It provides a modular framework, frame The execution (being known as " chaincode " in Fabric project) of node, intelligent contract in structure and configurable common recognition and member Service.One Fabric network includes that companion's node (" Peer nodes ") executes chaincode contract, accesses account book data, The interface of endorsement transaction and referred to as application program.Mandator node (" Orderer nodes ") is responsible for ensuring the one of this block chain Cause property simultaneously conveys the transaction endorsed to the companions in network;And MSP service, mainly as certificate authority X.509 certificate is used to verify member identities and role for (Certificate Authority) management.It, can based on super account book There are at least four class special joints: endorsement node, confirmation node, ordering joint, certificate node.
Alliance's chain in the embodiment of the present application can carry out intelligent contract exploitation based on Go or Java, and the above method can be with Intelligent contract is written to realize, all kinds of nodes is set, message is broadcasted, sort, know together, is confirmed and is write on chain.Wherein authenticate Node (above-mentioned verifying node) and authorization node may be implemented certain nodes and form a small-sized cluster, be carried out using encrypted tunnel Communication interaction, and other lack of competence nodes can not then participate in interacting, and increase safety, the flexibility of data transmission.
It in the embodiment of the present application, is requested by receiving the data sharing from first node, above-mentioned data sharing request is taken Band first node information and target information are made a summary, and above-mentioned target information abstract includes the target data that above-mentioned first node is shared Data Identification and source-information, with judging the white list whether above-mentioned first node address belongs in above-mentioned default proof rule Location, if so, broadcast them target information can make a summary in the main chain of above-mentioned alliance's chain, if it is not, available with above-mentioned the The associated verifying address of node of one node is sent to above-mentioned verifying node to above-mentioned first according to above-mentioned verifying address of node The shared authentication of node is requested, when receiving from the confirmation instruction that above-mentioned verifying node requests above-mentioned shared authentication, really Fixed above-mentioned first node has the shared information permission in above-mentioned alliance's chain, can in the main chain of above-mentioned alliance's chain broadcast them Target information abstract, and when receiving from the refusal instruction that above-mentioned verifying node requests above-mentioned shared authentication, in determination State first node and do not have shared information permission in above-mentioned alliance's chain, can not in the main chain of above-mentioned alliance's chain broadcast them Target information abstract, is made a summary by above-mentioned target information, and the node in alliance's chain can determine data source and then obtain target Data, it can increase data acquisition source, and safety is higher, reduce the cost of data acquisition and data maintenance.Also, Can receive the data analysis request from above-mentioned second node, above-mentioned data analysis request carries above-mentioned Data Identification, then to Data analysis node in above-mentioned alliance's chain sends the above-mentioned data point for carrying above-mentioned Data Identification and above-mentioned second node address Analysis instruction, above-mentioned data analysis instructions analyze above-mentioned target data for above-mentioned data analysis node, can be based on number Real big data analysis is created according to shared platform, not only ensure that privacy, but also realizes data sharing and analysis integration.
It is above-mentioned that mainly the scheme of the embodiment of the present application is described from the angle of method side implementation procedure.It is understood that , in order to realize the above functions, it comprises execute the corresponding hardware configuration of each function and/or software mould for electronic equipment Block.Those skilled in the art should be readily appreciated that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, the present invention can be realized with the combining form of hardware or hardware and computer software.Some function actually with Hardware or computer software drive the mode of hardware to execute, the specific application and design constraint item depending on technical solution Part.Professional technician can be to specifically realizing described function using distinct methods, but this realization is not It is considered as beyond the scope of this invention.
The embodiment of the present application can carry out the division of functional module according to above method example to electronic equipment, for example, can With each functional module of each function division of correspondence, two or more functions can also be integrated in a processing module In.Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It needs It is noted that be schematical, only a kind of logical function partition to the division of module in the embodiment of the present application, it is practical real It is current that there may be another division manner.
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of server provided by the embodiments of the present application, the server 300 packet Include transmission module 310, judgment module 320 and broadcast module 330, in which:
Above-mentioned transmission module 310, for receiving the data sharing request from first node, above-mentioned data sharing request is taken Band first node information and target information are made a summary, and above-mentioned target information abstract includes the target data that above-mentioned first node is shared Data Identification and source-information;
Above-mentioned judgment module 320, for judging above-mentioned first segment according to above-mentioned first node information and default proof rule Whether point has the shared information permission in alliance's chain;
Above-mentioned broadcast module 330, if having the shared information permission in above-mentioned alliance's chain for above-mentioned first node, upper Broadcast them target information in the main chain of alliance's chain is stated to make a summary.
Optionally, above-mentioned first node information includes first node address;Above-mentioned judgment module 320, is specifically used for:
Judge the white list address whether above-mentioned first node address belongs in above-mentioned default proof rule;
If belonging to, judge that above-mentioned first node has the shared information permission in above-mentioned alliance's chain;If being not belonging to, in judgement It states first node and does not have shared information permission in above-mentioned alliance's chain.
Optionally, above-mentioned server 300 further includes obtaining module 340, for being not belonging in above-mentioned first node address When stating the white list address in default proof rule, obtain and the associated verifying address of node of above-mentioned first node;
Above-mentioned transmission module 310 is also used to, and is sent to above-mentioned verifying node to above-mentioned according to above-mentioned verifying address of node The shared authentication of first node is requested;
Above-mentioned judgment module 320 is specifically used for:
It receives in above-mentioned transmission module 310 and the confirmation that above-mentioned shared authentication is requested is instructed from above-mentioned verifying node When, determine that above-mentioned first node has the shared information permission in above-mentioned alliance's chain;It receives and comes from above-mentioned transmission module 310 When above-mentioned verifying node instructs the refusal that above-mentioned shared authentication is requested, determine that above-mentioned first node does not have in above-mentioned alliance's chain Shared information permission.
Optionally, above-mentioned server 300 further includes authentication module 350;
Above-mentioned transmission module 310 is also used to, and is received the addition to above-mentioned alliance's chain from above-mentioned first node and is requested, on Stating addition request includes above-mentioned first node information;
Above-mentioned authentication module 350 is used for:
Determine that the node type of above-mentioned first node, above-mentioned node type include enterprise's section according to above-mentioned first node information Point, credit information service's node and government organs' node;
The corresponding node rule for application of node type for obtaining above-mentioned first node, according to institute's node rule for application to above-mentioned First node carries out authentication;
If above-mentioned authentication passes through, the above-mentioned shared information permission of above-mentioned alliance's chain is opened for above-mentioned first node.
Optionally, above-mentioned transmission module 310 is also used to:
The data acquisition request from second node is received, above-mentioned data acquisition request carries above-mentioned Data Identification;
Determine that corresponding above-mentioned target information abstract, Xiang Shangshu second node send above-mentioned target according to above-mentioned Data Identification Informative abstract.
Optionally, above-mentioned transmission module 310 is also used to:
The data analysis request from above-mentioned second node is received, above-mentioned data analysis request carries above-mentioned Data Identification;
Data analysis node into above-mentioned alliance's chain, which is sent, carries above-mentioned Data Identification and above-mentioned second node address Above-mentioned data analysis instructions, above-mentioned data analysis instructions analyze above-mentioned target data for above-mentioned data analysis node.
Optionally, the main chain of above-mentioned alliance's chain is realized based on super account book Project Technical.
According to the specific embodiment of the embodiment of the present application, Fig. 1 and the data capture method shown in Fig. 2 based on alliance's chain The step 101 being related to~103,201~208 modules that can be in server 300 as shown in Figure 3 are performed.Example Such as, step 101~103 in Fig. 1 can transmission module 310, judgment module 320 as shown in Fig. 3 and broadcast module respectively 330 execute.
By the server 300 of the embodiment of the present application, server 300 can be total by receiving the data from first node Enjoy request, wherein above-mentioned data sharing request carries first node information and target information abstract, above-mentioned target information abstract packet The Data Identification and source-information for including the target data that above-mentioned first node is shared, further according to above-mentioned first node information and in advance If proof rule, judge whether above-mentioned first node has the shared information permission in alliance's chain, if having, in above-mentioned alliance Broadcast them target information is made a summary in the main chain of chain, is made a summary by above-mentioned target information, the node in alliance's chain can determine number According to source and then obtain target data, it can increase data acquisition source, and safety is higher, reduce data acquisition sum number According to the cost of maintenance.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another kind server disclosed in the embodiment of the present application.As shown in figure 4, The server 400 includes processor 401 and memory 402, wherein server 400 can also include bus 403, processor 401 It can be connected with each other by bus 403 with memory 402, bus 403 can be Peripheral Component Interconnect standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..Bus 403 can be divided into address bus, data/address bus, control bus etc..For convenient for table Show, only indicated with a thick line in Fig. 4, it is not intended that an only bus or a type of bus.Wherein, server 400 can also include input-output equipment 404, and input-output equipment 404 may include display screen, such as liquid crystal display.It deposits Reservoir 402 is used to store one or more programs comprising instruction;Processor 401 is stored in memory 402 for calling Method and step some or all of is mentioned in the above-mentioned Fig. 1 and Fig. 2 embodiment of instruction execution.
It should be appreciated that in the embodiment of the present application, alleged processor 401 can be central processing unit (Central Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at Reason device is also possible to any conventional processor etc..
Input equipment 402 may include that Trackpad, fingerprint adopt sensor (for acquiring the finger print information and fingerprint of user Directional information), microphone etc., output equipment 403 may include display (LCD etc.), loudspeaker etc..
The memory 404 may include read-only memory and random access memory, and to processor 401 provide instruction and Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited Store up the information of device type.
By the server 400 of the embodiment of the present application, server 400 can be total by receiving the data from first node Enjoy request, wherein above-mentioned data sharing request carries first node information and target information abstract, above-mentioned target information abstract packet The Data Identification and source-information for including the target data that above-mentioned first node is shared, further according to above-mentioned first node information and in advance If proof rule, judge whether above-mentioned first node has the shared information permission in alliance's chain, if having, in above-mentioned alliance Broadcast them target information is made a summary in the main chain of chain, is made a summary by above-mentioned target information, the node in alliance's chain can determine number According to source and then obtain target data, it can increase data acquisition source, and safety is higher, reduce data acquisition sum number According to the cost of maintenance.
The embodiment of the present application also provides a kind of computer storage medium, wherein computer storage medium storage is for electricity The computer program of subdata exchange, it is as any in recorded in above method embodiment which execute computer A kind of some or all of the data capture method based on alliance's chain step.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, it is only a kind of Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or module, It can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
If the integrated module is realized in the form of software function module and sells or use as independent product When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment (can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention Step.And memory above-mentioned includes: USB flash disk, read-only memory (Read-Only Memory, ROM), random access memory The various media that can store program code such as (Random Access Memory, RAM), mobile hard disk, magnetic or disk.

Claims (10)

1. a kind of data capture method based on alliance's chain is applied to server, which is characterized in that the described method includes:
The data sharing request from first node is received, the data sharing request carries first node information and target information Abstract, the target information abstract include the Data Identification and source-information for the target data that the first node is shared;
According to the first node information and default proof rule, it is shared in alliance's chain to judge whether the first node has Information permission;
If having, the target information abstract is broadcasted in the main chain of alliance's chain.
2. the method according to claim 1, wherein the first node information includes first node address;Institute It states and judges whether the first node has the shared letter in alliance's chain according to the first node information and default proof rule Ceasing permission includes:
Judge the white list address whether the first node address belongs in the default proof rule;
If belonging to, the first node has the shared information permission in alliance's chain;If being not belonging to, the first node is not Has the shared information permission in alliance's chain.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
When the first node address is not belonging to the white list address in the default proof rule, obtain and the first node Associated verifying address of node;
The shared authentication to the first node is sent to the verifying node according to the verifying address of node to request;
When receiving from the confirmation instruction that the verifying node requests the shared authentication, the first node tool is determined Shared information permission in standby alliance's chain;Receiving the refusal requested from the verifying node the shared authentication When instruction, determine that the first node does not have the shared information permission in alliance's chain.
4. according to the method described in claim 3, it is characterized in that, described receiving the data sharing request from first node Before, the method also includes:
It receives the addition to alliance's chain from the first node to request, the addition request includes the first node Information;
Determine the node type of the first node according to the first node information, the node type include enterprise's node, Credit information service's node and government organs' node;
The corresponding node rule for application of node type for obtaining the first node, according to institute's node rule for application to described first Node carries out authentication;
If the authentication passes through, the shared information permission of alliance's chain is opened for the first node.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
The data acquisition request from second node is received, the data acquisition request carries the Data Identification;
Determine that the corresponding target information abstract, Xiang Suoshu second node send the target information according to the Data Identification Abstract.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
The data analysis request from the second node is received, the data analysis request carries the Data Identification;
Data analysis node into alliance's chain, which is sent, to be carried described in the Data Identification and the second node address Data analysis instructions, the data analysis instructions analyze the target data for the data analysis node.
7. method according to claim 5 or 6, which is characterized in that the main chain of alliance's chain is based on super account book project Technology is realized.
8. a kind of server characterized by comprising transmission module, judgment module and broadcast module, in which:
The transmission module, for receiving the data sharing request from first node, the data sharing request carries first Nodal information and target information abstract, the target information abstract include the data for the target data that the first node is shared Mark and source-information;
The judgment module, for whether judging the first node according to the first node information and default proof rule Has the shared information permission in alliance's chain;
The broadcast module, if having the shared information permission in alliance's chain for the first node, in the alliance The target information abstract is broadcasted in the main chain of chain.
9. a kind of server, which is characterized in that including processor, input equipment, output equipment and memory, the processor, Input equipment, output equipment and memory are connected with each other, wherein the memory is for storing computer program, the calculating Machine program includes program instruction, and the processor is configured for calling described program instruction, is executed as claim 1-7 is any Method described in.
10. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with computer program, described Computer program includes program instruction, and described program instruction makes the processor execute such as claim when being executed by a processor The described in any item methods of 1-7.
CN201910431685.8A 2019-05-21 2019-05-21 Data capture method, server and computer storage medium based on alliance's chain Pending CN110266648A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910431685.8A CN110266648A (en) 2019-05-21 2019-05-21 Data capture method, server and computer storage medium based on alliance's chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910431685.8A CN110266648A (en) 2019-05-21 2019-05-21 Data capture method, server and computer storage medium based on alliance's chain

Publications (1)

Publication Number Publication Date
CN110266648A true CN110266648A (en) 2019-09-20

Family

ID=67915193

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910431685.8A Pending CN110266648A (en) 2019-05-21 2019-05-21 Data capture method, server and computer storage medium based on alliance's chain

Country Status (1)

Country Link
CN (1) CN110266648A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111221914A (en) * 2020-01-15 2020-06-02 同方知网(北京)技术有限公司 Data exchange sharing tracing method based on block chain
CN111368327A (en) * 2020-02-27 2020-07-03 中国联合网络通信集团有限公司 Data sharing method and device, electronic equipment and readable storage medium
CN111402037A (en) * 2020-04-15 2020-07-10 中国银行股份有限公司 User data processing method and device
CN112287361A (en) * 2020-09-11 2021-01-29 杭州鸽子蛋网络科技有限责任公司 Data governance method, system, electronic device and storage medium
CN112543236A (en) * 2020-12-18 2021-03-23 中国联合网络通信集团有限公司 Data sharing method and block link point
CN112669135A (en) * 2020-11-30 2021-04-16 泰康保险集团股份有限公司 Data acquisition method and device, computer equipment and computer readable storage medium
CN112882651A (en) * 2021-01-07 2021-06-01 浙江大华技术股份有限公司 Data processing method and device and computer readable storage medium
CN113239255A (en) * 2021-05-13 2021-08-10 杭州趣链科技有限公司 Heterogeneous data resource sharing method and device, computer equipment and medium
CN113269571A (en) * 2021-06-25 2021-08-17 中国银行股份有限公司 Enterprise credit investigation information processing method and device based on block chain
CN113626850A (en) * 2021-10-13 2021-11-09 北京百度网讯科技有限公司 Request processing method, device, equipment and storage medium based on alliance chain
WO2023029414A1 (en) * 2021-08-30 2023-03-09 华为云计算技术有限公司 Data analysis method and apparatus
CN117332395A (en) * 2023-11-23 2024-01-02 江西财经大学 Data management method and system for data sharing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848080A (en) * 2018-06-01 2018-11-20 深圳崀途科技有限公司 Data-sharing systems based on the storage verification of alliance's chain
WO2019019493A1 (en) * 2017-07-28 2019-01-31 平安科技(深圳)有限公司 Data sharing method and device, and computer readable storage medium
CN109600441A (en) * 2018-12-14 2019-04-09 深圳壹账通智能科技有限公司 Alliance's chain information distribution control method and terminal device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019019493A1 (en) * 2017-07-28 2019-01-31 平安科技(深圳)有限公司 Data sharing method and device, and computer readable storage medium
CN108848080A (en) * 2018-06-01 2018-11-20 深圳崀途科技有限公司 Data-sharing systems based on the storage verification of alliance's chain
CN109600441A (en) * 2018-12-14 2019-04-09 深圳壹账通智能科技有限公司 Alliance's chain information distribution control method and terminal device

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111221914A (en) * 2020-01-15 2020-06-02 同方知网(北京)技术有限公司 Data exchange sharing tracing method based on block chain
CN111368327A (en) * 2020-02-27 2020-07-03 中国联合网络通信集团有限公司 Data sharing method and device, electronic equipment and readable storage medium
CN111402037A (en) * 2020-04-15 2020-07-10 中国银行股份有限公司 User data processing method and device
CN112287361A (en) * 2020-09-11 2021-01-29 杭州鸽子蛋网络科技有限责任公司 Data governance method, system, electronic device and storage medium
CN112669135B (en) * 2020-11-30 2024-03-08 泰康保险集团股份有限公司 Data acquisition method and device, computer equipment and computer readable storage medium
CN112669135A (en) * 2020-11-30 2021-04-16 泰康保险集团股份有限公司 Data acquisition method and device, computer equipment and computer readable storage medium
CN112543236A (en) * 2020-12-18 2021-03-23 中国联合网络通信集团有限公司 Data sharing method and block link point
CN112882651A (en) * 2021-01-07 2021-06-01 浙江大华技术股份有限公司 Data processing method and device and computer readable storage medium
CN113239255A (en) * 2021-05-13 2021-08-10 杭州趣链科技有限公司 Heterogeneous data resource sharing method and device, computer equipment and medium
CN113269571A (en) * 2021-06-25 2021-08-17 中国银行股份有限公司 Enterprise credit investigation information processing method and device based on block chain
CN113269571B (en) * 2021-06-25 2024-02-27 中国银行股份有限公司 Enterprise credit information processing method and device based on block chain
WO2023029414A1 (en) * 2021-08-30 2023-03-09 华为云计算技术有限公司 Data analysis method and apparatus
CN113626850B (en) * 2021-10-13 2022-03-11 北京百度网讯科技有限公司 Request processing method, device, equipment and storage medium based on alliance chain
CN113626850A (en) * 2021-10-13 2021-11-09 北京百度网讯科技有限公司 Request processing method, device, equipment and storage medium based on alliance chain
CN117332395A (en) * 2023-11-23 2024-01-02 江西财经大学 Data management method and system for data sharing
CN117332395B (en) * 2023-11-23 2024-03-08 江西财经大学 Data management method and system for data sharing

Similar Documents

Publication Publication Date Title
CN110266648A (en) Data capture method, server and computer storage medium based on alliance's chain
CN110210961A (en) Data capture method, server and computer storage medium based on alliance's chain
CN110246017A (en) Data capture method, terminal device and computer storage medium based on alliance's chain
CN110222529A (en) Assets management method, electronic equipment and computer storage medium based on alliance's chain
CN109450910A (en) Data sharing method, data sharing network and electronic equipment based on block chain
CN110223157A (en) Data capture method, electronic equipment and computer storage medium based on alliance's chain
CN109525671A (en) Date storage method, electronic equipment and storage medium based on block chain
CN107396360A (en) Block verification method and device
CN110012028B (en) Medical identity authentication method and system
CN109146679A (en) Intelligent contract call method and device, electronic equipment based on block chain
CN107231351A (en) The management method and relevant device of electronic certificate
CN109753815A (en) Data processing method, data processing network and electronic equipment based on block chain
CN110633963A (en) Electronic bill processing method, electronic bill processing device, computer-readable storage medium and equipment
CN110245185A (en) Data processing method, terminal device and computer storage medium based on alliance's chain
US20150271148A1 (en) System and method for transporting a document between a first service provider and a second service provider
CN110493237A (en) Identity management method, device, computer equipment and storage medium
CN110263025A (en) Data liquidation method, electronic equipment and computer storage medium based on alliance's chain
CN108769230A (en) Transaction data storage method, device, server and storage medium
CN110246040A (en) Trade management method, electronic equipment and computer storage medium based on alliance's chain
CN108846653A (en) Big data secure sharing method and system based on block chain
CN101247239A (en) Authenticated authorization accounting system and implementing method thereof
CN114565386A (en) Block chain escrow transaction method and system with multi-party cooperative privacy protection
CN114997809A (en) Government affairs service intelligent examination and approval center platform based on block chain technology
CN114881757A (en) Letter method, system and electronic equipment
CN107948970A (en) System of real name method of network entry, system and the mobile terminal of subordinate terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190920