CN110310176A - A kind of data ciphering method and device based on block chain network - Google Patents

A kind of data ciphering method and device based on block chain network Download PDF

Info

Publication number
CN110310176A
CN110310176A CN201910563571.9A CN201910563571A CN110310176A CN 110310176 A CN110310176 A CN 110310176A CN 201910563571 A CN201910563571 A CN 201910563571A CN 110310176 A CN110310176 A CN 110310176A
Authority
CN
China
Prior art keywords
block chain
chain network
data
network node
cryptographic hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910563571.9A
Other languages
Chinese (zh)
Other versions
CN110310176B (en
Inventor
陈进添
黄芳菲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI DIVEO TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI DIVEO TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI DIVEO TECHNOLOGY Co Ltd filed Critical SHANGHAI DIVEO TECHNOLOGY Co Ltd
Priority to CN201910563571.9A priority Critical patent/CN110310176B/en
Publication of CN110310176A publication Critical patent/CN110310176A/en
Application granted granted Critical
Publication of CN110310176B publication Critical patent/CN110310176B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • G06Q50/40
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to field of communication technology more particularly to a kind of data ciphering methods and device based on block chain network, wherein including step S1, obtaining the first block chain network node, obtaining the first cryptographic Hash by hash algorithm;Step S2, the private key of the first cryptographic Hash and the first block chain network node is obtained into the second cryptographic Hash and the first digital digest value;Step S3, the first digital digest value is encrypted;Step S4, judge whether other data gateways receive the data of the first block chain network node, if so, being transferred to step S5;Step S5, confirm the second block chain network node;Step S6, third cryptographic Hash and the second digital digest value are obtained, and the second digital digest value is encrypted;Step S7, gradually confirm other block chain network nodes, generate intelligent contract and be transmitted to cloud.The beneficial effect of technical solution of the present invention is: data can not distort, and can count the data of collection, have stronger statistics, and safety is higher.

Description

A kind of data ciphering method and device based on block chain network
Technical field
The present invention relates to field of communication technology more particularly to a kind of data ciphering methods and dress based on block chain network It sets.
Background technique
In general, internet of things equipment (sensor, smart home) collected data, take the processing of marginal end+center-side Mode, but during storing and transmitting, be easy to be distorted by people, Information Security is lower, shows sum number so as to cause data According to analysis result error.
Traditional internet of things data processing method cannot ensure, Internet of Things in the safety of data stored and transmitted Equipment acquisition equipment to the measure of data encryption almost without and in actual operation, bottom-up employee is in order to give general headquarters Data be " correct ", data can be distorted, therefore, for above-mentioned problem, become those skilled in the art urgently Problem to be solved.
Summary of the invention
For the above-mentioned problems in the prior art, a kind of safety of data for being intended to ensure internet of things equipment is now provided The data ciphering method and device based on block chain network of property.
Specific technical solution is as follows:
The present invention provides a kind of data ciphering method based on block chain network, uses plurality of data gateway to form one Block chain network, wherein the data ciphering method the following steps are included:
Step S1, the data gateway of source data will be received as the first block chain network node, and according to described First block chain network node obtains the first cryptographic Hash by hash algorithm;
Step S2, the private key of first cryptographic Hash and the first block chain network node is calculated with the Hash Method obtains public key of second cryptographic Hash as the second block chain network node, and obtains the first digital digest value;
Step S3, with the private key of the first block chain network node, described first is counted by Digital Signature Algorithm Word digest value is encrypted, and generation time is stabbed;
Step S4, each data gateway judges itself whether need to receive the number of the first block chain network node According to processing result,
If so, being transferred to step S5;
If it is not, then abandoning handling the data processed result;
Step S5, the receiving time that each data gateway receives the data processed result is compared, most The data gateway that first confirmation receives the data processed result is the second block chain network node;
Step S6, by the decryption digital digest value of the first block chain network node and the first digital digest value into Row compare, judge whether it is identical,
If so, passing through the Kazakhstan in conjunction with first cryptographic Hash according to the private key of the second block chain network node Uncommon algorithm obtains third cryptographic Hash and the second digital digest value, and encrypts to the second digital digest value;
If it is not, then abandoning handling the data of the second block chain network node;
Step S7, by circulation step S4- step S5, gradually confirm other block chain network nodes, generate intelligent contract, And it is transmitted to cloud.
Preferably, a plurality of data gateways include at least six.
Preferably, in Yu Suoshu step S1, a graphics processor is respectively set on a plurality of data gateways, is used for Promote the data-handling capacity of the data gateway.
Preferably, in Yu Suoshu step S3, by the encrypted first digital digest value and the second cryptographic Hash and institute It states timestamp and records number of processes, be transmitted to the block chain network.
Preferably, a plurality of data gateways are spread in the block chain network by point-to-point mode.
Preferably, in Yu Suoshu step S1, the first block chain network node is received by the hash algorithm Data be mapped as 256 binary strings and obtain first cryptographic Hash.
Preferably, in Yu Suoshu step S5, each data gateway is connect by way of with Network Time Protocol The receiving time for receiving the data processed result is compared.
The invention also includes a kind of data encryption devices based on block chain network, are based on block chain using above-mentioned one kind The data ciphering method of network.
The beneficial effect of technical solution of the present invention is: provide a kind of data ciphering method based on block chain network and Device, after source data forms the processing of block chain network by plurality of data gateway, so that treated, data have read-only category Property, and can not distort, the data of collection can be counted, there is stronger statistics, and data are true and reliable, safety It is higher.
Detailed description of the invention
With reference to appended attached drawing, more fully to describe the embodiment of the present invention.However, appended attached drawing be merely to illustrate and It illustrates, and is not meant to limit the scope of the invention.
Fig. 1 is the step of present invention applies the data ciphering method of example figure.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art without creative labor it is obtained it is all its His embodiment, shall fall within the protection scope of the present invention.
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the present invention can phase Mutually combination.
The present invention will be further explained below with reference to the attached drawings and specific examples, but not as the limitation of the invention.
The present invention provides a kind of data ciphering method based on block chain network, wherein includes the following steps:
Step S1, the data gateway of source data will be received as the first block chain network node, and according to the first block Chain network node obtains the first cryptographic Hash by hash algorithm;
Step S2, the private key of the first cryptographic Hash and the first block chain network node is used into hash algorithm, obtains second and breathes out Public key of the uncommon value as the second block chain network node, and obtain the first digital digest value;
Step S3, with the private key of the first block chain network node, by Digital Signature Algorithm by the first digital digest value It is encrypted, and generation time is stabbed;
Step S4, each data gateway judges itself whether need to receive the data processing knot of the first block chain network node Fruit,
If so, being transferred to step S5;
If it is not, then abandoning processing data processed result;
Step S5, the receiving time that each data gateway receives data processed result is compared, confirmation connects at first The data gateway for receiving data processed result is the second block chain network node;
Step S6, the decryption digital digest value of the first block chain network node is compared with the first digital digest value, Judge whether it is identical,
If so, combining the first cryptographic Hash according to the private key of the second block chain network node, the is obtained by hash algorithm Three cryptographic Hash and the second digital digest value, and the second digital digest value is encrypted;
If it is not, then abandoning the data of the second block chain network node of processing;
Step S7, by circulation step S4- step S5, gradually confirm other block chain network nodes, generate intelligent contract, And it is transmitted to cloud.
Specifically, as shown in Figure 1, source will be received by plurality of data net virtual at a privately owned block chain network The node is obtained first by hash algorithm and breathed out by first block chain network node of the data gateway of data as data processing Uncommon value, that is, the public key of the first block chain network node.
Further, by above-mentioned first cryptographic Hash (public key of the first block chain network node) and the first block chain network section The private key of point, new cryptographic Hash, that is, the second cryptographic Hash is generated with hash algorithm, and using the new cryptographic Hash as next The public key of a block chain network node, that is, the public key of the second block chain network node, and obtain the number of the second cryptographic Hash Digest value, and the digital digest value is unique.
Further, the private key of the first block chain network node is added digital digest value by Digital Signature Algorithm It is close, and generation time is stabbed, then by the digital digest value of encryption and the second cryptographic Hash and timestamp and records number of processes (herein Number of processes is 1 time), it is transmitted to block chain network, carries out data processing with next block chain network node, in addition, it is necessary to Illustrate, the result that the first block chain network node carries out data processing can only be received by only one block chain network node And it handles.
Further, other data gateways in block chain network are according to the data processing knot of the first block chain network node Fruit will combine the operational capability of oneself (it should be noted that other data gateways in block chain network have the number that need to be handled According to), to determine whether the data of the first block chain network node-node transmission are received, if so, determining to receive the first block chain network The data of node-node transmission, and the time for the data that other each data gateways receive the first block chain network node is integrated It compares, confirmation receives the data gateway of data at first, and as the second block chain network node;If it is not, then in block chain network Some data gateways due to needing to handle itself other data, have no ability to handle new data, to abandon processing the The data of one block chain network node-node transmission.
Further, the data and then utilization of the first block chain network node are received in the second block chain network node The number of the decryption digital digest value of first block chain network node and the second cryptographic Hash of the first block chain network node transmitting Digest value is compared, for confirming whether the second cryptographic Hash is correct and being not tampered with.
Further, if the digital digest value of above-mentioned decryption digital digest value and the second cryptographic Hash is not identical, second Cryptographic Hash is modified, and the second block chain network node abandons the data of the first block chain network node-node transmission of processing;If above-mentioned The digital digest value for decrypting digital digest value and the second cryptographic Hash is identical, then the second block chain network node is by its private key in conjunction with the First cryptographic Hash of one block chain network node is regenerated new cryptographic Hash (third cryptographic Hash) and is obtained by hash algorithm Take the second digital digest value, and to the encryption of the second digital digest value after, (number of processes is binding time stamp herein with number of processes 2 times), then third cryptographic Hash and the second digital digest value of encryption are transmitted to next block chain network node.
Further, by the process of the data receiver of circulation the second block chain network node of confirmation, gradually confirm other Block chain network node, and the result of the processing data of all block chain network nodes is reached common understanding, that is, thinks the data processing Result treatment is completed, and intelligent contract is generated, and be transmitted to cloud, for follow-up storage, application, displaying.
In conclusion the data after plurality of blocks chain network node processing then need to change if necessary to change The data of each block chain network node can't announce the truth of the block chain network node of encryption, so that modification ratio It is more difficult, and altered data higher cost, it is not easy to be tampered to reach data, ensure that the authenticity and safety of data Property.
In a kind of preferably case study on implementation, plurality of data gateway includes at least six.
Specifically, to the program of complete operation data encryption, then six are at least needed.
In a kind of preferably case study on implementation, in step S1, it is respectively set on plurality of data gateway at a figure Device is managed, for promoting the data-handling capacity of data gateway.
Specifically, each data gateway is increased into a graphics processor on the original basis, for promoted calculate power and Performance, so that each data gateway possesses real time data processing ability.
In a kind of preferably case study on implementation, in step S3, by encrypted first digital digest value and the second Hash Value and timestamp simultaneously record number of processes, are transmitted to block chain network.
In a kind of preferably case study on implementation, plurality of data gateway is spread in the block chain by point-to-point mode In network.
Specifically, plurality of data gateway is spread in block chain network by way of P2P (point-to-point), so that each Data gateway can all receive a data processed result from the first block chain network node.
In a kind of preferably case study on implementation, in step S1, the first block chain network node is connect by hash algorithm The data received are mapped as 256 binary strings, for obtaining the first cryptographic Hash.
In a kind of preferably case study on implementation, in step S5, by every number by way of with Network Time Protocol It is compared according to the receiving time that gateway receives data processed result.
Specifically, if other data gateways in block chain network determine to receive the number of the first block chain network node-node transmission According to, then with Network Time Protocol (NTP) by other each data gateways receive the first block chain network node data when Between carry out global alignment, confirmation receives the data gateway of data at first, for will receive the data gateways of data at first as the Two block chain network nodes.
The present invention also provides a kind of data encryption devices based on block chain network, are based on block chain using above-mentioned one kind The data ciphering method of network.
The foregoing is merely preferred embodiments of the present invention, are not intended to limit embodiments of the present invention and protection model It encloses, to those skilled in the art, should can appreciate that all with made by description of the invention and diagramatic content Equivalent replacement and obviously change obtained scheme, should all be included within the scope of the present invention.

Claims (8)

1. a kind of data ciphering method based on block chain network, which is characterized in that use plurality of data gateway to form one Block chain network, the data ciphering method the following steps are included:
Step S1, the data gateway of source data will be received as the first block chain network node, and according to described first Block chain network node obtains the first cryptographic Hash by hash algorithm;
Step S2, the private key of first cryptographic Hash and the first block chain network node is used into the hash algorithm, obtained It takes the second cryptographic Hash as the public key of the second block chain network node, and obtains the first digital digest value;
Step S3, with the private key of the first block chain network node, first number is plucked by Digital Signature Algorithm It is worth and is encrypted, and generation time is stabbed;
Step S4, each data gateway judges itself whether need to receive at the data of the first block chain network node Reason as a result,
If so, being transferred to step S5;
If it is not, then abandoning handling the data processed result;
Step S5, the receiving time that each data gateway receives the data processed result is compared, at first really Recognize receive the data processed result the data gateway be the second block chain network node;
Step S6, the decryption digital digest value of the first block chain network node and the first digital digest value are compared It is right, judge whether it is identical,
If so, being calculated in conjunction with first cryptographic Hash by the Hash according to the private key of the second block chain network node Method obtains third cryptographic Hash and the second digital digest value, and encrypts to the second digital digest value;
If it is not, then abandoning handling the data of the second block chain network node;
Step S7, by circulation step S4- step S5, gradually confirm other block chain network nodes, generate intelligent contract, and pass Transport to cloud.
2. a kind of data ciphering method based on block chain network according to claim 1, which is characterized in that a plurality of institutes Data gateway is stated including at least six.
3. a kind of data ciphering method based on block chain network according to claim 2, which is characterized in that in the step In rapid S1, a graphics processor is respectively set on a plurality of data gateways, for promoting the data of the data gateway Processing capacity.
4. a kind of data ciphering method based on block chain network according to claim 1, which is characterized in that in the step In rapid S3, by the encrypted first digital digest value and the second cryptographic Hash and the timestamp and number of processes is recorded, It is transmitted to the block chain network.
5. a kind of data ciphering method based on block chain network according to claim 3, which is characterized in that a plurality of institutes Data gateway is stated to be spread in the block chain network by point-to-point mode.
6. a kind of data ciphering method based on block chain network according to claim 1, which is characterized in that in the step In rapid S1, by the hash algorithm by the data that the first block chain network node receives be mapped as the two of 256 into System string obtains first cryptographic Hash.
7. a kind of data ciphering method based on block chain network according to claim 1, which is characterized in that in the step In rapid S5, each data gateway is received into connecing for the data processed result by way of with Network Time Protocol It is compared between time receiving.
8. a kind of data encryption device based on block chain network, which is characterized in that using above-mentioned as claim 1-7 is any one A kind of data ciphering method based on block chain network described in.
CN201910563571.9A 2019-06-26 2019-06-26 Data encryption method and device based on block chain network Active CN110310176B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910563571.9A CN110310176B (en) 2019-06-26 2019-06-26 Data encryption method and device based on block chain network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910563571.9A CN110310176B (en) 2019-06-26 2019-06-26 Data encryption method and device based on block chain network

Publications (2)

Publication Number Publication Date
CN110310176A true CN110310176A (en) 2019-10-08
CN110310176B CN110310176B (en) 2022-07-08

Family

ID=68077566

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910563571.9A Active CN110310176B (en) 2019-06-26 2019-06-26 Data encryption method and device based on block chain network

Country Status (1)

Country Link
CN (1) CN110310176B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111193730A (en) * 2019-12-25 2020-05-22 上海沄界信息科技有限公司 IoT trusted scene construction method and device
CN111447174A (en) * 2020-02-19 2020-07-24 江苏荣泽信息科技股份有限公司 Data encryption method based on block chain
CN111475828A (en) * 2020-05-14 2020-07-31 杭州烽顺科技信息服务有限公司 Encryption method and device, decryption method and device of block chain account book data
CN111985006A (en) * 2020-08-18 2020-11-24 深圳中兴网信科技有限公司 Block chain based data synchronization method, system and computer readable storage medium
CN113050436A (en) * 2021-02-10 2021-06-29 北京邮电大学 Intelligent home control system based on private block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107493162A (en) * 2017-07-25 2017-12-19 中国联合网络通信集团有限公司 The implementation method and device of block chain node
US9992022B1 (en) * 2017-02-06 2018-06-05 Northern Trust Corporation Systems and methods for digital identity management and permission controls within distributed network nodes
CN109067524A (en) * 2018-07-31 2018-12-21 杭州复杂美科技有限公司 A kind of public private key pair generation method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9992022B1 (en) * 2017-02-06 2018-06-05 Northern Trust Corporation Systems and methods for digital identity management and permission controls within distributed network nodes
CN107493162A (en) * 2017-07-25 2017-12-19 中国联合网络通信集团有限公司 The implementation method and device of block chain node
CN109067524A (en) * 2018-07-31 2018-12-21 杭州复杂美科技有限公司 A kind of public private key pair generation method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
戴婕: "基于密钥管理和无中心化加密的网联汽车信息安全的设计与实现", 《中国优秀硕士学位论文全文数据库》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111193730A (en) * 2019-12-25 2020-05-22 上海沄界信息科技有限公司 IoT trusted scene construction method and device
CN111447174A (en) * 2020-02-19 2020-07-24 江苏荣泽信息科技股份有限公司 Data encryption method based on block chain
CN111475828A (en) * 2020-05-14 2020-07-31 杭州烽顺科技信息服务有限公司 Encryption method and device, decryption method and device of block chain account book data
CN111475828B (en) * 2020-05-14 2022-05-13 杭州烽顺科技信息服务有限公司 Encryption method and device, decryption method and device of block chain account book data
CN111985006A (en) * 2020-08-18 2020-11-24 深圳中兴网信科技有限公司 Block chain based data synchronization method, system and computer readable storage medium
CN113050436A (en) * 2021-02-10 2021-06-29 北京邮电大学 Intelligent home control system based on private block chain

Also Published As

Publication number Publication date
CN110310176B (en) 2022-07-08

Similar Documents

Publication Publication Date Title
CN110310176A (en) A kind of data ciphering method and device based on block chain network
KR102415097B1 (en) Methods and apparatus for efficiently implementing a distributed database within a network
AU2021200222B2 (en) Methods and apparatus for a distributed database including anonymous entries
CN110599147B (en) Ciphertext retrieval fair payment method and system based on block chain
Bonawitz et al. Practical secure aggregation for privacy-preserving machine learning
EP3574482B1 (en) Voting system and method
CN107682308A (en) The electronic evidence preservation system for Channel Technology of being dived based on block chain
CN109194702B (en) Medical data recording method, system, computer device and storage medium
CN109829726B (en) Block chain-based drug information management method and system
CN108646983A (en) The treating method and apparatus of storage service data on block chain
JP2019511151A (en) Cryptographic method and system for secure extraction of data from blockchain
CN111209591B (en) Storage structure sorted according to time and quick query method
CN106982203A (en) The ATM network system and its information processing method of robust based on block chain technology
CN110532734A (en) A kind of digital publishing rights method and system of the privacy timestamp based on multi-party computations
CN110610098A (en) Data set generation method and device
CN115086049A (en) System and method for sharing block chain medical data based on verifiable delay function
CN113935874A (en) District chain-based book management system for studying income
RU2775994C2 (en) Methods and device for effective implementation of a distributed database in a network
RU2775263C2 (en) Methods and apparatus for a distributed database containing anonymous input data
CN117312441B (en) Agricultural product yield estimation method and system based on blockchain
CN117978555A (en) Storage method and device of archaeological culture data dictionary in new stone era
Balmiki An Evidence Collection Using Blockchain for Cybercrime Detection
CN117354329A (en) Method and system for managing place name information based on block chain technology
MR et al. A Novel Approach in Cloud based IoT Devices using Rough Set Method for Ensuring Security
CN117499416A (en) Space information management method and system based on block chain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A data encryption method and device based on blockchain network

Granted publication date: 20220708

Pledgee: Industrial Bank Co.,Ltd. Shanghai Dahua sub branch

Pledgor: SHANGHAI DIVEO ELECTRONIC EQUIPMENT CO.,LTD.

Registration number: Y2024310000139

PE01 Entry into force of the registration of the contract for pledge of patent right