CN110310176A - A kind of data ciphering method and device based on block chain network - Google Patents
A kind of data ciphering method and device based on block chain network Download PDFInfo
- Publication number
- CN110310176A CN110310176A CN201910563571.9A CN201910563571A CN110310176A CN 110310176 A CN110310176 A CN 110310176A CN 201910563571 A CN201910563571 A CN 201910563571A CN 110310176 A CN110310176 A CN 110310176A
- Authority
- CN
- China
- Prior art keywords
- block chain
- chain network
- data
- network node
- cryptographic hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000012545 processing Methods 0.000 claims description 17
- 230000001737 promoting effect Effects 0.000 claims description 2
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 238000004891 communication Methods 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 abstract description 2
- 230000005540 biological transmission Effects 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 5
- 235000013399 edible fruits Nutrition 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
-
- G06Q50/40—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention relates to field of communication technology more particularly to a kind of data ciphering methods and device based on block chain network, wherein including step S1, obtaining the first block chain network node, obtaining the first cryptographic Hash by hash algorithm;Step S2, the private key of the first cryptographic Hash and the first block chain network node is obtained into the second cryptographic Hash and the first digital digest value;Step S3, the first digital digest value is encrypted;Step S4, judge whether other data gateways receive the data of the first block chain network node, if so, being transferred to step S5;Step S5, confirm the second block chain network node;Step S6, third cryptographic Hash and the second digital digest value are obtained, and the second digital digest value is encrypted;Step S7, gradually confirm other block chain network nodes, generate intelligent contract and be transmitted to cloud.The beneficial effect of technical solution of the present invention is: data can not distort, and can count the data of collection, have stronger statistics, and safety is higher.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of data ciphering methods and dress based on block chain network
It sets.
Background technique
In general, internet of things equipment (sensor, smart home) collected data, take the processing of marginal end+center-side
Mode, but during storing and transmitting, be easy to be distorted by people, Information Security is lower, shows sum number so as to cause data
According to analysis result error.
Traditional internet of things data processing method cannot ensure, Internet of Things in the safety of data stored and transmitted
Equipment acquisition equipment to the measure of data encryption almost without and in actual operation, bottom-up employee is in order to give general headquarters
Data be " correct ", data can be distorted, therefore, for above-mentioned problem, become those skilled in the art urgently
Problem to be solved.
Summary of the invention
For the above-mentioned problems in the prior art, a kind of safety of data for being intended to ensure internet of things equipment is now provided
The data ciphering method and device based on block chain network of property.
Specific technical solution is as follows:
The present invention provides a kind of data ciphering method based on block chain network, uses plurality of data gateway to form one
Block chain network, wherein the data ciphering method the following steps are included:
Step S1, the data gateway of source data will be received as the first block chain network node, and according to described
First block chain network node obtains the first cryptographic Hash by hash algorithm;
Step S2, the private key of first cryptographic Hash and the first block chain network node is calculated with the Hash
Method obtains public key of second cryptographic Hash as the second block chain network node, and obtains the first digital digest value;
Step S3, with the private key of the first block chain network node, described first is counted by Digital Signature Algorithm
Word digest value is encrypted, and generation time is stabbed;
Step S4, each data gateway judges itself whether need to receive the number of the first block chain network node
According to processing result,
If so, being transferred to step S5;
If it is not, then abandoning handling the data processed result;
Step S5, the receiving time that each data gateway receives the data processed result is compared, most
The data gateway that first confirmation receives the data processed result is the second block chain network node;
Step S6, by the decryption digital digest value of the first block chain network node and the first digital digest value into
Row compare, judge whether it is identical,
If so, passing through the Kazakhstan in conjunction with first cryptographic Hash according to the private key of the second block chain network node
Uncommon algorithm obtains third cryptographic Hash and the second digital digest value, and encrypts to the second digital digest value;
If it is not, then abandoning handling the data of the second block chain network node;
Step S7, by circulation step S4- step S5, gradually confirm other block chain network nodes, generate intelligent contract,
And it is transmitted to cloud.
Preferably, a plurality of data gateways include at least six.
Preferably, in Yu Suoshu step S1, a graphics processor is respectively set on a plurality of data gateways, is used for
Promote the data-handling capacity of the data gateway.
Preferably, in Yu Suoshu step S3, by the encrypted first digital digest value and the second cryptographic Hash and institute
It states timestamp and records number of processes, be transmitted to the block chain network.
Preferably, a plurality of data gateways are spread in the block chain network by point-to-point mode.
Preferably, in Yu Suoshu step S1, the first block chain network node is received by the hash algorithm
Data be mapped as 256 binary strings and obtain first cryptographic Hash.
Preferably, in Yu Suoshu step S5, each data gateway is connect by way of with Network Time Protocol
The receiving time for receiving the data processed result is compared.
The invention also includes a kind of data encryption devices based on block chain network, are based on block chain using above-mentioned one kind
The data ciphering method of network.
The beneficial effect of technical solution of the present invention is: provide a kind of data ciphering method based on block chain network and
Device, after source data forms the processing of block chain network by plurality of data gateway, so that treated, data have read-only category
Property, and can not distort, the data of collection can be counted, there is stronger statistics, and data are true and reliable, safety
It is higher.
Detailed description of the invention
With reference to appended attached drawing, more fully to describe the embodiment of the present invention.However, appended attached drawing be merely to illustrate and
It illustrates, and is not meant to limit the scope of the invention.
Fig. 1 is the step of present invention applies the data ciphering method of example figure.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art without creative labor it is obtained it is all its
His embodiment, shall fall within the protection scope of the present invention.
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the present invention can phase
Mutually combination.
The present invention will be further explained below with reference to the attached drawings and specific examples, but not as the limitation of the invention.
The present invention provides a kind of data ciphering method based on block chain network, wherein includes the following steps:
Step S1, the data gateway of source data will be received as the first block chain network node, and according to the first block
Chain network node obtains the first cryptographic Hash by hash algorithm;
Step S2, the private key of the first cryptographic Hash and the first block chain network node is used into hash algorithm, obtains second and breathes out
Public key of the uncommon value as the second block chain network node, and obtain the first digital digest value;
Step S3, with the private key of the first block chain network node, by Digital Signature Algorithm by the first digital digest value
It is encrypted, and generation time is stabbed;
Step S4, each data gateway judges itself whether need to receive the data processing knot of the first block chain network node
Fruit,
If so, being transferred to step S5;
If it is not, then abandoning processing data processed result;
Step S5, the receiving time that each data gateway receives data processed result is compared, confirmation connects at first
The data gateway for receiving data processed result is the second block chain network node;
Step S6, the decryption digital digest value of the first block chain network node is compared with the first digital digest value,
Judge whether it is identical,
If so, combining the first cryptographic Hash according to the private key of the second block chain network node, the is obtained by hash algorithm
Three cryptographic Hash and the second digital digest value, and the second digital digest value is encrypted;
If it is not, then abandoning the data of the second block chain network node of processing;
Step S7, by circulation step S4- step S5, gradually confirm other block chain network nodes, generate intelligent contract,
And it is transmitted to cloud.
Specifically, as shown in Figure 1, source will be received by plurality of data net virtual at a privately owned block chain network
The node is obtained first by hash algorithm and breathed out by first block chain network node of the data gateway of data as data processing
Uncommon value, that is, the public key of the first block chain network node.
Further, by above-mentioned first cryptographic Hash (public key of the first block chain network node) and the first block chain network section
The private key of point, new cryptographic Hash, that is, the second cryptographic Hash is generated with hash algorithm, and using the new cryptographic Hash as next
The public key of a block chain network node, that is, the public key of the second block chain network node, and obtain the number of the second cryptographic Hash
Digest value, and the digital digest value is unique.
Further, the private key of the first block chain network node is added digital digest value by Digital Signature Algorithm
It is close, and generation time is stabbed, then by the digital digest value of encryption and the second cryptographic Hash and timestamp and records number of processes (herein
Number of processes is 1 time), it is transmitted to block chain network, carries out data processing with next block chain network node, in addition, it is necessary to
Illustrate, the result that the first block chain network node carries out data processing can only be received by only one block chain network node
And it handles.
Further, other data gateways in block chain network are according to the data processing knot of the first block chain network node
Fruit will combine the operational capability of oneself (it should be noted that other data gateways in block chain network have the number that need to be handled
According to), to determine whether the data of the first block chain network node-node transmission are received, if so, determining to receive the first block chain network
The data of node-node transmission, and the time for the data that other each data gateways receive the first block chain network node is integrated
It compares, confirmation receives the data gateway of data at first, and as the second block chain network node;If it is not, then in block chain network
Some data gateways due to needing to handle itself other data, have no ability to handle new data, to abandon processing the
The data of one block chain network node-node transmission.
Further, the data and then utilization of the first block chain network node are received in the second block chain network node
The number of the decryption digital digest value of first block chain network node and the second cryptographic Hash of the first block chain network node transmitting
Digest value is compared, for confirming whether the second cryptographic Hash is correct and being not tampered with.
Further, if the digital digest value of above-mentioned decryption digital digest value and the second cryptographic Hash is not identical, second
Cryptographic Hash is modified, and the second block chain network node abandons the data of the first block chain network node-node transmission of processing;If above-mentioned
The digital digest value for decrypting digital digest value and the second cryptographic Hash is identical, then the second block chain network node is by its private key in conjunction with the
First cryptographic Hash of one block chain network node is regenerated new cryptographic Hash (third cryptographic Hash) and is obtained by hash algorithm
Take the second digital digest value, and to the encryption of the second digital digest value after, (number of processes is binding time stamp herein with number of processes
2 times), then third cryptographic Hash and the second digital digest value of encryption are transmitted to next block chain network node.
Further, by the process of the data receiver of circulation the second block chain network node of confirmation, gradually confirm other
Block chain network node, and the result of the processing data of all block chain network nodes is reached common understanding, that is, thinks the data processing
Result treatment is completed, and intelligent contract is generated, and be transmitted to cloud, for follow-up storage, application, displaying.
In conclusion the data after plurality of blocks chain network node processing then need to change if necessary to change
The data of each block chain network node can't announce the truth of the block chain network node of encryption, so that modification ratio
It is more difficult, and altered data higher cost, it is not easy to be tampered to reach data, ensure that the authenticity and safety of data
Property.
In a kind of preferably case study on implementation, plurality of data gateway includes at least six.
Specifically, to the program of complete operation data encryption, then six are at least needed.
In a kind of preferably case study on implementation, in step S1, it is respectively set on plurality of data gateway at a figure
Device is managed, for promoting the data-handling capacity of data gateway.
Specifically, each data gateway is increased into a graphics processor on the original basis, for promoted calculate power and
Performance, so that each data gateway possesses real time data processing ability.
In a kind of preferably case study on implementation, in step S3, by encrypted first digital digest value and the second Hash
Value and timestamp simultaneously record number of processes, are transmitted to block chain network.
In a kind of preferably case study on implementation, plurality of data gateway is spread in the block chain by point-to-point mode
In network.
Specifically, plurality of data gateway is spread in block chain network by way of P2P (point-to-point), so that each
Data gateway can all receive a data processed result from the first block chain network node.
In a kind of preferably case study on implementation, in step S1, the first block chain network node is connect by hash algorithm
The data received are mapped as 256 binary strings, for obtaining the first cryptographic Hash.
In a kind of preferably case study on implementation, in step S5, by every number by way of with Network Time Protocol
It is compared according to the receiving time that gateway receives data processed result.
Specifically, if other data gateways in block chain network determine to receive the number of the first block chain network node-node transmission
According to, then with Network Time Protocol (NTP) by other each data gateways receive the first block chain network node data when
Between carry out global alignment, confirmation receives the data gateway of data at first, for will receive the data gateways of data at first as the
Two block chain network nodes.
The present invention also provides a kind of data encryption devices based on block chain network, are based on block chain using above-mentioned one kind
The data ciphering method of network.
The foregoing is merely preferred embodiments of the present invention, are not intended to limit embodiments of the present invention and protection model
It encloses, to those skilled in the art, should can appreciate that all with made by description of the invention and diagramatic content
Equivalent replacement and obviously change obtained scheme, should all be included within the scope of the present invention.
Claims (8)
1. a kind of data ciphering method based on block chain network, which is characterized in that use plurality of data gateway to form one
Block chain network, the data ciphering method the following steps are included:
Step S1, the data gateway of source data will be received as the first block chain network node, and according to described first
Block chain network node obtains the first cryptographic Hash by hash algorithm;
Step S2, the private key of first cryptographic Hash and the first block chain network node is used into the hash algorithm, obtained
It takes the second cryptographic Hash as the public key of the second block chain network node, and obtains the first digital digest value;
Step S3, with the private key of the first block chain network node, first number is plucked by Digital Signature Algorithm
It is worth and is encrypted, and generation time is stabbed;
Step S4, each data gateway judges itself whether need to receive at the data of the first block chain network node
Reason as a result,
If so, being transferred to step S5;
If it is not, then abandoning handling the data processed result;
Step S5, the receiving time that each data gateway receives the data processed result is compared, at first really
Recognize receive the data processed result the data gateway be the second block chain network node;
Step S6, the decryption digital digest value of the first block chain network node and the first digital digest value are compared
It is right, judge whether it is identical,
If so, being calculated in conjunction with first cryptographic Hash by the Hash according to the private key of the second block chain network node
Method obtains third cryptographic Hash and the second digital digest value, and encrypts to the second digital digest value;
If it is not, then abandoning handling the data of the second block chain network node;
Step S7, by circulation step S4- step S5, gradually confirm other block chain network nodes, generate intelligent contract, and pass
Transport to cloud.
2. a kind of data ciphering method based on block chain network according to claim 1, which is characterized in that a plurality of institutes
Data gateway is stated including at least six.
3. a kind of data ciphering method based on block chain network according to claim 2, which is characterized in that in the step
In rapid S1, a graphics processor is respectively set on a plurality of data gateways, for promoting the data of the data gateway
Processing capacity.
4. a kind of data ciphering method based on block chain network according to claim 1, which is characterized in that in the step
In rapid S3, by the encrypted first digital digest value and the second cryptographic Hash and the timestamp and number of processes is recorded,
It is transmitted to the block chain network.
5. a kind of data ciphering method based on block chain network according to claim 3, which is characterized in that a plurality of institutes
Data gateway is stated to be spread in the block chain network by point-to-point mode.
6. a kind of data ciphering method based on block chain network according to claim 1, which is characterized in that in the step
In rapid S1, by the hash algorithm by the data that the first block chain network node receives be mapped as the two of 256 into
System string obtains first cryptographic Hash.
7. a kind of data ciphering method based on block chain network according to claim 1, which is characterized in that in the step
In rapid S5, each data gateway is received into connecing for the data processed result by way of with Network Time Protocol
It is compared between time receiving.
8. a kind of data encryption device based on block chain network, which is characterized in that using above-mentioned as claim 1-7 is any one
A kind of data ciphering method based on block chain network described in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910563571.9A CN110310176B (en) | 2019-06-26 | 2019-06-26 | Data encryption method and device based on block chain network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910563571.9A CN110310176B (en) | 2019-06-26 | 2019-06-26 | Data encryption method and device based on block chain network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110310176A true CN110310176A (en) | 2019-10-08 |
CN110310176B CN110310176B (en) | 2022-07-08 |
Family
ID=68077566
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910563571.9A Active CN110310176B (en) | 2019-06-26 | 2019-06-26 | Data encryption method and device based on block chain network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110310176B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111193730A (en) * | 2019-12-25 | 2020-05-22 | 上海沄界信息科技有限公司 | IoT trusted scene construction method and device |
CN111447174A (en) * | 2020-02-19 | 2020-07-24 | 江苏荣泽信息科技股份有限公司 | Data encryption method based on block chain |
CN111475828A (en) * | 2020-05-14 | 2020-07-31 | 杭州烽顺科技信息服务有限公司 | Encryption method and device, decryption method and device of block chain account book data |
CN111985006A (en) * | 2020-08-18 | 2020-11-24 | 深圳中兴网信科技有限公司 | Block chain based data synchronization method, system and computer readable storage medium |
CN113050436A (en) * | 2021-02-10 | 2021-06-29 | 北京邮电大学 | Intelligent home control system based on private block chain |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107493162A (en) * | 2017-07-25 | 2017-12-19 | 中国联合网络通信集团有限公司 | The implementation method and device of block chain node |
US9992022B1 (en) * | 2017-02-06 | 2018-06-05 | Northern Trust Corporation | Systems and methods for digital identity management and permission controls within distributed network nodes |
CN109067524A (en) * | 2018-07-31 | 2018-12-21 | 杭州复杂美科技有限公司 | A kind of public private key pair generation method and system |
-
2019
- 2019-06-26 CN CN201910563571.9A patent/CN110310176B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9992022B1 (en) * | 2017-02-06 | 2018-06-05 | Northern Trust Corporation | Systems and methods for digital identity management and permission controls within distributed network nodes |
CN107493162A (en) * | 2017-07-25 | 2017-12-19 | 中国联合网络通信集团有限公司 | The implementation method and device of block chain node |
CN109067524A (en) * | 2018-07-31 | 2018-12-21 | 杭州复杂美科技有限公司 | A kind of public private key pair generation method and system |
Non-Patent Citations (1)
Title |
---|
戴婕: "基于密钥管理和无中心化加密的网联汽车信息安全的设计与实现", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111193730A (en) * | 2019-12-25 | 2020-05-22 | 上海沄界信息科技有限公司 | IoT trusted scene construction method and device |
CN111447174A (en) * | 2020-02-19 | 2020-07-24 | 江苏荣泽信息科技股份有限公司 | Data encryption method based on block chain |
CN111475828A (en) * | 2020-05-14 | 2020-07-31 | 杭州烽顺科技信息服务有限公司 | Encryption method and device, decryption method and device of block chain account book data |
CN111475828B (en) * | 2020-05-14 | 2022-05-13 | 杭州烽顺科技信息服务有限公司 | Encryption method and device, decryption method and device of block chain account book data |
CN111985006A (en) * | 2020-08-18 | 2020-11-24 | 深圳中兴网信科技有限公司 | Block chain based data synchronization method, system and computer readable storage medium |
CN113050436A (en) * | 2021-02-10 | 2021-06-29 | 北京邮电大学 | Intelligent home control system based on private block chain |
Also Published As
Publication number | Publication date |
---|---|
CN110310176B (en) | 2022-07-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110310176A (en) | A kind of data ciphering method and device based on block chain network | |
KR102415097B1 (en) | Methods and apparatus for efficiently implementing a distributed database within a network | |
AU2021200222B2 (en) | Methods and apparatus for a distributed database including anonymous entries | |
CN110599147B (en) | Ciphertext retrieval fair payment method and system based on block chain | |
Bonawitz et al. | Practical secure aggregation for privacy-preserving machine learning | |
EP3574482B1 (en) | Voting system and method | |
CN107682308A (en) | The electronic evidence preservation system for Channel Technology of being dived based on block chain | |
CN109194702B (en) | Medical data recording method, system, computer device and storage medium | |
CN109829726B (en) | Block chain-based drug information management method and system | |
CN108646983A (en) | The treating method and apparatus of storage service data on block chain | |
JP2019511151A (en) | Cryptographic method and system for secure extraction of data from blockchain | |
CN111209591B (en) | Storage structure sorted according to time and quick query method | |
CN106982203A (en) | The ATM network system and its information processing method of robust based on block chain technology | |
CN110532734A (en) | A kind of digital publishing rights method and system of the privacy timestamp based on multi-party computations | |
CN110610098A (en) | Data set generation method and device | |
CN115086049A (en) | System and method for sharing block chain medical data based on verifiable delay function | |
CN113935874A (en) | District chain-based book management system for studying income | |
RU2775994C2 (en) | Methods and device for effective implementation of a distributed database in a network | |
RU2775263C2 (en) | Methods and apparatus for a distributed database containing anonymous input data | |
CN117312441B (en) | Agricultural product yield estimation method and system based on blockchain | |
CN117978555A (en) | Storage method and device of archaeological culture data dictionary in new stone era | |
Balmiki | An Evidence Collection Using Blockchain for Cybercrime Detection | |
CN117354329A (en) | Method and system for managing place name information based on block chain technology | |
MR et al. | A Novel Approach in Cloud based IoT Devices using Rough Set Method for Ensuring Security | |
CN117499416A (en) | Space information management method and system based on block chain technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A data encryption method and device based on blockchain network Granted publication date: 20220708 Pledgee: Industrial Bank Co.,Ltd. Shanghai Dahua sub branch Pledgor: SHANGHAI DIVEO ELECTRONIC EQUIPMENT CO.,LTD. Registration number: Y2024310000139 |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right |