CN110266648A - Data capture method, server and computer storage medium based on alliance's chain - Google Patents
Data capture method, server and computer storage medium based on alliance's chain Download PDFInfo
- Publication number
- CN110266648A CN110266648A CN201910431685.8A CN201910431685A CN110266648A CN 110266648 A CN110266648 A CN 110266648A CN 201910431685 A CN201910431685 A CN 201910431685A CN 110266648 A CN110266648 A CN 110266648A
- Authority
- CN
- China
- Prior art keywords
- node
- chain
- mentioned
- data
- alliance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
Abstract
The embodiment of the present application discloses a kind of data capture method based on alliance's chain, server and computer-readable medium, it is related to block storage system and block data structures technology, wherein method includes: to receive the data sharing request from first node, the data sharing request carries first node information and target information abstract, and the target information abstract includes the Data Identification and source-information for the target data that the first node is shared;According to the first node information and default proof rule, judge whether the first node has the shared information permission in alliance's chain;If having, the target information abstract is broadcasted in the main chain of alliance's chain, can increase data acquisition source, reduce the cost of data acquisition and data maintenance.
Description
Technical field
This application involves alliance's chain technical field more particularly to a kind of data capture methods based on alliance's chain, server
And computer storage medium.
Background technique
Reference is to acquire, arrange in accordance with the law, saving, processing the credit information of natural person, legal person and its hetero-organization, and externally mentioning
For services such as credit report, credit evaluation, credit information consultings, client's judgement, control credit risk are helped, credit management is carried out
Activity, it provides the shared platform of credit information for specialized credit mechanism.
Currently, credit investigation system centralization, generally obtains reference report, number by people's row reference or main strategies mechanism
More single according to source, procurement cost is high.In addition, other need the enterprise and mechanism of certain data, it also can not be safely and effectively
It collects, arrange data.
Summary of the invention
The embodiment of the present application provides a kind of data capture method based on alliance's chain, server and computer-readable medium,
It is related to block storage system and block data structures technology, data acquisition source can be increased, reduces data acquisition and data dimension
The cost of shield.
In a first aspect, the embodiment of the present application provides a kind of data capture method based on alliance's chain, it is applied to server,
The described method includes:
The data sharing request from first node is received, the data sharing request carries first node information and target
Informative abstract, the target information abstract include the Data Identification and source letter for the target data that the first node is shared
Breath;
According to the first node information and default proof rule, judge whether the first node has in alliance's chain
Shared information permission;
If having, the target information abstract is broadcasted in the main chain of alliance's chain.
As a kind of possible embodiment, the first node information includes first node address;It is described according to
First node information and default proof rule, judge whether the first node has the shared information permission packet in alliance's chain
It includes:
Judge the white list address whether the first node address belongs in the default proof rule;
If belonging to, the first node has the shared information permission in alliance's chain;If being not belonging to, the first segment
Point does not have the shared information permission in alliance's chain.
As a kind of possible embodiment, the method also includes:
When the first node address is not belonging to the white list address in the default proof rule, obtain and described first
The associated verifying address of node of node;
The shared authentication to the first node is sent to the verifying node according to the verifying address of node to request;
When receiving from the confirmation instruction that the verifying node requests the shared authentication, the first segment is determined
Point has the shared information permission in alliance's chain;Verify what node requested the shared authentication from described receiving
When refusal instruction, determine that the first node does not have the shared information permission in alliance's chain.
As a kind of possible embodiment, described before receiving the data sharing request from first node, it is described
Method further include:
It receives the addition to alliance's chain from the first node to request, the addition request includes described first
Nodal information;
Determine that the node type of the first node, the node type include enterprise's section according to the first node information
Point, credit information service's node and government organs' node;
The corresponding node rule for application of node type for obtaining the first node, according to institute's node rule for application to described
First node carries out authentication;
If the authentication passes through, the shared information permission of alliance's chain is opened for the first node.
As a kind of possible embodiment, the method also includes:
The data acquisition request from second node is received, the data acquisition request carries the Data Identification;
Determine that the corresponding target information abstract, Xiang Suoshu second node send the target according to the Data Identification
Informative abstract.
As a kind of possible embodiment, the method also includes:
The data analysis request from the second node is received, the data analysis request carries the Data Identification;
Data analysis node into alliance's chain, which is sent, carries the Data Identification and the second node address
The data analysis instructions, the data analysis instructions analyze the target data for the data analysis node.
As a kind of possible embodiment, the main chain of alliance's chain is realized based on super account book Project Technical.
Second aspect, the embodiment of the present application provide a kind of server, comprising: transmission module, judgment module and broadcast mould
Block, in which:
The transmission module, for receiving the data sharing request from first node, the data sharing request is carried
First node information and target information abstract, the target information abstract include the target data that the first node is shared
Data Identification and source-information;
The judgment module, for judging the first node according to the first node information and default proof rule
Whether shared information permission in alliance chain is had;
The broadcast module, if having the shared information permission in alliance's chain for the first node, described
The target information abstract is broadcasted in the main chain of alliance's chain.
The third aspect, the embodiment of the present application also provides a kind of servers, including processor, input equipment, output equipment
And memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing
Computer program, the computer program include program instruction, and the processor is configured for calling described program instruction, are held
Method of the row as described in first aspect and its any possible embodiment.
Fourth aspect, the embodiment of the present application provide a kind of computer storage medium, the computer storage medium storage
There is computer program, the computer program includes program instruction, and described program instruction makes the place when being executed by a processor
The method that reason device executes above-mentioned first aspect and its any possible embodiment.
The embodiment of the present application is by receiving the data sharing request from first node, wherein above-mentioned data sharing request
First node information and target information abstract are carried, above-mentioned target information abstract includes the number of targets that above-mentioned first node is shared
According to Data Identification and source-information judge above-mentioned first node further according to above-mentioned first node information and default proof rule
Whether shared information permission in alliance chain is had, if having, the broadcast them target information in the main chain of above-mentioned alliance's chain
Abstract, is made a summary by above-mentioned target information, and the node in alliance's chain can determine data source and then obtain target data
To increase data acquisition source, and safety is higher, reduces the cost of data acquisition and data maintenance.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description
Attached drawing is briefly described.
Fig. 1 is a kind of flow diagram of data capture method based on alliance's chain provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram for data capture method based on alliance's chain that another embodiment of the application provides;
Fig. 3 is a kind of structural schematic diagram of server provided by the embodiments of the present application;
Fig. 4 is the structural schematic diagram of another server provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Herein
" embodiment " is referred to it is meant that a particular feature, structure, or characteristic described may be embodied in the application at least in conjunction with the embodiments
In one embodiment.The phrase, which occurs, in each position in the description might not each mean identical embodiment, nor
With the independent or alternative embodiment of other embodiments mutual exclusion.Those skilled in the art explicitly and implicitly understand,
Embodiment described herein can be combined with other embodiments.
Based on the embodiment in the application, those of ordinary skill in the art are obtained without making creative work
The every other embodiment obtained, shall fall in the protection scope of this application.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that
It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have
It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap
Include other step or units intrinsic for these process, methods, product or equipment.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment
And be not intended to limit the application.As present specification and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to more fully understand the embodiment of the present application, will be situated between below to the method for application the embodiment of the present application
It continues.
The terminal device mentioned in the embodiment of the present application is the equipment that can be communicated with server, above-mentioned server
Claim servomechanism, is to provide the equipment of the service of calculating, can permit multiple terminal devices and access.Above-mentioned terminal device can be
Mobile terminal including the various handheld devices with wireless communication function, wearable device, calculates equipment or is connected to wireless tune
Other processing equipments of modulator-demodulator and various forms of user equipmenies (User Equipment, UE), mobile station
(Mobile Station, MS) etc..
It referring to Figure 1, is a kind of exemplary flow of data capture method based on alliance's chain provided by the embodiments of the present application
Figure, this method as shown in Figure 1 can include:
101, receive the data sharing request from first node, above-mentioned data sharing request carry first node information and
Target information abstract, above-mentioned target information abstract include Data Identification and the source for the target data that above-mentioned first node is shared
Information.
Executing subject in the embodiment of the present application can be the main chain node in alliance's chain, can be above-mentioned server, or
Person is known as main chain server.Above-mentioned main chain server realizes that the data of other nodes are total it can be appreciated that data sharing platform
It enjoys.
Alliance's chain, member and limited third party just for some special group, inside specify multiple preselected nodes
For the people that keeps accounts, each piece of generation is codetermined by all preselected nodes.
Generally according to the difference of alliance's chain network centralization degree, alliance's chain under 3 kinds of different application scenes is differentiated:
(1) the whole network discloses, the block chain of no user licensing scheme, referred to as publicly-owned chain;
(2) network is added in the node for allowing to authorize, and information can be checked according to permission, is often used for inter-agency block
Chain, referred to as alliance's chain or industry chain;
(3) node in all-network all rests in a mechanism hand, referred to as privately owned chain.
Alliance's chain and privately owned chain also referred to collectively as permit chain, publicly-owned chain to be known as unlicensed chain.
Alliance's chain in the embodiment of the present application can be understood as above-mentioned second situation, and the executing subject of this method can be
Main chain server in alliance's chain.
Each node in above-mentioned alliance's chain can have the database of oneself, data sharing chain node and corresponding side
Chain node.
Node in alliance's chain can upload data and be shared, specifically, in the case where needing shared data, first
Node can send above-mentioned data sharing request by chain linked to owner server first, and above-mentioned data sharing request can be made by user's operation
It is triggered for the terminal device of first node.
The first node information that above-mentioned data sharing request carries can be understood as the essential information of the first node, above-mentioned
First node information may include first node mark, for determining first node identity, for example may include that first node is compiled
Number, first node address, one of first node title or a variety of, and may include the authentication information of first node
Deng.
Informative abstract in the embodiment of the present application can be understood as the corresponding relationship of data and data source, i.e., a kind of data
The catalogue of acquisition modes.
Above-mentioned target information abstract may include Data Identification and the source for the target data that above-mentioned first node is shared
Information, above-mentioned Data Identification are determined for target data, provider, that is, data of the i.e. target data of above-mentioned source-information
Source Nodes can be the data source node label or data source node address of the target data.Wherein, above-mentioned source
Node can be the first node, i.e. the first node directly uploads the data of oneself shared, optionally, the source Nodes
It can be other nodes in alliance's chain, data sharing carried out by the first node.
Above-mentioned target information abstract can be before first node initiates above-mentioned data sharing request, by above-mentioned data source
Node generates.Main chain server can execute step 102 in the case where receiving above-mentioned data sharing request.
Optionally, before step 101, this method further include:
It receives the addition to above-mentioned alliance's chain from above-mentioned first node to request, above-mentioned addition request includes above-mentioned first
Nodal information;
Determine that the node type of above-mentioned first node, above-mentioned node type include enterprise's section according to above-mentioned first node information
Point, credit information service's node and government organs' node;
The corresponding node rule for application of node type for obtaining above-mentioned first node, according to institute's node rule for application to above-mentioned
First node carries out authentication;
If above-mentioned authentication passes through, the above-mentioned shared information permission of above-mentioned alliance's chain is opened for above-mentioned first node.
Alliance's chain can permit the addition of node and exit, wherein node type may include: enterprise's node (as interconnected
Net financing corporation, business bank, payment platform, insurance company, securities broker company, room hand over institute etc.), credit information service's node (such as people's row
Reference, main strategies mechanism) and government organs' node etc..
Specifically, can be sent to the main chain server of alliance's chain when first node is not belonging to the node in alliance's chain
On the addition of above-mentioned alliance's chain is requested, above-mentioned addition request includes above-mentioned first node information, receives to come in main chain server
From after the addition request to above-mentioned alliance's chain of above-mentioned first node, above-mentioned first can be determined according to above-mentioned first node information
The node type of node.The node identification for including in available above-mentioned first node information, according to the node identification that prestores with
The corresponding relationship of node type determines that the corresponding node type of node identification obtained is the node type of the node, and main chain
In can also be stored with the corresponding relationship of at least one node rule for application and node type and node rule for application, then into
One step, the corresponding node rule for application of the node type of available above-mentioned first node, further according to the node application of acquisition
Rule carries out authentication to above-mentioned first node.
Optionally, above-mentioned verification process can also be executed by the authorization node in alliance's chain.Above-mentioned authentication can wrap
Include digital signature, node-agent people biological information, the node scoring for verifying the node, node historic transmission record or node storage
Data volume etc., herein with no restrictions.
102, according to above-mentioned first node information and default proof rule, judge whether above-mentioned first node has alliance's chain
In shared information permission.
Above-mentioned default proof rule is can store in main chain server, for verifying whether first node has the alliance
Shared information permission in chain.After receiving above-mentioned data sharing request, in available data sharing request the
One nodal information to determine first node, and then is audited above-mentioned first node information according to above-mentioned default proof rule,
Judge whether the first node can provide shared data.
Above-mentioned default proof rule, which can be, is added the proof rule that the part of nodes of alliance's chain is reached common understanding in advance, should
It may include the verification mode to the node of data transmission, data sharing under different situations in default proof rule, specifically,
For example judge whether the first node has the shared information power in alliance's chain by judging the node type of first node
Limit, part of nodes type have above-mentioned shared information permission, and part of nodes type does not have above-mentioned shared information permission;It can be with
The node is audited based on node level whether have in above-mentioned shared information permission, such as alliance's chain be previously stored with first
Permission threshold value just has above-mentioned shared information permission when the node level of first node is higher than above-mentioned first threshold, when first
The node level of node does not have above-mentioned shared information permission etc. then when being not higher than above-mentioned first threshold.
Optionally, above-mentioned first node information includes first node address;It is above-mentioned according to above-mentioned first node information and pre-
If proof rule, judge whether above-mentioned first node has the shared information permission in alliance's chain and include:
Judge the white list address whether above-mentioned first node address belongs in above-mentioned default proof rule;
If belonging to, above-mentioned first node has the shared information permission in above-mentioned alliance's chain;If being not belonging to, above-mentioned first segment
Point does not have the shared information permission in above-mentioned alliance's chain.
If above-mentioned first node has the shared information permission in above-mentioned alliance's chain, step 103 can be executed.
103, broadcast them target information is made a summary in the main chain of above-mentioned alliance's chain.
Specifically, the node in above-mentioned alliance's chain can have local database, but the mode of shared data is not that will count
According to directly upload, but data to be shared can be generated into informative abstract, then be uploaded to store in main chain and issue in other words.
Broadcast (Broadcasting) is the most common form of multicast, it delivers one point to each point of destination
The copy of group.It can be completed by the delivery that multiple singles are grouped, the copy that can also be grouped by individually connecting transmitting,
Until each recipient receives a copy.It by way of broadcast, obtain the node in alliance's chain can
Take the mode of the target data, but it is different establish a capital to have permission obtain the target data, can also be according to other verification modes
It could be obtained after being verified, to improve safety.It is not directly to add data change each time in the embodiment of the present application
Close broadcast, but generate one be similar to informative abstract encryption string broadcast, data can be made even be decrypted (certainly this
It is almost impossible) any private data will not be revealed.
It is made a summary by above- mentioned information, can determine the source (node) of data.Such as the data a of A nodes sharing, data
Source-information in the A node address can be provided.
Optionally, this method further include:
The data acquisition request from second node is received, above-mentioned data acquisition request carries above-mentioned Data Identification;
Determine that corresponding above-mentioned target information abstract, Xiang Shangshu second node send above-mentioned target according to above-mentioned Data Identification
Informative abstract.
In the main chain of alliance's chain, it can store multiple above- mentioned information abstracts, that is, have the section of above-mentioned shared information permission
Point can be carried out data sharing.
Above-mentioned target information abstract can store in main chain, and above-mentioned second node can be that first is removed in above-mentioned alliance's chain
Node other than node, and when above-mentioned second node needs to obtain shared target data, it is only necessary to believed according to above-mentioned target
The source-information of digest challenge shared data is ceased, determines the source Nodes obtained, then send data acquisition to the source Nodes and ask
It asks.
In the case where above-mentioned second node did not received above-mentioned target information abstract, can be sent out with chain linked to owner server
It serves and states data acquisition request, including the Data Identification of target data to be obtained, receive in primary server from
It is available to above-mentioned Data Identification corresponding target information abstract when the data acquisition request of two nodes, then to above-mentioned second
Node sends above-mentioned target information abstract, then second node can be mentioned according to the determination of the source-information in the eap-message digest received
For the node (address) of data, apply obtaining target data to it.
Optionally, after node gets above-mentioned shared target data, target data can be integrated, then deposit
Enter the local data base of the node, voluntarily can obtain and check later.
The embodiment of the present application is by receiving the data sharing request from first node, wherein above-mentioned data sharing request
First node information and target information abstract are carried, above-mentioned target information abstract includes the number of targets that above-mentioned first node is shared
According to Data Identification and source-information judge above-mentioned first node further according to above-mentioned first node information and default proof rule
Whether shared information permission in alliance chain is had, if having, the broadcast them target information in the main chain of above-mentioned alliance's chain
Abstract, is made a summary by above-mentioned target information, and the node in alliance's chain can determine data source and then obtain target data
To increase data acquisition source, and safety is higher, reduces the cost of data acquisition and data maintenance.
It referring to fig. 2, is the exemplary flow of another data capture method based on alliance's chain provided by the embodiments of the present application
Figure, embodiment shown in Fig. 2, which can be, to be obtained on the basis of embodiment shown in Fig. 1, and this method as shown in Figure 2 can wrap
It includes:
201, receive the data sharing request from first node, above-mentioned data sharing request carry first node information and
Target information abstract, above-mentioned target information abstract include Data Identification and the source for the target data that above-mentioned first node is shared
Information.
Wherein, above-mentioned steps 201 can refer to the specific descriptions in the step 101 of embodiment illustrated in fig. 1, no longer superfluous herein
It states.
202, judge the white list address whether above-mentioned first node address belongs in above-mentioned default proof rule.
The default proof rule stored in alliance's chain may include that at least one allows the node address of shared data,
I.e. above-mentioned white list address, above-mentioned white list address can preset, can also modify, by some or all of in alliance's chain
Node is reached common understanding, and is having node that can first carry out node audit and authentication when above-mentioned white list address is added.
In the data sharing request for receiving first node, first node can be obtained from above-mentioned first node information
Address judges that the white list address whether above-mentioned first node address belongs in above-mentioned default proof rule can be held if belonging to
Row step 203;If being not belonging to, which does not have shared information permission, does not execute step 203, can execute step
204。
203, broadcast them target information is made a summary in the main chain of above-mentioned alliance's chain.
Wherein, above-mentioned steps 203 can refer to the specific descriptions in the step 103 of embodiment illustrated in fig. 1, no longer superfluous herein
It states.
Step 207 can also be performed after step 203.
204, acquisition and the associated verifying address of node of above-mentioned first node, it is upward according to above-mentioned verifying address of node
The shared authentication that verifying node is sent to above-mentioned first node is stated to request.
It, can also be to the node when stating the white list address that first node address is not belonging in above-mentioned default proof rule
It is verified, if being verified still can carry out data acquisition.Specifically, node association letter can also be stored in alliance's chain
Breath, the i.e. information with the associated verifying node of above-mentioned first node, include mainly the verifying address of node, main chain server can
With acquisition and the associated verifying address of node of above-mentioned first node, and then can send to above-mentioned verifying node to above-mentioned first
The shared authentication of node is requested, and above-mentioned verifying node can be one or more.
After receiving the request of the shared authentication to above-mentioned first node, verifying node can determine above-mentioned first node energy
No this data sharing of progress, such as above-mentioned verifying node can be above-mentioned credit information service, government.Specifically, can be the verifying
User's manual operation of node judges, can also be examined based on pre-set judgment rule the first node
Core, then make decision, it can be requested by sending confirmation instruction or refusal, execute step 205, step 206 respectively.
205, when receiving the confirmation requested from above-mentioned verifying node to above-mentioned shared authentication and instructing, above-mentioned the is determined
One node has the shared information permission in above-mentioned alliance's chain.
When above-mentioned first node has the shared information permission in above-mentioned alliance's chain, step 203 can be executed.
206, when receiving the refusal requested from above-mentioned verifying node to above-mentioned shared authentication and instructing, above-mentioned the is determined
One node does not have the shared information permission in above-mentioned alliance's chain.
For step 205 and step 206, it should be noted that, can in the case where above-mentioned verifying node is at least two
When all sending confirmation request to need all to verify node, above-mentioned first node just has the shared information permission in alliance's chain,
It is also possible to be judged according to the verifying regulation that preparatory verifying node is reached common understanding, such as the regulation original that the minority is subordinate to the majority
Then, first node is determined as long as the verifying number of nodes for sending confirmation instruction is greater than the verifying number of nodes for sending refusal instruction
Has the shared information permission in alliance's chain.
207, the data analysis request from above-mentioned second node is received, above-mentioned data analysis request carries above-mentioned data mark
Know.
Above-mentioned second node can be the node in above-mentioned alliance's chain in addition to first node, can request in alliance's chain
Data are obtained, since main chain can provide big data analysis interface simultaneously, second node can also request to analyze data.
It can be communicated with data analysis node by the above-mentioned big data interface, above-mentioned data analysis node can be used as the spy of alliance's chain
Different node, can be different with the permission of other nodes.
The main chain server of alliance's chain after receiving the data analysis request from above-mentioned second node, it is available on
Data Identification is stated, the data analysis instructions for carrying above-mentioned Data Identification and above-mentioned second node address are generated, executes step 208.
208, the data analysis node in Xiang Shangshu alliance chain is sent with carrying above-mentioned Data Identification and above-mentioned second node
The above-mentioned data analysis instructions of location, above-mentioned data analysis instructions divide above-mentioned target data for above-mentioned data analysis node
Analysis.
Can be understood as main chain server can forward the data analysis request of second node, Xiang Shangshu data analysis node
Above-mentioned data analysis instructions are sent, analyze above-mentioned data analysis node to target data.Specifically, data analysis node
On can be deployed with data analysis algorithm, can also according to above-mentioned Data Identification obtain target data abstract, obtain target data
Carry out data analysis.Optionally, after completing data analysis, data analysis result can be sent to second node, it can also be with
It is to be forwarded based on main chain server to the second node.It can be connected to data silo by this method, and more data can be obtained
Source, and then data analysis is safely and accurately completed, real big data analysis can be created based on data sharing platform.
The main chain of alliance's chain of the embodiment of the present application can ((Hyperledger) Project Technical be realized based on super account book.
Super account book is the open source projects for being intended to push the inter-trade application of block chain.It provides a modular framework, frame
The execution (being known as " chaincode " in Fabric project) of node, intelligent contract in structure and configurable common recognition and member
Service.One Fabric network includes that companion's node (" Peer nodes ") executes chaincode contract, accesses account book data,
The interface of endorsement transaction and referred to as application program.Mandator node (" Orderer nodes ") is responsible for ensuring the one of this block chain
Cause property simultaneously conveys the transaction endorsed to the companions in network;And MSP service, mainly as certificate authority
X.509 certificate is used to verify member identities and role for (Certificate Authority) management.It, can based on super account book
There are at least four class special joints: endorsement node, confirmation node, ordering joint, certificate node.
Alliance's chain in the embodiment of the present application can carry out intelligent contract exploitation based on Go or Java, and the above method can be with
Intelligent contract is written to realize, all kinds of nodes is set, message is broadcasted, sort, know together, is confirmed and is write on chain.Wherein authenticate
Node (above-mentioned verifying node) and authorization node may be implemented certain nodes and form a small-sized cluster, be carried out using encrypted tunnel
Communication interaction, and other lack of competence nodes can not then participate in interacting, and increase safety, the flexibility of data transmission.
It in the embodiment of the present application, is requested by receiving the data sharing from first node, above-mentioned data sharing request is taken
Band first node information and target information are made a summary, and above-mentioned target information abstract includes the target data that above-mentioned first node is shared
Data Identification and source-information, with judging the white list whether above-mentioned first node address belongs in above-mentioned default proof rule
Location, if so, broadcast them target information can make a summary in the main chain of above-mentioned alliance's chain, if it is not, available with above-mentioned the
The associated verifying address of node of one node is sent to above-mentioned verifying node to above-mentioned first according to above-mentioned verifying address of node
The shared authentication of node is requested, when receiving from the confirmation instruction that above-mentioned verifying node requests above-mentioned shared authentication, really
Fixed above-mentioned first node has the shared information permission in above-mentioned alliance's chain, can in the main chain of above-mentioned alliance's chain broadcast them
Target information abstract, and when receiving from the refusal instruction that above-mentioned verifying node requests above-mentioned shared authentication, in determination
State first node and do not have shared information permission in above-mentioned alliance's chain, can not in the main chain of above-mentioned alliance's chain broadcast them
Target information abstract, is made a summary by above-mentioned target information, and the node in alliance's chain can determine data source and then obtain target
Data, it can increase data acquisition source, and safety is higher, reduce the cost of data acquisition and data maintenance.Also,
Can receive the data analysis request from above-mentioned second node, above-mentioned data analysis request carries above-mentioned Data Identification, then to
Data analysis node in above-mentioned alliance's chain sends the above-mentioned data point for carrying above-mentioned Data Identification and above-mentioned second node address
Analysis instruction, above-mentioned data analysis instructions analyze above-mentioned target data for above-mentioned data analysis node, can be based on number
Real big data analysis is created according to shared platform, not only ensure that privacy, but also realizes data sharing and analysis integration.
It is above-mentioned that mainly the scheme of the embodiment of the present application is described from the angle of method side implementation procedure.It is understood that
, in order to realize the above functions, it comprises execute the corresponding hardware configuration of each function and/or software mould for electronic equipment
Block.Those skilled in the art should be readily appreciated that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, the present invention can be realized with the combining form of hardware or hardware and computer software.Some function actually with
Hardware or computer software drive the mode of hardware to execute, the specific application and design constraint item depending on technical solution
Part.Professional technician can be to specifically realizing described function using distinct methods, but this realization is not
It is considered as beyond the scope of this invention.
The embodiment of the present application can carry out the division of functional module according to above method example to electronic equipment, for example, can
With each functional module of each function division of correspondence, two or more functions can also be integrated in a processing module
In.Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It needs
It is noted that be schematical, only a kind of logical function partition to the division of module in the embodiment of the present application, it is practical real
It is current that there may be another division manner.
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of server provided by the embodiments of the present application, the server 300 packet
Include transmission module 310, judgment module 320 and broadcast module 330, in which:
Above-mentioned transmission module 310, for receiving the data sharing request from first node, above-mentioned data sharing request is taken
Band first node information and target information are made a summary, and above-mentioned target information abstract includes the target data that above-mentioned first node is shared
Data Identification and source-information;
Above-mentioned judgment module 320, for judging above-mentioned first segment according to above-mentioned first node information and default proof rule
Whether point has the shared information permission in alliance's chain;
Above-mentioned broadcast module 330, if having the shared information permission in above-mentioned alliance's chain for above-mentioned first node, upper
Broadcast them target information in the main chain of alliance's chain is stated to make a summary.
Optionally, above-mentioned first node information includes first node address;Above-mentioned judgment module 320, is specifically used for:
Judge the white list address whether above-mentioned first node address belongs in above-mentioned default proof rule;
If belonging to, judge that above-mentioned first node has the shared information permission in above-mentioned alliance's chain;If being not belonging to, in judgement
It states first node and does not have shared information permission in above-mentioned alliance's chain.
Optionally, above-mentioned server 300 further includes obtaining module 340, for being not belonging in above-mentioned first node address
When stating the white list address in default proof rule, obtain and the associated verifying address of node of above-mentioned first node;
Above-mentioned transmission module 310 is also used to, and is sent to above-mentioned verifying node to above-mentioned according to above-mentioned verifying address of node
The shared authentication of first node is requested;
Above-mentioned judgment module 320 is specifically used for:
It receives in above-mentioned transmission module 310 and the confirmation that above-mentioned shared authentication is requested is instructed from above-mentioned verifying node
When, determine that above-mentioned first node has the shared information permission in above-mentioned alliance's chain;It receives and comes from above-mentioned transmission module 310
When above-mentioned verifying node instructs the refusal that above-mentioned shared authentication is requested, determine that above-mentioned first node does not have in above-mentioned alliance's chain
Shared information permission.
Optionally, above-mentioned server 300 further includes authentication module 350;
Above-mentioned transmission module 310 is also used to, and is received the addition to above-mentioned alliance's chain from above-mentioned first node and is requested, on
Stating addition request includes above-mentioned first node information;
Above-mentioned authentication module 350 is used for:
Determine that the node type of above-mentioned first node, above-mentioned node type include enterprise's section according to above-mentioned first node information
Point, credit information service's node and government organs' node;
The corresponding node rule for application of node type for obtaining above-mentioned first node, according to institute's node rule for application to above-mentioned
First node carries out authentication;
If above-mentioned authentication passes through, the above-mentioned shared information permission of above-mentioned alliance's chain is opened for above-mentioned first node.
Optionally, above-mentioned transmission module 310 is also used to:
The data acquisition request from second node is received, above-mentioned data acquisition request carries above-mentioned Data Identification;
Determine that corresponding above-mentioned target information abstract, Xiang Shangshu second node send above-mentioned target according to above-mentioned Data Identification
Informative abstract.
Optionally, above-mentioned transmission module 310 is also used to:
The data analysis request from above-mentioned second node is received, above-mentioned data analysis request carries above-mentioned Data Identification;
Data analysis node into above-mentioned alliance's chain, which is sent, carries above-mentioned Data Identification and above-mentioned second node address
Above-mentioned data analysis instructions, above-mentioned data analysis instructions analyze above-mentioned target data for above-mentioned data analysis node.
Optionally, the main chain of above-mentioned alliance's chain is realized based on super account book Project Technical.
According to the specific embodiment of the embodiment of the present application, Fig. 1 and the data capture method shown in Fig. 2 based on alliance's chain
The step 101 being related to~103,201~208 modules that can be in server 300 as shown in Figure 3 are performed.Example
Such as, step 101~103 in Fig. 1 can transmission module 310, judgment module 320 as shown in Fig. 3 and broadcast module respectively
330 execute.
By the server 300 of the embodiment of the present application, server 300 can be total by receiving the data from first node
Enjoy request, wherein above-mentioned data sharing request carries first node information and target information abstract, above-mentioned target information abstract packet
The Data Identification and source-information for including the target data that above-mentioned first node is shared, further according to above-mentioned first node information and in advance
If proof rule, judge whether above-mentioned first node has the shared information permission in alliance's chain, if having, in above-mentioned alliance
Broadcast them target information is made a summary in the main chain of chain, is made a summary by above-mentioned target information, the node in alliance's chain can determine number
According to source and then obtain target data, it can increase data acquisition source, and safety is higher, reduce data acquisition sum number
According to the cost of maintenance.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another kind server disclosed in the embodiment of the present application.As shown in figure 4,
The server 400 includes processor 401 and memory 402, wherein server 400 can also include bus 403, processor 401
It can be connected with each other by bus 403 with memory 402, bus 403 can be Peripheral Component Interconnect standard (Peripheral
Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard
Architecture, EISA) bus etc..Bus 403 can be divided into address bus, data/address bus, control bus etc..For convenient for table
Show, only indicated with a thick line in Fig. 4, it is not intended that an only bus or a type of bus.Wherein, server
400 can also include input-output equipment 404, and input-output equipment 404 may include display screen, such as liquid crystal display.It deposits
Reservoir 402 is used to store one or more programs comprising instruction;Processor 401 is stored in memory 402 for calling
Method and step some or all of is mentioned in the above-mentioned Fig. 1 and Fig. 2 embodiment of instruction execution.
It should be appreciated that in the embodiment of the present application, alleged processor 401 can be central processing unit (Central
Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
Reason device is also possible to any conventional processor etc..
Input equipment 402 may include that Trackpad, fingerprint adopt sensor (for acquiring the finger print information and fingerprint of user
Directional information), microphone etc., output equipment 403 may include display (LCD etc.), loudspeaker etc..
The memory 404 may include read-only memory and random access memory, and to processor 401 provide instruction and
Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited
Store up the information of device type.
By the server 400 of the embodiment of the present application, server 400 can be total by receiving the data from first node
Enjoy request, wherein above-mentioned data sharing request carries first node information and target information abstract, above-mentioned target information abstract packet
The Data Identification and source-information for including the target data that above-mentioned first node is shared, further according to above-mentioned first node information and in advance
If proof rule, judge whether above-mentioned first node has the shared information permission in alliance's chain, if having, in above-mentioned alliance
Broadcast them target information is made a summary in the main chain of chain, is made a summary by above-mentioned target information, the node in alliance's chain can determine number
According to source and then obtain target data, it can increase data acquisition source, and safety is higher, reduce data acquisition sum number
According to the cost of maintenance.
The embodiment of the present application also provides a kind of computer storage medium, wherein computer storage medium storage is for electricity
The computer program of subdata exchange, it is as any in recorded in above method embodiment which execute computer
A kind of some or all of the data capture method based on alliance's chain step.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, it is only a kind of
Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or module,
It can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module
The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple
On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
If the integrated module is realized in the form of software function module and sells or use as independent product
When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or
Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products
Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment
(can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention
Step.And memory above-mentioned includes: USB flash disk, read-only memory (Read-Only Memory, ROM), random access memory
The various media that can store program code such as (Random Access Memory, RAM), mobile hard disk, magnetic or disk.
Claims (10)
1. a kind of data capture method based on alliance's chain is applied to server, which is characterized in that the described method includes:
The data sharing request from first node is received, the data sharing request carries first node information and target information
Abstract, the target information abstract include the Data Identification and source-information for the target data that the first node is shared;
According to the first node information and default proof rule, it is shared in alliance's chain to judge whether the first node has
Information permission;
If having, the target information abstract is broadcasted in the main chain of alliance's chain.
2. the method according to claim 1, wherein the first node information includes first node address;Institute
It states and judges whether the first node has the shared letter in alliance's chain according to the first node information and default proof rule
Ceasing permission includes:
Judge the white list address whether the first node address belongs in the default proof rule;
If belonging to, the first node has the shared information permission in alliance's chain;If being not belonging to, the first node is not
Has the shared information permission in alliance's chain.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
When the first node address is not belonging to the white list address in the default proof rule, obtain and the first node
Associated verifying address of node;
The shared authentication to the first node is sent to the verifying node according to the verifying address of node to request;
When receiving from the confirmation instruction that the verifying node requests the shared authentication, the first node tool is determined
Shared information permission in standby alliance's chain;Receiving the refusal requested from the verifying node the shared authentication
When instruction, determine that the first node does not have the shared information permission in alliance's chain.
4. according to the method described in claim 3, it is characterized in that, described receiving the data sharing request from first node
Before, the method also includes:
It receives the addition to alliance's chain from the first node to request, the addition request includes the first node
Information;
Determine the node type of the first node according to the first node information, the node type include enterprise's node,
Credit information service's node and government organs' node;
The corresponding node rule for application of node type for obtaining the first node, according to institute's node rule for application to described first
Node carries out authentication;
If the authentication passes through, the shared information permission of alliance's chain is opened for the first node.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
The data acquisition request from second node is received, the data acquisition request carries the Data Identification;
Determine that the corresponding target information abstract, Xiang Suoshu second node send the target information according to the Data Identification
Abstract.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
The data analysis request from the second node is received, the data analysis request carries the Data Identification;
Data analysis node into alliance's chain, which is sent, to be carried described in the Data Identification and the second node address
Data analysis instructions, the data analysis instructions analyze the target data for the data analysis node.
7. method according to claim 5 or 6, which is characterized in that the main chain of alliance's chain is based on super account book project
Technology is realized.
8. a kind of server characterized by comprising transmission module, judgment module and broadcast module, in which:
The transmission module, for receiving the data sharing request from first node, the data sharing request carries first
Nodal information and target information abstract, the target information abstract include the data for the target data that the first node is shared
Mark and source-information;
The judgment module, for whether judging the first node according to the first node information and default proof rule
Has the shared information permission in alliance's chain;
The broadcast module, if having the shared information permission in alliance's chain for the first node, in the alliance
The target information abstract is broadcasted in the main chain of chain.
9. a kind of server, which is characterized in that including processor, input equipment, output equipment and memory, the processor,
Input equipment, output equipment and memory are connected with each other, wherein the memory is for storing computer program, the calculating
Machine program includes program instruction, and the processor is configured for calling described program instruction, is executed as claim 1-7 is any
Method described in.
10. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with computer program, described
Computer program includes program instruction, and described program instruction makes the processor execute such as claim when being executed by a processor
The described in any item methods of 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910431685.8A CN110266648A (en) | 2019-05-21 | 2019-05-21 | Data capture method, server and computer storage medium based on alliance's chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910431685.8A CN110266648A (en) | 2019-05-21 | 2019-05-21 | Data capture method, server and computer storage medium based on alliance's chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110266648A true CN110266648A (en) | 2019-09-20 |
Family
ID=67915193
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910431685.8A Pending CN110266648A (en) | 2019-05-21 | 2019-05-21 | Data capture method, server and computer storage medium based on alliance's chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110266648A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111221914A (en) * | 2020-01-15 | 2020-06-02 | 同方知网(北京)技术有限公司 | Data exchange sharing tracing method based on block chain |
CN111368327A (en) * | 2020-02-27 | 2020-07-03 | 中国联合网络通信集团有限公司 | Data sharing method and device, electronic equipment and readable storage medium |
CN111402037A (en) * | 2020-04-15 | 2020-07-10 | 中国银行股份有限公司 | User data processing method and device |
CN112287361A (en) * | 2020-09-11 | 2021-01-29 | 杭州鸽子蛋网络科技有限责任公司 | Data governance method, system, electronic device and storage medium |
CN112543236A (en) * | 2020-12-18 | 2021-03-23 | 中国联合网络通信集团有限公司 | Data sharing method and block link point |
CN112669135A (en) * | 2020-11-30 | 2021-04-16 | 泰康保险集团股份有限公司 | Data acquisition method and device, computer equipment and computer readable storage medium |
CN112882651A (en) * | 2021-01-07 | 2021-06-01 | 浙江大华技术股份有限公司 | Data processing method and device and computer readable storage medium |
CN113239255A (en) * | 2021-05-13 | 2021-08-10 | 杭州趣链科技有限公司 | Heterogeneous data resource sharing method and device, computer equipment and medium |
CN113269571A (en) * | 2021-06-25 | 2021-08-17 | 中国银行股份有限公司 | Enterprise credit investigation information processing method and device based on block chain |
CN113626850A (en) * | 2021-10-13 | 2021-11-09 | 北京百度网讯科技有限公司 | Request processing method, device, equipment and storage medium based on alliance chain |
WO2023029414A1 (en) * | 2021-08-30 | 2023-03-09 | 华为云计算技术有限公司 | Data analysis method and apparatus |
CN117332395A (en) * | 2023-11-23 | 2024-01-02 | 江西财经大学 | Data management method and system for data sharing |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108848080A (en) * | 2018-06-01 | 2018-11-20 | 深圳崀途科技有限公司 | Data-sharing systems based on the storage verification of alliance's chain |
WO2019019493A1 (en) * | 2017-07-28 | 2019-01-31 | 平安科技(深圳)有限公司 | Data sharing method and device, and computer readable storage medium |
CN109600441A (en) * | 2018-12-14 | 2019-04-09 | 深圳壹账通智能科技有限公司 | Alliance's chain information distribution control method and terminal device |
-
2019
- 2019-05-21 CN CN201910431685.8A patent/CN110266648A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019019493A1 (en) * | 2017-07-28 | 2019-01-31 | 平安科技(深圳)有限公司 | Data sharing method and device, and computer readable storage medium |
CN108848080A (en) * | 2018-06-01 | 2018-11-20 | 深圳崀途科技有限公司 | Data-sharing systems based on the storage verification of alliance's chain |
CN109600441A (en) * | 2018-12-14 | 2019-04-09 | 深圳壹账通智能科技有限公司 | Alliance's chain information distribution control method and terminal device |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111221914A (en) * | 2020-01-15 | 2020-06-02 | 同方知网(北京)技术有限公司 | Data exchange sharing tracing method based on block chain |
CN111368327A (en) * | 2020-02-27 | 2020-07-03 | 中国联合网络通信集团有限公司 | Data sharing method and device, electronic equipment and readable storage medium |
CN111402037A (en) * | 2020-04-15 | 2020-07-10 | 中国银行股份有限公司 | User data processing method and device |
CN112287361A (en) * | 2020-09-11 | 2021-01-29 | 杭州鸽子蛋网络科技有限责任公司 | Data governance method, system, electronic device and storage medium |
CN112669135B (en) * | 2020-11-30 | 2024-03-08 | 泰康保险集团股份有限公司 | Data acquisition method and device, computer equipment and computer readable storage medium |
CN112669135A (en) * | 2020-11-30 | 2021-04-16 | 泰康保险集团股份有限公司 | Data acquisition method and device, computer equipment and computer readable storage medium |
CN112543236A (en) * | 2020-12-18 | 2021-03-23 | 中国联合网络通信集团有限公司 | Data sharing method and block link point |
CN112882651A (en) * | 2021-01-07 | 2021-06-01 | 浙江大华技术股份有限公司 | Data processing method and device and computer readable storage medium |
CN113239255A (en) * | 2021-05-13 | 2021-08-10 | 杭州趣链科技有限公司 | Heterogeneous data resource sharing method and device, computer equipment and medium |
CN113269571A (en) * | 2021-06-25 | 2021-08-17 | 中国银行股份有限公司 | Enterprise credit investigation information processing method and device based on block chain |
CN113269571B (en) * | 2021-06-25 | 2024-02-27 | 中国银行股份有限公司 | Enterprise credit information processing method and device based on block chain |
WO2023029414A1 (en) * | 2021-08-30 | 2023-03-09 | 华为云计算技术有限公司 | Data analysis method and apparatus |
CN113626850B (en) * | 2021-10-13 | 2022-03-11 | 北京百度网讯科技有限公司 | Request processing method, device, equipment and storage medium based on alliance chain |
CN113626850A (en) * | 2021-10-13 | 2021-11-09 | 北京百度网讯科技有限公司 | Request processing method, device, equipment and storage medium based on alliance chain |
CN117332395A (en) * | 2023-11-23 | 2024-01-02 | 江西财经大学 | Data management method and system for data sharing |
CN117332395B (en) * | 2023-11-23 | 2024-03-08 | 江西财经大学 | Data management method and system for data sharing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110266648A (en) | Data capture method, server and computer storage medium based on alliance's chain | |
CN110210961A (en) | Data capture method, server and computer storage medium based on alliance's chain | |
CN110246017A (en) | Data capture method, terminal device and computer storage medium based on alliance's chain | |
CN110222529A (en) | Assets management method, electronic equipment and computer storage medium based on alliance's chain | |
CN109450910A (en) | Data sharing method, data sharing network and electronic equipment based on block chain | |
CN110223157A (en) | Data capture method, electronic equipment and computer storage medium based on alliance's chain | |
CN109525671A (en) | Date storage method, electronic equipment and storage medium based on block chain | |
CN107396360A (en) | Block verification method and device | |
CN110012028B (en) | Medical identity authentication method and system | |
CN109146679A (en) | Intelligent contract call method and device, electronic equipment based on block chain | |
CN107231351A (en) | The management method and relevant device of electronic certificate | |
CN109753815A (en) | Data processing method, data processing network and electronic equipment based on block chain | |
CN110633963A (en) | Electronic bill processing method, electronic bill processing device, computer-readable storage medium and equipment | |
CN110245185A (en) | Data processing method, terminal device and computer storage medium based on alliance's chain | |
US20150271148A1 (en) | System and method for transporting a document between a first service provider and a second service provider | |
CN110493237A (en) | Identity management method, device, computer equipment and storage medium | |
CN110263025A (en) | Data liquidation method, electronic equipment and computer storage medium based on alliance's chain | |
CN108769230A (en) | Transaction data storage method, device, server and storage medium | |
CN110246040A (en) | Trade management method, electronic equipment and computer storage medium based on alliance's chain | |
CN108846653A (en) | Big data secure sharing method and system based on block chain | |
CN101247239A (en) | Authenticated authorization accounting system and implementing method thereof | |
CN114565386A (en) | Block chain escrow transaction method and system with multi-party cooperative privacy protection | |
CN114997809A (en) | Government affairs service intelligent examination and approval center platform based on block chain technology | |
CN114881757A (en) | Letter method, system and electronic equipment | |
CN107948970A (en) | System of real name method of network entry, system and the mobile terminal of subordinate terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190920 |