CN111510298A - Cross-domain trusted data exchange method and system based on block chain - Google Patents

Cross-domain trusted data exchange method and system based on block chain Download PDF

Info

Publication number
CN111510298A
CN111510298A CN202010279174.1A CN202010279174A CN111510298A CN 111510298 A CN111510298 A CN 111510298A CN 202010279174 A CN202010279174 A CN 202010279174A CN 111510298 A CN111510298 A CN 111510298A
Authority
CN
China
Prior art keywords
data
block chain
platform
hash value
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010279174.1A
Other languages
Chinese (zh)
Other versions
CN111510298B (en
Inventor
吴正午
于婧悦
艾中良
程慧芳
杨东昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Judicial Big Data Research Institute Co ltd
Original Assignee
China Judicial Big Data Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Judicial Big Data Research Institute Co ltd filed Critical China Judicial Big Data Research Institute Co ltd
Priority to CN202010279174.1A priority Critical patent/CN111510298B/en
Publication of CN111510298A publication Critical patent/CN111510298A/en
Application granted granted Critical
Publication of CN111510298B publication Critical patent/CN111510298B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The invention relates to a block chain-based cross-domain trusted data exchange method and system. The method comprises the following steps: the data providing end stores the hash value of the data into a first block chain basic platform; the first block chain foundation platform returns a corresponding data address to the data providing end, and the data providing end stores the data, the hash value of the data and the data address; the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual authentication of data addresses and hash values of data, and the data providing end synchronizes the data and the data addresses to the data access end across the gatekeeper/optical gate; and the data access end inquires the hash value of the data from the second block chain basic platform by using the data address, and judges whether the data is tampered according to the hash value. The invention can realize the credible data exchange among all departments under the premise of ensuring the mutual independence of the networks among all departments of the official examination department, and ensure the credible and safe sharing and tracing of the collaborative data of the whole-process judicial business.

Description

Cross-domain trusted data exchange method and system based on block chain
Technical Field
The invention belongs to the field of system integration or the field of block chain information sharing, and particularly relates to a block chain-based cross-domain trusted data exchange method and system.
Background
In the judicial field, service systems of all departments such as a official inspection department and the like are arranged in respective secret-involved internal networks, and data intercommunication with other government and law departments is realized by adopting a network gate/optical gate technology on the premise of ensuring the relative independence of networks of all the departments of the official inspection department.
However, physical isolation of the network brings inconvenience to data exchange of the judicial business system. How to realize the credible sharing of case information, documents, electronic evidence, electronic files and other judicial data in the judicial business cooperation process under the condition that a gatekeeper/an optical gate exists, and guarantee the credible safe sharing and tracking traceability of the full-process judicial business cooperation data is a key problem to be urgently solved.
Disclosure of Invention
The invention provides a method for realizing trusted data exchange between two secret-related internal networks by using a block chain-based cross-domain trusted data exchange scheme in the presence of a gatekeeper/optical gate, which realizes trusted data exchange between all the departments under the premise of ensuring mutual independence of networks between all the departments of a public inspection department and ensures the trusted safe sharing and tracking traceability of full-process judicial business collaborative data.
The technical scheme of the invention is as follows:
a block chain-based cross-domain trusted data exchange method is suitable for a first network and a second network which are isolated by adopting a network gate/an optical gate, wherein a data providing end and a first block chain foundation platform are deployed in the first network, and a data access end and a second block chain foundation platform are deployed in the second network, and the method comprises the following steps:
the data providing end stores the hash value of the data into a first block chain basic platform;
the first block chain foundation platform returns a corresponding data address to the data providing end, and the data providing end stores the data, the hash value of the data and the data address;
the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual authentication of data addresses and hash values of data, and the data providing end synchronizes the data and the data addresses to the data access end across the gatekeeper/optical gate;
and the data access end inquires the hash value of the data from the second block chain basic platform by using the data address, and judges whether the data is tampered according to the hash value.
Further, the data includes service data, user behavior data, and the like.
Further, the data providing end stores the hash value of the data into the first blockchain base platform, including:
and the data providing end stores the hash value corresponding to the data to be exchanged into an account book of the first blockchain foundation platform through an intelligent contract, and the account book is commonly maintained by nodes in the first blockchain foundation platform.
Further, the double-chain mutual authentication of the data address and the hash value of the data performed by the first blockchain base platform and the second blockchain base platform includes:
the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual recognition of data addresses and hash values of data through a chain crossing technology, namely synchronization and mutual recognition of accounts.
Further, the data access terminal queries a hash value of the data from the second blockchain base platform by using the data address, and determines whether the data is tampered according to the hash value, including:
the data access end initiates an intelligent contract, and inquires the hash value of the data from the second block chain basic platform by using the data address;
the data access end receives a hash value returned by the second block chain basic platform;
the data access terminal calculates the hash value of the data received from the data supply terminal;
and the data access end judges whether the calculated hash value of the data is consistent with the hash value returned by the second block chain basic platform or not, so that whether the data is tampered or not is judged.
Further, the first blockchain infrastructure platform and the second blockchain infrastructure platform provide blockchain related services including data encryption and decryption, smart contracts, trusted timestamps, consensus mechanisms, identity authentication, chained storage structures, Merklehash trees, hash functions, and signature verification.
Further, the first network and the second network are two different secret-related networks.
A block chain-based cross-domain trusted data exchange system comprises a data providing end and a first block chain foundation platform which are deployed in a first network, and a data access end and a second block chain foundation platform which are deployed in a second network, wherein the first network and the second network are isolated by adopting a gatekeeper/optical gate; the data providing end stores the hash value of the data into a first block chain basic platform; the first block chain foundation platform returns a corresponding data address to the data providing end, and the data providing end stores the data, the hash value of the data and the data address; the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual authentication of data addresses and hash values of data, and the data providing end synchronizes the data and the data addresses to the data access end across the gatekeeper/optical gate; and the data access end inquires the hash value of the data from the second block chain basic platform by using the data address, and judges whether the data is tampered according to the hash value.
Further, a first collaboration sub-platform is deployed in the first network and serves as the data providing end; and deploying a second collaboration sub-platform in the second network to serve as the data access terminal.
Further, the first collaboration sub-platform and the second collaboration sub-platform provide the following data services: data collection, data exchange, data storage, data access.
The invention has the following beneficial effects and contributions: aiming at the environment of a gatekeeper/an optical gate, the invention creatively provides a block chain-based cross-domain trusted data exchange method and a block chain-based cross-domain trusted data exchange system, which effectively solve the problem of cross-department data secure trusted exchange in different confidential networks in the judicial field, ensure the security of collaborative business data, and realize the characteristics of fidelity, non-falsification, traceability and the like of the collaborative business data.
Drawings
Fig. 1 is a flowchart of steps of a block chain-based cross-domain trusted data exchange method according to the present invention.
Fig. 2 is an architecture diagram of the block chain based cross-domain trusted data exchange system of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions and specific implementations of the present invention will be described in further detail with reference to the accompanying drawings.
Fig. 1 and fig. 2 are a flowchart and a system structure diagram of a cross-domain trusted data exchange method in this embodiment.
As shown in fig. 1, the present embodiment provides a method for cross-domain trusted data exchange based on a block chain. The block chain network consists of a block chain foundation platform A, a cooperative branch platform A, a block chain foundation platform B and a cooperative branch platform B. The block chain foundation platform a serves as a first block chain foundation platform of the invention, the block chain foundation platform B serves as a second block chain foundation platform of the invention, the cooperative sub-platform a serves as a data providing end, and the cooperative sub-platform B serves as a data accessing end. The block chain foundation platforms A and B can both comprise a plurality of alliance nodes to jointly maintain an account book; and the block chain foundation platform A/the cooperative branch platform A and the block chain foundation platform B/the cooperative branch platform B are in different secret-related network environments, and data exchange can be carried out in a file mode through the optical gate/the network gate.
The block chain base platform and the collaborative sub-platform are shown in fig. 2, and specifically include:
1) the block chain foundation platform is mainly used for providing block chain services, including data encryption and decryption, intelligent contracts, trusted timestamps, consensus mechanisms, identity authentication, chain storage structures, Merkle hash trees, hash functions, signature verification and other block chain related services, and is used for storing hash values of platform data and service data such as user behaviors and the like generated by the collaborative sub-platform in a trusted manner.
2) The collaboration sub-platform is mainly used for data services of a business collaboration system, including data services such as data collection, data exchange (namely data transmission), data storage, data access and the like.
As shown in fig. 1, the block chain-based cross-domain trusted data exchange method includes the following specific implementation steps:
1) data storage: the cooperative branch platform a serves as a data provider, links data such as generated service data and user behavior data through an intelligent contract, namely, stores a hash value of the corresponding data into an account book of the blockchain foundation platform a, wherein the account book is maintained by nodes in the blockchain foundation platform a together.
2) Storage data and data address: and the block chain basic platform A returns a corresponding storage address to the cooperative branch platform A, and the cooperative branch platform A stores the data, the corresponding hash value and the uplink address.
3) And (3) trusted data transmission:
① the blockchain foundation platform A and the blockchain foundation platform B perform double-chain mutual recognition of data addresses and hash values of data, namely, synchronization and mutual recognition of accounts through a chain-crossing technology, wherein the chain-crossing technology can be realized by adopting the prior art, and data exchange is performed through a file-based gatekeeper/optical gate.
② the cooperative sub-platform A synchronizes the data and the uplink address to the cooperative sub-platform B based on the file transmission, wherein the inter-network gate/shutter synchronization means that the data transmission is realized based on the network gate/shutter, and can be realized by adopting the prior art.
4) Data query: the data access party in the secret-related intranet B can initiate an intelligent contract through the cooperative branch platform B, and inquire the hash value of the data to judge whether the data is tampered. Specifically, the cooperative branch platform B initiates an intelligent contract, queries a hash value of data by using an address, then returns the hash value to the cooperative branch platform B, calculates the hash value of the data received from the cooperative branch platform a, and determines whether the hash value is consistent with the hash value returned by the block chain base platform B, so as to determine whether the data is tampered. If the two are consistent, the two are not tampered, and if the two are not consistent, the two are judged to be tampered.
The above embodiments are only intended to illustrate the technical solution of the present invention and not to limit the same, and a person skilled in the art can modify the technical solution of the present invention or substitute the same without departing from the principle and scope of the present invention, and the scope of the present invention should be determined by the claims.

Claims (10)

1. A block chain-based cross-domain trusted data exchange method is suitable for a first network and a second network which are isolated by adopting a network gate/an optical gate, wherein a data providing end and a first block chain foundation platform are deployed in the first network, and a data access end and a second block chain foundation platform are deployed in the second network, and the method comprises the following steps:
the data providing end stores the hash value of the data into a first block chain basic platform;
the first block chain foundation platform returns a corresponding data address to the data providing end, and the data providing end stores the data, the hash value of the data and the data address;
the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual authentication of data addresses and hash values of data, and the data providing end synchronizes the data and the data addresses to the data access end across the gatekeeper/optical gate;
and the data access end inquires the hash value of the data from the second block chain basic platform by using the data address, and judges whether the data is tampered according to the hash value.
2. The method of claim 1, wherein the data comprises service data, user behavior data.
3. The method of claim 1, wherein the data provider stores the hash value of the data in the first blockchain infrastructure, comprising:
and the data providing end stores the hash value corresponding to the data to be exchanged into an account book of the first blockchain foundation platform through an intelligent contract, and the account book is commonly maintained by nodes in the first blockchain foundation platform.
4. The method of claim 1, wherein the first and second blockchain infrastructure platforms perform double-chain mutual authentication of data addresses and hash values of data, comprising:
the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual recognition of data addresses and hash values of data through a chain crossing technology, namely synchronization and mutual recognition of accounts.
5. The method as claimed in claim 1, wherein the data accessing end queries the second blockchain base platform for the hash value of the data by using the data address, and determines whether the data is tampered according to the hash value, including:
the data access end initiates an intelligent contract, and inquires the hash value of the data from the second block chain basic platform by using the data address;
the data access end receives a hash value returned by the second block chain basic platform;
the data access terminal calculates the hash value of the data received from the data supply terminal;
and the data access end judges whether the calculated hash value of the data is consistent with the hash value returned by the second block chain basic platform or not, so that whether the data is tampered or not is judged.
6. The method of claim 1, wherein the first blockchain infrastructure platform and the second blockchain infrastructure platform provide blockchain related services including data encryption and decryption, smart contracts, trusted timestamps, consensus mechanisms, identity authentication, chained storage structures, Merkle hash trees, hash functions, and signature verification.
7. The method of claim 1, wherein the first network and the second network are two different privacy-related networks.
8. A block chain-based cross-domain trusted data exchange system is characterized by comprising a data providing end and a first block chain foundation platform which are deployed in a first network, and a data access end and a second block chain foundation platform which are deployed in a second network, wherein the first network and the second network are isolated by adopting a gatekeeper/optical gate; the data providing end stores the hash value of the data into a first block chain basic platform; the first block chain foundation platform returns a corresponding data address to the data providing end, and the data providing end stores the data, the hash value of the data and the data address; the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual authentication of data addresses and hash values of data, and the data providing end synchronizes the data and the data addresses to the data access end across the gatekeeper/optical gate; and the data access end inquires the hash value of the data from the second block chain basic platform by using the data address, and judges whether the data is tampered according to the hash value.
9. The system of claim 8, wherein a first collaboration sub-platform is deployed in the first network as the data provider; and deploying a second collaboration sub-platform in the second network to serve as the data access terminal.
10. The system of claim 9, wherein the first collaboration sub-platform and the second collaboration sub-platform provide the following data services: data collection, data exchange, data storage, data access.
CN202010279174.1A 2020-04-10 2020-04-10 Cross-domain trusted data exchange method and system based on block chain Active CN111510298B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010279174.1A CN111510298B (en) 2020-04-10 2020-04-10 Cross-domain trusted data exchange method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010279174.1A CN111510298B (en) 2020-04-10 2020-04-10 Cross-domain trusted data exchange method and system based on block chain

Publications (2)

Publication Number Publication Date
CN111510298A true CN111510298A (en) 2020-08-07
CN111510298B CN111510298B (en) 2022-03-25

Family

ID=71869254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010279174.1A Active CN111510298B (en) 2020-04-10 2020-04-10 Cross-domain trusted data exchange method and system based on block chain

Country Status (1)

Country Link
CN (1) CN111510298B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112383537A (en) * 2020-11-11 2021-02-19 杭州甘道智能科技有限公司 Trusted block chain uplink method and user application uplink system
CN113393240A (en) * 2021-06-17 2021-09-14 海南海锐众创科技有限公司 Electronic certificate storage system and operation method
CN113781221A (en) * 2021-09-07 2021-12-10 中国电子科技集团公司第五十四研究所 Space data cross-network tracing method based on block chain cross-chain technology
CN114301866A (en) * 2021-12-24 2022-04-08 杭州趣链科技有限公司 Alliance-link communication method, system, electronic device and readable storage medium
CN114615279A (en) * 2022-03-18 2022-06-10 中央财经大学 Credible multi-party data cooperation method and system based on block chain technology
CN115688183A (en) * 2022-12-01 2023-02-03 国网冀北电力有限公司物资分公司 Cloud-signed electronic certificate cochain evidence storing and obtaining identification method
WO2023200605A1 (en) * 2022-04-13 2023-10-19 Spanning Labs Inc. Blockchain interoperability system for native asset creation

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107316239A (en) * 2017-07-14 2017-11-03 众安信息技术服务有限公司 A kind of authentification of message and source tracing method and system based on block chain
CN107682324A (en) * 2017-09-20 2018-02-09 华胜信泰信息产业发展有限公司 Method for message transmission, system, storage medium and computer equipment
US20190026146A1 (en) * 2017-07-21 2019-01-24 Intel Corporation Apparatuses, methods, and systems for blockchain transaction acceleration
CN109325349A (en) * 2018-08-15 2019-02-12 深圳市元征科技股份有限公司 A kind of method for managing security, terminal device and computer readable storage medium
CN109753816A (en) * 2018-12-13 2019-05-14 广州通链计算机智能技术有限责任公司 A kind of method and realization system of the block chain across chain
CN110598478A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain based evidence verification method, device, equipment and storage medium
CN110879809A (en) * 2019-11-12 2020-03-13 北京芯际科技有限公司 Judicial data evidence storage method based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107316239A (en) * 2017-07-14 2017-11-03 众安信息技术服务有限公司 A kind of authentification of message and source tracing method and system based on block chain
US20190026146A1 (en) * 2017-07-21 2019-01-24 Intel Corporation Apparatuses, methods, and systems for blockchain transaction acceleration
CN107682324A (en) * 2017-09-20 2018-02-09 华胜信泰信息产业发展有限公司 Method for message transmission, system, storage medium and computer equipment
CN109325349A (en) * 2018-08-15 2019-02-12 深圳市元征科技股份有限公司 A kind of method for managing security, terminal device and computer readable storage medium
CN109753816A (en) * 2018-12-13 2019-05-14 广州通链计算机智能技术有限责任公司 A kind of method and realization system of the block chain across chain
CN110598478A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain based evidence verification method, device, equipment and storage medium
CN110879809A (en) * 2019-11-12 2020-03-13 北京芯际科技有限公司 Judicial data evidence storage method based on block chain

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112383537A (en) * 2020-11-11 2021-02-19 杭州甘道智能科技有限公司 Trusted block chain uplink method and user application uplink system
CN112383537B (en) * 2020-11-11 2022-06-03 杭州甘道智能科技有限公司 Trusted block chain uplink method and user application uplink system
CN113393240A (en) * 2021-06-17 2021-09-14 海南海锐众创科技有限公司 Electronic certificate storage system and operation method
CN113781221A (en) * 2021-09-07 2021-12-10 中国电子科技集团公司第五十四研究所 Space data cross-network tracing method based on block chain cross-chain technology
CN114301866A (en) * 2021-12-24 2022-04-08 杭州趣链科技有限公司 Alliance-link communication method, system, electronic device and readable storage medium
CN114615279A (en) * 2022-03-18 2022-06-10 中央财经大学 Credible multi-party data cooperation method and system based on block chain technology
CN114615279B (en) * 2022-03-18 2023-06-20 中央财经大学 Trusted multiparty data collaboration method and system based on blockchain technology
WO2023200605A1 (en) * 2022-04-13 2023-10-19 Spanning Labs Inc. Blockchain interoperability system for native asset creation
CN115688183A (en) * 2022-12-01 2023-02-03 国网冀北电力有限公司物资分公司 Cloud-signed electronic certificate cochain evidence storing and obtaining identification method
CN115688183B (en) * 2022-12-01 2023-06-23 国网冀北电力有限公司物资分公司 Method for authenticating uplink evidence storage and evidence collection of cloud-signed electronic certificate

Also Published As

Publication number Publication date
CN111510298B (en) 2022-03-25

Similar Documents

Publication Publication Date Title
CN111510298B (en) Cross-domain trusted data exchange method and system based on block chain
CN109409122B (en) File storage method, electronic device and storage medium
CN110166411B (en) Data transmission method, device and network node
CN112055025B (en) Privacy data protection method based on block chain
CN110032545A (en) File memory method, system and electronic equipment based on block chain
CN112199726A (en) Block chain-based alliance trust distributed identity authentication method and system
CN112468441A (en) Cross-heterogeneous-domain authentication system based on block chain
CN109951490A (en) Webpage integrity assurance, system and electronic equipment based on block chain
CN110309197A (en) Project data verification method and its device
CN113079215A (en) Block chain-based wireless security access method for power distribution Internet of things
Urmila et al. A comparitive study of blockchain applications for enhancing internet of things security
CN114553440B (en) Cross-data center identity authentication method and system based on block chain and attribute signature
CN113111386A (en) Privacy protection method for block chain transaction data
CN104539636A (en) Video evidence service system
CN114547698A (en) CORS service data storage system and method based on block chain
Raza et al. Blockchain-based IoT: an overview
CN116260656B (en) Main body trusted authentication method and system in zero trust network based on blockchain
CN102083068B (en) Information sharing method and system
CN117056981A (en) Digital identity management method and device
CN111444265A (en) Government affair information sharing system based on block chain
CN103269371A (en) EPC network DS checking method and system based on Anycast
CN115934832A (en) Metering test detection data credible sharing method based on block chain
KR20210039190A (en) Method for maintaining private information on blockchain network and device thereof
WO2023065467A1 (en) Method for collaborative work between blockchain and internet of things
US11501295B2 (en) Object distribution processing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant