CN110661786B - User data system based on chain relation - Google Patents

User data system based on chain relation Download PDF

Info

Publication number
CN110661786B
CN110661786B CN201910830046.9A CN201910830046A CN110661786B CN 110661786 B CN110661786 B CN 110661786B CN 201910830046 A CN201910830046 A CN 201910830046A CN 110661786 B CN110661786 B CN 110661786B
Authority
CN
China
Prior art keywords
chain
information
user
module
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910830046.9A
Other languages
Chinese (zh)
Other versions
CN110661786A (en
Inventor
孙沈银
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Heshu Information Technology Co ltd
Original Assignee
Hangzhou Lixiang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Lixiang Technology Co ltd filed Critical Hangzhou Lixiang Technology Co ltd
Priority to CN201910830046.9A priority Critical patent/CN110661786B/en
Publication of CN110661786A publication Critical patent/CN110661786A/en
Application granted granted Critical
Publication of CN110661786B publication Critical patent/CN110661786B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to a user data system based on chain relation, which comprises a background end, a central server, a data server and a chain diagram server, wherein the central server is connected with the background end; the data security is guaranteed through an encryption mode, the security is improved on the premise that the data response efficiency is not affected through storage and processing of the closed-loop server, and meanwhile, the back end is more convenient and visual when calling or retrieving information.

Description

User data system based on chain relation
Technical Field
The invention relates to the field of data processing, in particular to a user data system based on chain relation.
Background
Data (Data) is a representation of facts, concepts or instructions that can be processed by either manual or automated means. After the data is interpreted and given a certain meaning, it becomes information. Data processing (data processing) is the collection, storage, retrieval, processing, transformation, and transmission of data.
The basic purpose of data processing is to extract and derive valuable, meaningful data for certain people from large, possibly chaotic, unintelligible amounts of data.
Data processing is the basic link of system engineering and automatic control. Data processing is throughout various fields of social production and social life. The development of data processing technology and the breadth and depth of its application have greatly influenced the progress of human society development. With the development of networks, data processing and deep learning become important application technologies of current network services and e-commerce platforms, user data management is an important ring of user information in a network service system, and the security of user data is also an important element, so a user data system satisfying both convenience and security is needed. Nowadays, in order to ensure the security of data, the data user end and the data transmission end are usually encrypted and finally decrypted at the terminal, but this results in multiple times of encryption and decryption of data, thereby resulting in great discount on reading and application convenience of user data. If the encryption program is not provided, although the convenience is satisfied, the security of the data in the transmission is threatened. In addition, the storage modes of the data in the database include a plurality of storage modes, and different data storage modes have different storage characteristics and reading efficiency differences. Therefore, it is desirable to provide a user data system that is energy efficient and satisfies the portability of frequently accessed databases on a daily basis, while sufficiently ensuring data transfer security.
Disclosure of Invention
In view of the above, the present invention provides a user data system based on chain relation to solve the above problems.
In order to solve the technical problems, the technical scheme of the invention is as follows: a user data system based on chain relation comprises a background end, a central server, a data server and a chain diagram server;
a user accesses a central server through a terminal and inputs corresponding user information, the central server is configured with a chain generation module and an encryption module, the chain generation module is used for generating chain relation information, the chain relation information comprises at least two chain end main body information and chain segment content information, the chain end main body information corresponds to the user, the chain segment content information reflects the association between the users corresponding to the chain end main body information, the encryption module comprises a first encryption algorithm and a second encryption algorithm, the chain end main body information is encrypted through the first encryption algorithm to generate a plurality of chain end ciphertexts and user information keys corresponding to the chain end ciphertexts, the chain segment content information is encrypted through the second encryption algorithm to generate chain segment ciphertexts and corresponding chain relation keys, and the chain information is formed according to the chain end ciphertexts and the chain segment ciphertexts, sending the chain information to the data server, sending the chain relation key to the chain graph server, and sending the user information key to the background end;
the background end is configured with a user database, the user database is used for storing user information and user information keys, the background end comprises a service request module, the service request module is used for generating service request information, the service request information comprises user information and a user key group corresponding to the user information, the user key group comprises a plurality of user information keys corresponding to the user information, and the service request module sends the service request information to the data server;
the data server is provided with a chain database, the chain database is used for storing the chain information, the data server is provided with a screening module, the screening module is provided with a screening algorithm, the screening module screens the chain database through the screening algorithm and generates a chain information group, the chain information group comprises a plurality of chain information, the chain information in the chain information group corresponds to the user information keys of the user key group one by one, and the data server sends the chain information group and the user key group to the chain diagram server;
the chain diagram server is configured with a key database used for storing the chain relation keys, the chain diagram server comprises a calling module, a decryption module and a chain diagram simulation module, the chain diagram simulation module is configured with a calling strategy, the calling module calls the key database through the calling strategy to generate a chain diagram key group, the chain diagram key group comprises a plurality of chain relation keys, the chain relation keys in the chain diagram key group correspond to the chain information in the chain information group one by one, the decryption module is configured with a first decryption algorithm and a second decryption algorithm, each chain end ciphertext in the chain information group is decrypted through the first decryption algorithm to obtain chain end main body information, each chain ciphertext in the chain information group is decrypted through the second decryption algorithm to obtain chain segment content information, the chain diagram simulation module is configured with a chain diagram simulation strategy, the chain diagram simulation strategy determines the position of a main body node in a preset chain diagram model according to chain end main body information, and connects each main body node according to chain segment content information to generate a new chain diagram model, and outputs the chain diagram model to the background end.
Furthermore, a lower memory area is configured in the user database corresponding to each user information, and the user in the lower memory area stores the user information key corresponding to the user information.
Further, the chain diagram simulation module is further configured with a chain diagram completion strategy, the chain diagram completion strategy includes a plurality of completion conditions, and when any main body node meets the completion conditions, the main body nodes are connected according to the completion conditions.
Further, the chain diagram server also comprises an updating module, wherein the updating module generates new chain relation information according to the new chain diagram simulation model, sends the new chain relation information to the central server and generates an updating instruction at the same time;
when the background end receives the updating instruction, deleting a user information key corresponding to the updating instruction from the user database;
when the data server receives the updating instruction, chain information corresponding to the updating instruction is deleted from the chain database;
and when the chain graph server receives the updating instruction, deleting the chain relation key corresponding to the updating instruction from the key database.
Further, the chain information has a first index for matching with the user information key.
Further, the chain information has a second index, and the second index is used for matching with the chain relation key.
Further, the chain segment content information comprises affinity value information, and the affinity value information reflects the interactive activity degree between users.
Further, the intimacy value information is obtained according to the operation behavior of the user at the terminal.
Further, the segment content information includes jurisdiction information reflecting a jurisdiction level status between two users.
Further, the first encryption algorithm and the second encryption algorithm both adopt symmetric encryption algorithms.
The technical effects of the invention are mainly reflected in the following aspects: through setting up like this, at first guaranteed the security of data through the mode of encryption, through the server storage and the processing of closed-loop type for under the prerequisite that does not influence data response efficiency, improve the security, make the back end when calling or retrieving information simultaneously, it is more convenient, directly perceived.
Drawings
FIG. 1: the invention relates to a data encryption architecture diagram of a user data system based on chain relation;
FIG. 2: the invention relates to a data call architecture diagram of a user data system based on chain relation.
Reference numerals: 1. a terminal; 100. a central server; 110. a chain generation module; 120. an encryption module; 200. a back desk end; 210. a user database; 220. a service request module; 300. a data server; 301. a key database; 310. a screening module; 400. a chain graph server; 401. a chain database; 410. a calling module; 420. a decryption module; 430. a chain graph simulation module; 440. and updating the module.
Detailed Description
The following detailed description of the embodiments of the present invention is provided in order to make the technical solution of the present invention easier to understand and understand.
Referring to fig. 1, a user data system based on chain relationship includes a backend 200, a central server 100, a data server 300, and a chain server 400; the invention is based on the relationship between users, the related users exist in the form of account data, namely, one user information corresponds to one account and also corresponds to one user, and the invention aims to provide a system which enables the account data to be stored safely and simultaneously each account to be connected through a chain relationship.
A user accesses the central server 100 through the terminal 1 and inputs corresponding user information, the central server 100 is configured with a chain generation module 110 and an encryption module 120, the chain generation module 110 is configured to generate chain relation information, the chain relation information includes at least two link main body information and a link content information, the link main body information corresponds to the user, the link content information reflects the association between users corresponding to the link main body information, the encryption module 120 includes a first encryption algorithm and a second encryption algorithm, the link main body information is encrypted through the first encryption algorithm to generate a plurality of link ciphertexts and user information keys corresponding to the link ciphertexts, the link content information is encrypted through the second encryption algorithm to generate link ciphertexts and corresponding chain relation keys, and chain information is formed according to the link ciphertexts and the link ciphertexts, sending the chain information to the data server 300, sending the chain relation key to the chain graph server 400, and sending the user information key to the backend 200; and the first encryption algorithm and the second encryption algorithm both adopt symmetric encryption algorithms. The chain segment content information comprises affinity value information, and the affinity value information reflects the interactive activity degree between users. The intimacy value information is obtained according to the operation behavior of the user at the terminal 1. The segment content information includes jurisdiction information reflecting a jurisdiction level status between two users. Firstly, a user accesses the central server 100 through the terminal 1 (including mobile phone \ IPAD \ computer and other electronic devices), and uploads information or leaves a behavior trace on the central server 100, and the purpose of the chain generation module 110 is to generate a chain relationship, for example, the user A is the upper level of the user B, then the user can input the information through the terminal 1, then the chain generation module generates chain relationship information, two chain end main bodies are the user A and the user B respectively, and the chain segment content information is the upper level of a certain department of a certain company, thus forming the user relationship of A and B, and the encryption module 120 user processes the generated chain relationship information, sends the obtained user information key to the background end 200, sends the chain relationship key to the chain graph server 400, and then sends the whole data with content to the data processing server, thus, the data and the secret key are respectively stored, the service is realized through the server, and the background end 200 can acquire the data without the security problem of the data. In this way, new encrypted chain information can be continuously generated.
The backend 200 is configured with a user database 210, the user database 210 is configured to store user information and a user information key, the backend 200 includes a service request module 220, the service request module 220 is configured to generate service request information, the service request information includes user information and a user key group corresponding to the user information, the user key group includes a plurality of user information keys corresponding to the user information, and the service request module 220 sends the service request information to the data server 300; the user database 210 is configured with a lower memory area corresponding to each user information, and the lower memory area stores the user information key corresponding to the user information. The first and second terminals 200 have two functions of storing and retrieving, and the first function is a storing function, since the user applies for an account through the central server 100 first, and the user information is stored in the user database 210, and when the background terminal 200 receives the user information key, the user information key can be stored under the corresponding user name, so that the retrieval efficiency is higher, and the retrieving function is that the user retrieves all the user information keys related to a, forms a user key group, and sends the user key group to the chain database 401.
The data server 300 is configured with a chain database 401, the chain database 401 is configured to store the chain information, the data server 300 is configured with a screening module 310, the screening module 310 is configured with a screening algorithm, the screening module 310 screens the chain database 401 by the screening algorithm to generate a chain information set, the chain information set includes a plurality of chain information, the chain information in the chain information set corresponds to the user information keys of the user key set one by one, and the data server 300 sends the chain information set and the user key set to the chain map server 400; the chain information has a first index for matching with the user information key. The chain database 401 has chain information, and since an index is constructed during encryption, a corresponding chain information group can be screened from the chain database 401 through the first index and sent to the next-stage chain map server 400.
The chain graph server 400 is configured with a key database 301, the key database 301 is configured to store the chain relation key, the chain graph server 400 includes a calling module 410, a decryption module 420, and a chain graph simulation module 430, the calling module 410 is configured with a calling policy, the calling module 410 calls the key database 301 through the calling policy and generates a chain graph key set, the chain graph key set includes a plurality of chain relation keys, the chain relation keys in the chain graph key set correspond to the chain information in the chain information set one by one, the decryption module 420 is configured with a first decryption algorithm and a second decryption algorithm, each chain end ciphertext in the chain information set is decrypted through the first decryption algorithm to obtain chain end main body information, each chain ciphertext in the chain information set is decrypted through the second decryption algorithm to obtain chain end content information, the chain diagram simulation module 430 is configured with a chain diagram simulation strategy, which determines the positions of the main body nodes in a preset chain diagram model according to the chain end main body information, connects each main body node according to the chain segment content information to generate a new chain diagram model, and outputs the chain diagram model to the backend 200. The chain diagram simulation module 430 is further configured with a chain diagram completion strategy, where the chain diagram completion strategy includes a plurality of completion conditions, and when any subject node meets the completion conditions, the subject nodes are connected according to the completion conditions. The chain diagram server 400 further includes an updating module 440, where the updating module 440 generates new chain relationship information according to the new chain diagram simulation model, sends the new chain relationship information to the central server 100, and generates an updating instruction; the chain information has a second index for matching with the chain relation key. When the background terminal 200 receives the update instruction, deleting the user information key corresponding to the update instruction from the user database 210; when the data server 300 receives the update instruction, deleting the chain information corresponding to the update instruction from the chain database 401; when the chain graph server 400 receives the update instruction, the chain relation key corresponding to the update instruction is deleted from the key database 301. Firstly, the chain diagram server 400 has several functions, firstly, the chain diagram key group is called through the second index, and at this time, the chain diagram server 400 has the chain information group, the user key group and the chain diagram key group of the user a, so that the relationship establishment can be performed on each chain information in a one-to-one correspondence manner, meanwhile, the establishment of the model is realized through the chain diagram drawing manner, and then the background end 200 can intuitively obtain the chain data related to the user a. The second function is a completion function, and the relationship is established through a model, for example, a family relationship, a work relationship, a friend relationship, a supply relationship, a purchase relationship and the like can be established in different model partitions, so that completion of information of a related account of A can be realized through a certain completion algorithm, for example, A is the upper level of B, and if A is also the upper level of C, the relationship between B and C is a colleague; in this way, a complete chain diagram can be obtained. The third function is to reestablish data, which is very critical, and the newly established chain diagram model is simplified, so that the reconstruction of the chain diagram model can be realized, the storage information is regenerated from the reconstructed relationship, the original storage information is deleted, and it should be noted that a plurality of accounts can be provided in one call without limitation.
The above are only typical examples of the present invention, and besides, the present invention may have other embodiments, and all the technical solutions formed by equivalent substitutions or equivalent changes are within the scope of the present invention as claimed.

Claims (10)

1. A user data system based on chain relation is characterized by comprising a background end, a central server, a data server and a chain diagram server;
a user accesses a central server through a terminal and inputs corresponding user information, the central server is configured with a chain generation module and an encryption module, the chain generation module is used for generating chain relation information, the chain relation information comprises at least two chain end main body information and chain segment content information, the chain end main body information corresponds to the user, the chain segment content information reflects the association between the users corresponding to the chain end main body information, the encryption module comprises a first encryption algorithm and a second encryption algorithm, the chain end main body information is encrypted through the first encryption algorithm to generate a plurality of chain end ciphertexts and user information keys corresponding to the chain end ciphertexts, the chain segment content information is encrypted through the second encryption algorithm to generate chain segment ciphertexts and corresponding chain relation keys, and the chain information is formed according to the chain end ciphertexts and the chain segment ciphertexts, sending the chain information to the data server, sending the chain relation key to the chain graph server, and sending the user information key to the background end;
the background end is configured with a user database, the user database is used for storing user information and user information keys, the background end comprises a service request module, the service request module is used for generating service request information, the service request information comprises user information and a user key group corresponding to the user information, the user key group comprises a plurality of user information keys corresponding to the user information, and the service request module sends the service request information to the data server;
the data server is provided with a chain database, the chain database is used for storing the chain information, the data server is provided with a screening module, the screening module is provided with a screening algorithm, the screening module screens the chain database through the screening algorithm and generates a chain information group, the chain information group comprises a plurality of chain information, the chain information in the chain information group corresponds to the user information keys of the user key group one by one, and the data server sends the chain information group and the user key group to the chain diagram server;
the chain diagram server is configured with a key database used for storing the chain relation keys, the chain diagram server comprises a calling module, a decryption module and a chain diagram simulation module, the chain diagram simulation module is configured with a calling strategy, the calling module calls the key database through the calling strategy to generate a chain diagram key group, the chain diagram key group comprises a plurality of chain relation keys, the chain relation keys in the chain diagram key group correspond to the chain information in the chain information group one by one, the decryption module is configured with a first decryption algorithm and a second decryption algorithm, each chain end ciphertext in the chain information group is decrypted through the first decryption algorithm to obtain chain end main body information, each chain ciphertext in the chain information group is decrypted through the second decryption algorithm to obtain chain segment content information, the chain diagram simulation module is configured with a chain diagram simulation strategy, the chain diagram simulation strategy determines the position of a main body node in a preset chain diagram model according to chain end main body information, and connects each main body node according to chain segment content information to generate a new chain diagram model, and outputs the chain diagram model to the background end.
2. The system according to claim 1, wherein a lower memory area is configured in the user database for each user information, and the lower memory area stores the user information key corresponding to the user information.
3. The user data system according to claim 1, wherein the chain graph simulation module is further configured with a chain graph completion policy, the chain graph completion policy includes a plurality of completion conditions, and when any subject node meets the completion conditions, the subject node is connected according to the completion conditions.
4. The user data system based on chain relationship as claimed in claim 3, wherein the chain diagram server further comprises an updating module, the updating module generates new chain relationship information according to the new chain diagram simulation model, and sends the new chain relationship information to the central server, and generates an updating instruction;
when the background end receives the updating instruction, deleting a user information key corresponding to the updating instruction from the user database;
when the data server receives the updating instruction, chain information corresponding to the updating instruction is deleted from the chain database;
and when the chain graph server receives the updating instruction, deleting the chain relation key corresponding to the updating instruction from the key database.
5. The chain relationship-based user data system of claim 1, wherein the chain information has a first index for key matching with the user information.
6. The system as claimed in claim 1, wherein the chain information has a second index, and the second index is used for matching with the chain relation key.
7. The user data system according to claim 1, wherein the segment content information comprises affinity value information, and the affinity value information reflects the interactive activity between users.
8. The system according to claim 7, wherein the affinity information is obtained according to a user's operation behavior at the terminal.
9. The chain relationship-based user data system of claim 1, wherein the segment content information includes jurisdiction information, the jurisdiction information reflecting a jurisdiction level status between two users.
10. The chain relationship-based user data system of claim 1, wherein the first encryption algorithm and the second encryption algorithm both employ symmetric encryption algorithms.
CN201910830046.9A 2019-09-04 2019-09-04 User data system based on chain relation Active CN110661786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910830046.9A CN110661786B (en) 2019-09-04 2019-09-04 User data system based on chain relation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910830046.9A CN110661786B (en) 2019-09-04 2019-09-04 User data system based on chain relation

Publications (2)

Publication Number Publication Date
CN110661786A CN110661786A (en) 2020-01-07
CN110661786B true CN110661786B (en) 2021-10-08

Family

ID=69037737

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910830046.9A Active CN110661786B (en) 2019-09-04 2019-09-04 User data system based on chain relation

Country Status (1)

Country Link
CN (1) CN110661786B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101593196A (en) * 2008-05-30 2009-12-02 日电(中国)有限公司 The methods, devices and systems that are used for rapidly searching ciphertext
CN102333280A (en) * 2011-09-26 2012-01-25 中兴通讯股份有限公司 Business secret key renewing method and system and business processing server
CN105956143A (en) * 2016-05-11 2016-09-21 深圳市永兴元科技有限公司 Database access method and database proxy node
CN107111721A (en) * 2014-08-12 2017-08-29 杰威航空技术有限公司 Data security system and method
CN110008725A (en) * 2019-04-01 2019-07-12 王龙 A kind of user structure data processing system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8051032B2 (en) * 2008-07-31 2011-11-01 Yahoo! Inc. System and method for loading records into a partitioned database table
US8396870B2 (en) * 2009-06-25 2013-03-12 University Of Tennessee Research Foundation Method and apparatus for predicting object properties and events using similarity-based information retrieval and modeling

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101593196A (en) * 2008-05-30 2009-12-02 日电(中国)有限公司 The methods, devices and systems that are used for rapidly searching ciphertext
CN102333280A (en) * 2011-09-26 2012-01-25 中兴通讯股份有限公司 Business secret key renewing method and system and business processing server
CN107111721A (en) * 2014-08-12 2017-08-29 杰威航空技术有限公司 Data security system and method
CN105956143A (en) * 2016-05-11 2016-09-21 深圳市永兴元科技有限公司 Database access method and database proxy node
CN110008725A (en) * 2019-04-01 2019-07-12 王龙 A kind of user structure data processing system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Probabilistic Image Modeling With an Extended Chain Graph for Human Activity Recognition and Image Segmentation";Lei Zhang、Zhi Zeng、Qiang Ji;《IEEE Transactions on Image Processing》;IEEE;20110317;第20卷(第9期);全文 *
"一种基于区块链技术的可信电子投票方法";范洪博、谢华材、张晶;《软件导刊》;20180515;第17卷(第05期);第34-39页 *

Also Published As

Publication number Publication date
CN110661786A (en) 2020-01-07

Similar Documents

Publication Publication Date Title
US11947680B2 (en) Model parameter training method, terminal, and system based on federation learning, and medium
CN103023875B (en) A kind of account management system and method
CN107948146B (en) Connection keyword retrieval method based on attribute encryption in hybrid cloud
CN107370730A (en) A kind of log-on message processing method and equipment
CN108111585A (en) Distributed storage method based on block chain
US20110167093A1 (en) Address list system and implementation method thereof
CN107948192A (en) A kind of block chain account customization identification and login method and system
CN109862025A (en) Access control method, apparatus and system based on black and white lists
CN109885749A (en) A kind of anti-grasping system of webpage information data
US8189562B2 (en) Method and system for providing dynamic speed-dial list
CN107844308A (en) A kind of information processing method, device and equipment
CN106155721A (en) The deployment method of application program, the generation method and device of the recommendation page
CN109005058A (en) A kind of intelligence system control platform and management-control method
CN108694333A (en) User information processing method and processing device
CN109767098A (en) Processing method, device, computer equipment and the storage medium of product attribute
CN106341492A (en) Distributed memory data storing and reading method based on cloud communication service
US20090037443A1 (en) Intelligent group communication
Kabir et al. A dynamic searchable encryption scheme for secure cloud server operation reserving multi-keyword ranked search
CN110661786B (en) User data system based on chain relation
Liu et al. Smart hardware hybrid secure searchable encryption in cloud with IoT privacy management for smart home system
EP2348676B1 (en) Method for accessing magnanimity data of intelligent network service database and system and device thereof
CN109032694A (en) A kind of data load method and terminal
CN112800066A (en) Index management method, related device and storage medium
US20150242501A1 (en) Social network address book
CN111625843A (en) Data transparent encryption and decryption system suitable for big data platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A user data system based on chain relation

Effective date of registration: 20221211

Granted publication date: 20211008

Pledgee: Zhejiang Tailong Commercial Bank Co.,Ltd. Hangzhou Fuyang sub branch

Pledgor: HANGZHOU LIXIANG TECHNOLOGY CO.,LTD.

Registration number: Y2022980026066

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20231108

Granted publication date: 20211008

Pledgee: Zhejiang Tailong Commercial Bank Co.,Ltd. Hangzhou Fuyang sub branch

Pledgor: HANGZHOU LIXIANG TECHNOLOGY CO.,LTD.

Registration number: Y2022980026066

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231128

Address after: 311400 Minzhu Village, Chunjiang Street, Fuyang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Heshu Information Technology Co.,Ltd.

Address before: 311400 No. 122, Zhitang village, Chunjiang street, Fuyang District, Hangzhou City, Zhejiang Province

Patentee before: HANGZHOU LIXIANG TECHNOLOGY CO.,LTD.