CN110266698A - Pass through the Knowledge Sharing data cochain method and its equipment of block chain - Google Patents

Pass through the Knowledge Sharing data cochain method and its equipment of block chain Download PDF

Info

Publication number
CN110266698A
CN110266698A CN201910547064.6A CN201910547064A CN110266698A CN 110266698 A CN110266698 A CN 110266698A CN 201910547064 A CN201910547064 A CN 201910547064A CN 110266698 A CN110266698 A CN 110266698A
Authority
CN
China
Prior art keywords
knowledge sharing
client
sharing data
public key
knowledge
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910547064.6A
Other languages
Chinese (zh)
Inventor
杨慧
吉建勋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ai Morui Strategic Technology Co Ltd
Original Assignee
Beijing Ai Morui Strategic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ai Morui Strategic Technology Co Ltd filed Critical Beijing Ai Morui Strategic Technology Co Ltd
Priority to CN201910547064.6A priority Critical patent/CN110266698A/en
Publication of CN110266698A publication Critical patent/CN110266698A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

This application discloses the Knowledge Sharing data cochain method and its equipment that pass through block chain, block chain node receives the Knowledge Sharing data cochain request that the first client is sent;Triggering verifies intelligent contract, the intelligent contract of the verification verifies the identity of first client, after verification passes through, the Knowledge Sharing data are encrypted with first client public key, and execute the cochain process of the Knowledge Sharing data of the first client public key encryption;The block chain node receives the inquiry request of the Knowledge Sharing data of the second client, and the inquiry request of the Knowledge Sharing data includes the second client public key;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client.The application can disclose Knowledge Sharing data cochain credible.

Description

Knowledge sharing data chaining method through block chain and equipment thereof
Technical Field
The present application relates to the field of blockchain technology, and in particular, to a method and apparatus for sharing knowledge and data chaining via blockchains.
Background
At present, a block chain technology is based on a decentralized peer-to-peer network, and open source software is used for combining a cryptography principle, time sequence data and a consensus mechanism to ensure the consistency and the persistence of each node in a distributed database, so that information can be immediately verified and traceable, but is difficult to tamper and cannot be shielded, and a set of private, efficient and safe shared value system is created.
The existing knowledge sharing platform (such as an internet classroom) adopts a centralized database to store the contents of knowledge sharing data and the like; however, the database of the knowledge sharing platform has the defects that data is tampered, the authenticity of the data cannot be guaranteed, and the operation platform of the knowledge sharing platform modifies the knowledge sharing display quantity of a certain commodity. Especially for some knowledge sharing platforms with small scale, the safety and the authenticity of the knowledge sharing data can not be ensured: the number of knowledge sharing and displaying of the commodities or the services is not real, and the knowledge sharing and displaying has no reference value, so that misdirection can be caused to the user, and the experience of the user is also influenced.
Therefore, how to store the data of the knowledge sharing platform on the blockchain in a non-falsifiable and trusted manner becomes a problem to be solved urgently.
The above is only for the purpose of assisting understanding of the technical solutions of the present application, and does not represent an admission that the above is prior art.
Disclosure of Invention
In order to solve the problems, the application provides a knowledge sharing data chaining method and device through a block chain.
A first aspect of the present application provides a method for knowledge-shared data chaining over a blockchain, the method comprising:
the method comprises the steps that a block chain node receives a knowledge sharing data uplink request sent by a first client, wherein the knowledge sharing data uplink request comprises a first client public key;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, encrypting the knowledge sharing data by using the first client public key after the verification is passed, and executing a chaining process of the knowledge sharing data encrypted by the first client public key;
the block chain node receives a query request of the knowledge sharing data of a second client, wherein the query request of the knowledge sharing data comprises a public key of the second client;
and triggering a verification intelligent contract, verifying the identity of the second client by the verification intelligent contract, encrypting the knowledge sharing data by using the public key of the second client after the verification is passed, and executing the chaining process of the knowledge sharing data encrypted by the public key of the second client.
In one possible embodiment, the method further comprises: the block chain node receives a knowledge sharing data query request sent by the second client;
and the block chain nodes send knowledge sharing data query responses to the second client, wherein the knowledge sharing data query responses comprise knowledge sharing data encrypted by the public key of the second client, so that the second client can decrypt the knowledge sharing data encrypted by the public key of the second client by using a private key of the second client.
In one possible implementation manner, the knowledge sharing data includes knowledge sharing time, knowledge sharing content, and knowledge sharing users.
In a possible implementation manner, the first client encrypts the knowledge sharing data by using its own public key, specifically: and the first client encrypts the knowledge sharing data in a preset proportion by using a self public key.
In one possible implementation, the knowledge sharing data includes associated attributes and non-associated attributes; and automatically superposing the attribute values of the associated attributes of the knowledge sharing data.
A second aspect of the present application provides a knowledge sharing data uplink apparatus through a blockchain, the apparatus being a blockchain node, the apparatus including a receiving unit and a processing unit; wherein,
the receiving unit receives a knowledge sharing data uplink request sent by a first client, wherein the knowledge sharing data uplink request comprises a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, encrypting the knowledge sharing data by using the first client public key after the verification is passed, and executing a chain process of the knowledge sharing data encrypted by the first client public key;
the receiving unit is used for receiving a query request of the knowledge sharing data of a second client, wherein the query request of the knowledge sharing data comprises a public key of the second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the second client, after the verification is passed, the knowledge sharing data is encrypted by using the second client public key, and a chaining process of the knowledge sharing data encrypted by the second client public key is executed.
In one possible embodiment, the apparatus comprises a transmitting unit; the receiving unit is used for receiving a knowledge sharing data query request sent by the second client;
the sending unit sends a knowledge sharing data query response to the second client, wherein the knowledge sharing data query response comprises knowledge sharing data encrypted by a public key of the second client, so that the second client can decrypt the knowledge sharing data encrypted by the public key of the second client by using a private key of the second client.
In one possible implementation manner, the knowledge sharing data includes knowledge sharing time, knowledge sharing content, and knowledge sharing users.
In a possible implementation manner, the first client encrypts the knowledge sharing data by using its own public key, specifically: and the first client encrypts the knowledge sharing data in a preset proportion by using a self public key.
In one possible implementation, the knowledge sharing data includes associated attributes and non-associated attributes; and automatically superposing the attribute values of the associated attributes of the knowledge sharing data.
According to the method and the device, the data shared by the knowledge can be linked up, so that the knowledge shared data on the chain is credible and is transparent and open.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application.
Fig. 1 is a schematic flow chart illustrating a method for chaining knowledge sharing data through a blockchain according to an embodiment of the present disclosure;
fig. 2 is a schematic flow chart illustrating a method for chaining knowledge sharing data through a blockchain according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a knowledge sharing data uplink apparatus through a blockchain according to an embodiment of the present disclosure.
Detailed Description
In order to more clearly explain the overall concept of the present application, the following detailed description is given by way of example in conjunction with the accompanying drawings.
The terms "first," "second," and the like in the description and in the claims of the present application and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the order of such use may be interchanged under appropriate circumstances such that embodiments of the invention described herein may be practiced in other orders than those illustrated or described herein.
Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The block link point and the client referred to in the embodiment of the application may be understood as an abstract machine that responds to an external specific trigger condition and performs state conversion according to a certain rule, and may be a device that can be networked according to application software, such as a mobile phone, a tablet computer, a palm computer, a personal PC, and the like.
As shown in fig. 1, a method for sharing data uplink through knowledge of a blockchain includes steps S101-S104.
S101, a block link point receives a knowledge sharing data uplink request sent by a first client, wherein the knowledge sharing data uplink request comprises a first client public key.
And S102, triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, encrypting the knowledge sharing data by using the first client public key after the verification is passed, and executing the chain process of the knowledge sharing data encrypted by the first client public key.
And S103, the block chain node receives a query request of the knowledge sharing data of a second client, wherein the query request of the knowledge sharing data comprises a public key of the second client.
And S104, triggering a verification intelligent contract, verifying the identity of the second client by the verification intelligent contract, encrypting the knowledge sharing data by using the public key of the second client after the verification is passed, and executing the chain process of the knowledge sharing data encrypted by the public key of the second client.
In one example, the method further comprises: the block chain node receives a knowledge sharing data query request sent by the second client;
and the block chain nodes send knowledge sharing data query responses to the second client, wherein the knowledge sharing data query responses comprise knowledge sharing data encrypted by the public key of the second client, so that the second client can decrypt the knowledge sharing data encrypted by the public key of the second client by using a private key of the second client.
In one example, the knowledge sharing data includes knowledge sharing time, knowledge sharing content, and knowledge sharing users.
In one example, the first client encrypts the knowledge sharing data with its own public key, specifically: and the first client encrypts the knowledge sharing data in a preset proportion by using a self public key.
In one example, the knowledge sharing data includes associated attributes and non-associated attributes; and automatically superposing the attribute values of the associated attributes of the knowledge sharing data.
In the above example, the first client is used as an operator of the knowledge sharing data, and the second client is used as a querier of the knowledge sharing data; for a specific knowledge sharing platform, each user can be an operator of the knowledge sharing data or an inquirer of the knowledge sharing data.
Taking fig. 2 as an example, a process of the uplink method applied to knowledge sharing data on a blockchain according to the present application is described, which includes S201-S209.
S201, a first client sends a knowledge sharing data uplink request to a block chain node, where the knowledge sharing data uplink request includes a first client public key.
And S202, triggering a verification intelligent contract on the block chain, verifying the identity of the first client by the verification intelligent contract, encrypting the knowledge sharing data by using the first client public key, and executing the uplink process on the knowledge sharing data encrypted by the first client public key.
The blockchain node encrypts the knowledge sharing data by using the first client public key, wherein the encryption can be performed on all fields of the knowledge sharing data or partial fields of the knowledge sharing data, such as: only privacy-related content is encrypted; or the knowledge sharing data may not be encrypted.
In addition, the knowledge sharing data includes two attributes, an associated attribute and a non-associated attribute. For example: the user knowledge sharing operation time belongs to the non-associated attribute, and the knowledge sharing operation time of each user can be stored in the block chain; for example: the display times of the knowledge sharing data are the associated attributes, the data format of the knowledge sharing includes the knowledge sharing display times, and the attribute values of the knowledge sharing display times can be automatically superposed as long as other users see the knowledge sharing data from respective terminals.
The checking means that whether the first client is a user of the knowledge sharing platform is judged, and only the user of the knowledge sharing platform can have the authority to uplink the knowledge sharing data.
It should be noted that the uplink process is a conventional process in the art and will not be described in detail. For example: and under the workload certification PoW common mode, packaging and verifying the data, wherein the block link point of the account right can place the packaged block in the next block of the current block as a new block uplink.
The knowledge sharing data comprises knowledge sharing time, knowledge sharing users and knowledge sharing content, and the knowledge sharing content relates to multiple fields, such as the mother-infant field, the education field and the professional training field. For example: the user has professional knowledge in a certain field and can open a course to share own knowledge; other users may view the lessons free or at a fee. For example: tengcong classroom, Internet Yi classroom. These data include the time and content of the data generation, as well as the number of times the course was viewed.
S203, the block node sends a knowledge sharing data uplink response to the first ue.
And S204, the second client sends the knowledge sharing data query request to the block chain node, wherein the knowledge sharing data query request comprises the public key of the second client.
At this time, the user corresponding to the second client may query the knowledge sharing data after seeing the knowledge sharing data. In the application, the first client and the second client are both terminal devices provided with decentralized application software, and can directly perform information interaction with the blockchain nodes on the blockchain.
And S205, triggering a verification intelligent contract on the block chain, verifying the identity of the second client by the verification intelligent contract, encrypting the knowledge sharing data by using the public key of the second client after the verification is passed, and executing the uplink process on the knowledge sharing data encrypted by the public key of the second client.
After the verification is passed, executing the next flow; the check fails and the process terminates.
And S206, the block link sends a knowledge sharing data query response to the second client.
And S207, the second client sends a knowledge sharing data query request to the block chain node.
And S208, the block nodes send knowledge sharing data query responses to the second client, wherein the knowledge sharing data query responses comprise the knowledge sharing data encrypted by the public key of the second client.
S209, the second client decrypts the knowledge sharing data encrypted by the public key of the second client using its own private key, so as to obtain the knowledge sharing data.
According to the method and the device, the knowledge sharing data can be linked, the linking process is public and transparent, and any user of the same knowledge sharing platform can view the knowledge sharing data; the authenticity of knowledge sharing data is guaranteed.
It should be noted that, in the application, the client directly performs information interaction with the nodes of the block chain, and the nodes of the block chain directly store information on the block chain without a centralized server, so that the knowledge sharing data is more open and credible; rather than the existing client interacting with a centralized server.
As shown in fig. 3, an apparatus for sharing data uplink through knowledge of a blockchain, the apparatus being a blockchain node, includes a receiving unit and a processing unit.
The receiving unit receives a knowledge sharing data uplink request sent by a first client, wherein the knowledge sharing data uplink request comprises a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, encrypting the knowledge sharing data by using the first client public key after the verification is passed, and executing a chain process of the knowledge sharing data encrypted by the first client public key;
the receiving unit is used for receiving a query request of the knowledge sharing data of a second client, wherein the query request of the knowledge sharing data comprises a public key of the second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the second client, after the verification is passed, the knowledge sharing data is encrypted by using the second client public key, and a chaining process of the knowledge sharing data encrypted by the second client public key is executed.
In one example, the apparatus includes a transmitting unit; the receiving unit is used for receiving a knowledge sharing data query request sent by the second client;
the sending unit sends a knowledge sharing data query response to the second client, wherein the knowledge sharing data query response comprises knowledge sharing data encrypted by a public key of the second client, so that the second client can decrypt the knowledge sharing data encrypted by the public key of the second client by using a private key of the second client.
In one example, the knowledge sharing data includes knowledge sharing time, knowledge sharing content, and knowledge sharing users.
In one example, the first client encrypts the knowledge sharing data with its own public key, specifically: and the first client encrypts the knowledge sharing data in a preset proportion by using a self public key.
In one example, the knowledge sharing data includes associated attributes and non-associated attributes; and automatically superposing the attribute values of the associated attributes of the knowledge sharing data.
According to the method and the device, the knowledge sharing data can be linked, the linking process is public and transparent, and any user of the same knowledge sharing platform can view the knowledge sharing data; the authenticity of knowledge sharing data is guaranteed.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for sharing data uplinks via knowledge of a blockchain, the method comprising:
the method comprises the steps that a block chain node receives a knowledge sharing data uplink request sent by a first client, wherein the knowledge sharing data uplink request comprises a first client public key;
triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, encrypting the knowledge sharing data by using the first client public key after the verification is passed, and executing a chaining process of the knowledge sharing data encrypted by the first client public key;
the block chain node receives a query request of the knowledge sharing data of a second client, wherein the query request of the knowledge sharing data comprises a public key of the second client;
and triggering a verification intelligent contract, verifying the identity of the second client by the verification intelligent contract, encrypting the knowledge sharing data by using the public key of the second client after the verification is passed, and executing the chaining process of the knowledge sharing data encrypted by the public key of the second client.
2. The method of claim 1, further comprising:
the block chain node receives a knowledge sharing data query request sent by the second client;
and the block chain nodes send knowledge sharing data query responses to the second client, wherein the knowledge sharing data query responses comprise knowledge sharing data encrypted by the public key of the second client, so that the second client can decrypt the knowledge sharing data encrypted by the public key of the second client by using a private key of the second client.
3. The method of claim 1, wherein the knowledge sharing data comprises knowledge sharing time, knowledge sharing content, and knowledge sharing users.
4. The method according to claim 1, wherein the first client encrypts the knowledge sharing data with its own public key, specifically:
and the first client encrypts the knowledge sharing data in a preset proportion by using a self public key.
5. The method of claim 1, wherein the knowledge sharing data comprises associated attributes and non-associated attributes; wherein,
and automatically superposing the attribute values of the associated attributes of the knowledge sharing data.
6. Knowledge sharing data uplink equipment through a block chain is characterized in that the equipment is a block chain node and comprises a receiving unit and a processing unit; wherein,
the receiving unit receives a knowledge sharing data uplink request sent by a first client, wherein the knowledge sharing data uplink request comprises a public key of the first client;
the processing unit is used for triggering a verification intelligent contract, verifying the identity of the first client by the verification intelligent contract, encrypting the knowledge sharing data by using the first client public key after the verification is passed, and executing a chain process of the knowledge sharing data encrypted by the first client public key;
the receiving unit is used for receiving a query request of the knowledge sharing data of a second client, wherein the query request of the knowledge sharing data comprises a public key of the second client;
and the processing unit triggers a verification intelligent contract, the verification intelligent contract verifies the identity of the second client, after the verification is passed, the knowledge sharing data is encrypted by using the second client public key, and a chaining process of the knowledge sharing data encrypted by the second client public key is executed.
7. The apparatus of claim 6, wherein the apparatus comprises a transmitting unit;
the receiving unit is used for receiving a knowledge sharing data query request sent by the second client;
the sending unit sends a knowledge sharing data query response to the second client, wherein the knowledge sharing data query response comprises knowledge sharing data encrypted by a public key of the second client, so that the second client can decrypt the knowledge sharing data encrypted by the public key of the second client by using a private key of the second client.
8. The apparatus of claim 6, wherein the knowledge sharing data comprises knowledge sharing time, knowledge sharing content, and knowledge sharing users.
9. The device according to claim 6, wherein the first client encrypts the knowledge sharing data with its own public key, specifically:
and the first client encrypts the knowledge sharing data in a preset proportion by using a self public key.
10. The apparatus of claim 6, wherein the knowledge sharing data comprises associated attributes and non-associated attributes; wherein,
and automatically superposing the attribute values of the associated attributes of the knowledge sharing data.
CN201910547064.6A 2019-06-24 2019-06-24 Pass through the Knowledge Sharing data cochain method and its equipment of block chain Pending CN110266698A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910547064.6A CN110266698A (en) 2019-06-24 2019-06-24 Pass through the Knowledge Sharing data cochain method and its equipment of block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910547064.6A CN110266698A (en) 2019-06-24 2019-06-24 Pass through the Knowledge Sharing data cochain method and its equipment of block chain

Publications (1)

Publication Number Publication Date
CN110266698A true CN110266698A (en) 2019-09-20

Family

ID=67920778

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910547064.6A Pending CN110266698A (en) 2019-06-24 2019-06-24 Pass through the Knowledge Sharing data cochain method and its equipment of block chain

Country Status (1)

Country Link
CN (1) CN110266698A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113204682A (en) * 2021-05-13 2021-08-03 武汉理工大学 Knowledge inquiry transaction system and method based on knowledge alliance chain
CN114254365A (en) * 2021-12-26 2022-03-29 迅鳐成都科技有限公司 Block chain technology-based key value data directional sharing method, device, system and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113204682A (en) * 2021-05-13 2021-08-03 武汉理工大学 Knowledge inquiry transaction system and method based on knowledge alliance chain
CN114254365A (en) * 2021-12-26 2022-03-29 迅鳐成都科技有限公司 Block chain technology-based key value data directional sharing method, device, system and storage medium

Similar Documents

Publication Publication Date Title
CN105072108B (en) Transmission method, the apparatus and system of user information
CN110225032B (en) Business data transaction method and equipment
CN110232286B (en) E-commerce data chaining method and equipment applying intelligent contracts
CN110247918A (en) Number cochain method and its equipment are shaken applied to block chain
CN115333775B (en) Data processing method, device, equipment and storage medium based on privacy calculation
CN110247923A (en) Number cochain method and its equipment are shaken based on block chain
CN110266698A (en) Pass through the Knowledge Sharing data cochain method and its equipment of block chain
CN110263563A (en) By means of the ad click data cochain method and its equipment of block chain
CN110232287A (en) Pass through the shared economic data cochain method and its equipment of block chain
CN110266699A (en) Prize drawing data cochain method and its equipment applied to block chain
CN110266696A (en) A kind of evaluation data cochain method and its equipment applied to block chain
CN110263100A (en) Using the shared economic data cochain method and its equipment of intelligent contract
CN110247921A (en) A kind of polled data cochain method and its equipment for applying intelligent contract
CN110264206A (en) A kind of electric quotient data cochain method and its equipment based on block chain
CN110263529A (en) Number cochain method and its equipment are shaken using intelligent contract
CN110245512A (en) Lottery data cochain method and its equipment applied to block chain
CN110213294A (en) By means of the community data cochain method and its equipment of block chain
CN110266695A (en) Using the lottery data cochain method and its equipment of intelligent contract
CN110233853A (en) It is a kind of to thumb up data cochain method and its equipment applied to block chain
CN110210861A (en) Data trade method and its equipment on block chain
CN110266691A (en) Credit data cochain method and its equipment based on block chain
CN110233852A (en) Prize drawing data cochain method and its equipment based on block chain
CN110263042A (en) Shared economic data cochain method and its equipment based on block chain
CN110213296A (en) It is a kind of that data cochain method and its equipment are thumbed up based on block chain
CN110264205A (en) A kind of electric quotient data cochain method and its equipment applied to block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication