CN111510298A - Cross-domain trusted data exchange method and system based on block chain - Google Patents
Cross-domain trusted data exchange method and system based on block chain Download PDFInfo
- Publication number
- CN111510298A CN111510298A CN202010279174.1A CN202010279174A CN111510298A CN 111510298 A CN111510298 A CN 111510298A CN 202010279174 A CN202010279174 A CN 202010279174A CN 111510298 A CN111510298 A CN 111510298A
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- platform
- hash value
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Abstract
The invention relates to a block chain-based cross-domain trusted data exchange method and system. The method comprises the following steps: the data providing end stores the hash value of the data into a first block chain basic platform; the first block chain foundation platform returns a corresponding data address to the data providing end, and the data providing end stores the data, the hash value of the data and the data address; the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual authentication of data addresses and hash values of data, and the data providing end synchronizes the data and the data addresses to the data access end across the gatekeeper/optical gate; and the data access end inquires the hash value of the data from the second block chain basic platform by using the data address, and judges whether the data is tampered according to the hash value. The invention can realize the credible data exchange among all departments under the premise of ensuring the mutual independence of the networks among all departments of the official examination department, and ensure the credible and safe sharing and tracing of the collaborative data of the whole-process judicial business.
Description
Technical Field
The invention belongs to the field of system integration or the field of block chain information sharing, and particularly relates to a block chain-based cross-domain trusted data exchange method and system.
Background
In the judicial field, service systems of all departments such as a official inspection department and the like are arranged in respective secret-involved internal networks, and data intercommunication with other government and law departments is realized by adopting a network gate/optical gate technology on the premise of ensuring the relative independence of networks of all the departments of the official inspection department.
However, physical isolation of the network brings inconvenience to data exchange of the judicial business system. How to realize the credible sharing of case information, documents, electronic evidence, electronic files and other judicial data in the judicial business cooperation process under the condition that a gatekeeper/an optical gate exists, and guarantee the credible safe sharing and tracking traceability of the full-process judicial business cooperation data is a key problem to be urgently solved.
Disclosure of Invention
The invention provides a method for realizing trusted data exchange between two secret-related internal networks by using a block chain-based cross-domain trusted data exchange scheme in the presence of a gatekeeper/optical gate, which realizes trusted data exchange between all the departments under the premise of ensuring mutual independence of networks between all the departments of a public inspection department and ensures the trusted safe sharing and tracking traceability of full-process judicial business collaborative data.
The technical scheme of the invention is as follows:
a block chain-based cross-domain trusted data exchange method is suitable for a first network and a second network which are isolated by adopting a network gate/an optical gate, wherein a data providing end and a first block chain foundation platform are deployed in the first network, and a data access end and a second block chain foundation platform are deployed in the second network, and the method comprises the following steps:
the data providing end stores the hash value of the data into a first block chain basic platform;
the first block chain foundation platform returns a corresponding data address to the data providing end, and the data providing end stores the data, the hash value of the data and the data address;
the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual authentication of data addresses and hash values of data, and the data providing end synchronizes the data and the data addresses to the data access end across the gatekeeper/optical gate;
and the data access end inquires the hash value of the data from the second block chain basic platform by using the data address, and judges whether the data is tampered according to the hash value.
Further, the data includes service data, user behavior data, and the like.
Further, the data providing end stores the hash value of the data into the first blockchain base platform, including:
and the data providing end stores the hash value corresponding to the data to be exchanged into an account book of the first blockchain foundation platform through an intelligent contract, and the account book is commonly maintained by nodes in the first blockchain foundation platform.
Further, the double-chain mutual authentication of the data address and the hash value of the data performed by the first blockchain base platform and the second blockchain base platform includes:
the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual recognition of data addresses and hash values of data through a chain crossing technology, namely synchronization and mutual recognition of accounts.
Further, the data access terminal queries a hash value of the data from the second blockchain base platform by using the data address, and determines whether the data is tampered according to the hash value, including:
the data access end initiates an intelligent contract, and inquires the hash value of the data from the second block chain basic platform by using the data address;
the data access end receives a hash value returned by the second block chain basic platform;
the data access terminal calculates the hash value of the data received from the data supply terminal;
and the data access end judges whether the calculated hash value of the data is consistent with the hash value returned by the second block chain basic platform or not, so that whether the data is tampered or not is judged.
Further, the first blockchain infrastructure platform and the second blockchain infrastructure platform provide blockchain related services including data encryption and decryption, smart contracts, trusted timestamps, consensus mechanisms, identity authentication, chained storage structures, Merklehash trees, hash functions, and signature verification.
Further, the first network and the second network are two different secret-related networks.
A block chain-based cross-domain trusted data exchange system comprises a data providing end and a first block chain foundation platform which are deployed in a first network, and a data access end and a second block chain foundation platform which are deployed in a second network, wherein the first network and the second network are isolated by adopting a gatekeeper/optical gate; the data providing end stores the hash value of the data into a first block chain basic platform; the first block chain foundation platform returns a corresponding data address to the data providing end, and the data providing end stores the data, the hash value of the data and the data address; the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual authentication of data addresses and hash values of data, and the data providing end synchronizes the data and the data addresses to the data access end across the gatekeeper/optical gate; and the data access end inquires the hash value of the data from the second block chain basic platform by using the data address, and judges whether the data is tampered according to the hash value.
Further, a first collaboration sub-platform is deployed in the first network and serves as the data providing end; and deploying a second collaboration sub-platform in the second network to serve as the data access terminal.
Further, the first collaboration sub-platform and the second collaboration sub-platform provide the following data services: data collection, data exchange, data storage, data access.
The invention has the following beneficial effects and contributions: aiming at the environment of a gatekeeper/an optical gate, the invention creatively provides a block chain-based cross-domain trusted data exchange method and a block chain-based cross-domain trusted data exchange system, which effectively solve the problem of cross-department data secure trusted exchange in different confidential networks in the judicial field, ensure the security of collaborative business data, and realize the characteristics of fidelity, non-falsification, traceability and the like of the collaborative business data.
Drawings
Fig. 1 is a flowchart of steps of a block chain-based cross-domain trusted data exchange method according to the present invention.
Fig. 2 is an architecture diagram of the block chain based cross-domain trusted data exchange system of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions and specific implementations of the present invention will be described in further detail with reference to the accompanying drawings.
Fig. 1 and fig. 2 are a flowchart and a system structure diagram of a cross-domain trusted data exchange method in this embodiment.
As shown in fig. 1, the present embodiment provides a method for cross-domain trusted data exchange based on a block chain. The block chain network consists of a block chain foundation platform A, a cooperative branch platform A, a block chain foundation platform B and a cooperative branch platform B. The block chain foundation platform a serves as a first block chain foundation platform of the invention, the block chain foundation platform B serves as a second block chain foundation platform of the invention, the cooperative sub-platform a serves as a data providing end, and the cooperative sub-platform B serves as a data accessing end. The block chain foundation platforms A and B can both comprise a plurality of alliance nodes to jointly maintain an account book; and the block chain foundation platform A/the cooperative branch platform A and the block chain foundation platform B/the cooperative branch platform B are in different secret-related network environments, and data exchange can be carried out in a file mode through the optical gate/the network gate.
The block chain base platform and the collaborative sub-platform are shown in fig. 2, and specifically include:
1) the block chain foundation platform is mainly used for providing block chain services, including data encryption and decryption, intelligent contracts, trusted timestamps, consensus mechanisms, identity authentication, chain storage structures, Merkle hash trees, hash functions, signature verification and other block chain related services, and is used for storing hash values of platform data and service data such as user behaviors and the like generated by the collaborative sub-platform in a trusted manner.
2) The collaboration sub-platform is mainly used for data services of a business collaboration system, including data services such as data collection, data exchange (namely data transmission), data storage, data access and the like.
As shown in fig. 1, the block chain-based cross-domain trusted data exchange method includes the following specific implementation steps:
1) data storage: the cooperative branch platform a serves as a data provider, links data such as generated service data and user behavior data through an intelligent contract, namely, stores a hash value of the corresponding data into an account book of the blockchain foundation platform a, wherein the account book is maintained by nodes in the blockchain foundation platform a together.
2) Storage data and data address: and the block chain basic platform A returns a corresponding storage address to the cooperative branch platform A, and the cooperative branch platform A stores the data, the corresponding hash value and the uplink address.
3) And (3) trusted data transmission:
① the blockchain foundation platform A and the blockchain foundation platform B perform double-chain mutual recognition of data addresses and hash values of data, namely, synchronization and mutual recognition of accounts through a chain-crossing technology, wherein the chain-crossing technology can be realized by adopting the prior art, and data exchange is performed through a file-based gatekeeper/optical gate.
② the cooperative sub-platform A synchronizes the data and the uplink address to the cooperative sub-platform B based on the file transmission, wherein the inter-network gate/shutter synchronization means that the data transmission is realized based on the network gate/shutter, and can be realized by adopting the prior art.
4) Data query: the data access party in the secret-related intranet B can initiate an intelligent contract through the cooperative branch platform B, and inquire the hash value of the data to judge whether the data is tampered. Specifically, the cooperative branch platform B initiates an intelligent contract, queries a hash value of data by using an address, then returns the hash value to the cooperative branch platform B, calculates the hash value of the data received from the cooperative branch platform a, and determines whether the hash value is consistent with the hash value returned by the block chain base platform B, so as to determine whether the data is tampered. If the two are consistent, the two are not tampered, and if the two are not consistent, the two are judged to be tampered.
The above embodiments are only intended to illustrate the technical solution of the present invention and not to limit the same, and a person skilled in the art can modify the technical solution of the present invention or substitute the same without departing from the principle and scope of the present invention, and the scope of the present invention should be determined by the claims.
Claims (10)
1. A block chain-based cross-domain trusted data exchange method is suitable for a first network and a second network which are isolated by adopting a network gate/an optical gate, wherein a data providing end and a first block chain foundation platform are deployed in the first network, and a data access end and a second block chain foundation platform are deployed in the second network, and the method comprises the following steps:
the data providing end stores the hash value of the data into a first block chain basic platform;
the first block chain foundation platform returns a corresponding data address to the data providing end, and the data providing end stores the data, the hash value of the data and the data address;
the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual authentication of data addresses and hash values of data, and the data providing end synchronizes the data and the data addresses to the data access end across the gatekeeper/optical gate;
and the data access end inquires the hash value of the data from the second block chain basic platform by using the data address, and judges whether the data is tampered according to the hash value.
2. The method of claim 1, wherein the data comprises service data, user behavior data.
3. The method of claim 1, wherein the data provider stores the hash value of the data in the first blockchain infrastructure, comprising:
and the data providing end stores the hash value corresponding to the data to be exchanged into an account book of the first blockchain foundation platform through an intelligent contract, and the account book is commonly maintained by nodes in the first blockchain foundation platform.
4. The method of claim 1, wherein the first and second blockchain infrastructure platforms perform double-chain mutual authentication of data addresses and hash values of data, comprising:
the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual recognition of data addresses and hash values of data through a chain crossing technology, namely synchronization and mutual recognition of accounts.
5. The method as claimed in claim 1, wherein the data accessing end queries the second blockchain base platform for the hash value of the data by using the data address, and determines whether the data is tampered according to the hash value, including:
the data access end initiates an intelligent contract, and inquires the hash value of the data from the second block chain basic platform by using the data address;
the data access end receives a hash value returned by the second block chain basic platform;
the data access terminal calculates the hash value of the data received from the data supply terminal;
and the data access end judges whether the calculated hash value of the data is consistent with the hash value returned by the second block chain basic platform or not, so that whether the data is tampered or not is judged.
6. The method of claim 1, wherein the first blockchain infrastructure platform and the second blockchain infrastructure platform provide blockchain related services including data encryption and decryption, smart contracts, trusted timestamps, consensus mechanisms, identity authentication, chained storage structures, Merkle hash trees, hash functions, and signature verification.
7. The method of claim 1, wherein the first network and the second network are two different privacy-related networks.
8. A block chain-based cross-domain trusted data exchange system is characterized by comprising a data providing end and a first block chain foundation platform which are deployed in a first network, and a data access end and a second block chain foundation platform which are deployed in a second network, wherein the first network and the second network are isolated by adopting a gatekeeper/optical gate; the data providing end stores the hash value of the data into a first block chain basic platform; the first block chain foundation platform returns a corresponding data address to the data providing end, and the data providing end stores the data, the hash value of the data and the data address; the first block chain foundation platform and the second block chain foundation platform perform double-chain mutual authentication of data addresses and hash values of data, and the data providing end synchronizes the data and the data addresses to the data access end across the gatekeeper/optical gate; and the data access end inquires the hash value of the data from the second block chain basic platform by using the data address, and judges whether the data is tampered according to the hash value.
9. The system of claim 8, wherein a first collaboration sub-platform is deployed in the first network as the data provider; and deploying a second collaboration sub-platform in the second network to serve as the data access terminal.
10. The system of claim 9, wherein the first collaboration sub-platform and the second collaboration sub-platform provide the following data services: data collection, data exchange, data storage, data access.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010279174.1A CN111510298B (en) | 2020-04-10 | 2020-04-10 | Cross-domain trusted data exchange method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010279174.1A CN111510298B (en) | 2020-04-10 | 2020-04-10 | Cross-domain trusted data exchange method and system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111510298A true CN111510298A (en) | 2020-08-07 |
CN111510298B CN111510298B (en) | 2022-03-25 |
Family
ID=71869254
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010279174.1A Active CN111510298B (en) | 2020-04-10 | 2020-04-10 | Cross-domain trusted data exchange method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111510298B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112383537A (en) * | 2020-11-11 | 2021-02-19 | 杭州甘道智能科技有限公司 | Trusted block chain uplink method and user application uplink system |
CN113393240A (en) * | 2021-06-17 | 2021-09-14 | 海南海锐众创科技有限公司 | Electronic certificate storage system and operation method |
CN113781221A (en) * | 2021-09-07 | 2021-12-10 | 中国电子科技集团公司第五十四研究所 | Space data cross-network tracing method based on block chain cross-chain technology |
CN114301866A (en) * | 2021-12-24 | 2022-04-08 | 杭州趣链科技有限公司 | Alliance-link communication method, system, electronic device and readable storage medium |
CN114615279A (en) * | 2022-03-18 | 2022-06-10 | 中央财经大学 | Credible multi-party data cooperation method and system based on block chain technology |
CN115688183A (en) * | 2022-12-01 | 2023-02-03 | 国网冀北电力有限公司物资分公司 | Cloud-signed electronic certificate cochain evidence storing and obtaining identification method |
WO2023200605A1 (en) * | 2022-04-13 | 2023-10-19 | Spanning Labs Inc. | Blockchain interoperability system for native asset creation |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107316239A (en) * | 2017-07-14 | 2017-11-03 | 众安信息技术服务有限公司 | A kind of authentification of message and source tracing method and system based on block chain |
CN107682324A (en) * | 2017-09-20 | 2018-02-09 | 华胜信泰信息产业发展有限公司 | Method for message transmission, system, storage medium and computer equipment |
US20190026146A1 (en) * | 2017-07-21 | 2019-01-24 | Intel Corporation | Apparatuses, methods, and systems for blockchain transaction acceleration |
CN109325349A (en) * | 2018-08-15 | 2019-02-12 | 深圳市元征科技股份有限公司 | A kind of method for managing security, terminal device and computer readable storage medium |
CN109753816A (en) * | 2018-12-13 | 2019-05-14 | 广州通链计算机智能技术有限责任公司 | A kind of method and realization system of the block chain across chain |
CN110598478A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain based evidence verification method, device, equipment and storage medium |
CN110879809A (en) * | 2019-11-12 | 2020-03-13 | 北京芯际科技有限公司 | Judicial data evidence storage method based on block chain |
-
2020
- 2020-04-10 CN CN202010279174.1A patent/CN111510298B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107316239A (en) * | 2017-07-14 | 2017-11-03 | 众安信息技术服务有限公司 | A kind of authentification of message and source tracing method and system based on block chain |
US20190026146A1 (en) * | 2017-07-21 | 2019-01-24 | Intel Corporation | Apparatuses, methods, and systems for blockchain transaction acceleration |
CN107682324A (en) * | 2017-09-20 | 2018-02-09 | 华胜信泰信息产业发展有限公司 | Method for message transmission, system, storage medium and computer equipment |
CN109325349A (en) * | 2018-08-15 | 2019-02-12 | 深圳市元征科技股份有限公司 | A kind of method for managing security, terminal device and computer readable storage medium |
CN109753816A (en) * | 2018-12-13 | 2019-05-14 | 广州通链计算机智能技术有限责任公司 | A kind of method and realization system of the block chain across chain |
CN110598478A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain based evidence verification method, device, equipment and storage medium |
CN110879809A (en) * | 2019-11-12 | 2020-03-13 | 北京芯际科技有限公司 | Judicial data evidence storage method based on block chain |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112383537A (en) * | 2020-11-11 | 2021-02-19 | 杭州甘道智能科技有限公司 | Trusted block chain uplink method and user application uplink system |
CN112383537B (en) * | 2020-11-11 | 2022-06-03 | 杭州甘道智能科技有限公司 | Trusted block chain uplink method and user application uplink system |
CN113393240A (en) * | 2021-06-17 | 2021-09-14 | 海南海锐众创科技有限公司 | Electronic certificate storage system and operation method |
CN113781221A (en) * | 2021-09-07 | 2021-12-10 | 中国电子科技集团公司第五十四研究所 | Space data cross-network tracing method based on block chain cross-chain technology |
CN114301866A (en) * | 2021-12-24 | 2022-04-08 | 杭州趣链科技有限公司 | Alliance-link communication method, system, electronic device and readable storage medium |
CN114615279A (en) * | 2022-03-18 | 2022-06-10 | 中央财经大学 | Credible multi-party data cooperation method and system based on block chain technology |
CN114615279B (en) * | 2022-03-18 | 2023-06-20 | 中央财经大学 | Trusted multiparty data collaboration method and system based on blockchain technology |
WO2023200605A1 (en) * | 2022-04-13 | 2023-10-19 | Spanning Labs Inc. | Blockchain interoperability system for native asset creation |
CN115688183A (en) * | 2022-12-01 | 2023-02-03 | 国网冀北电力有限公司物资分公司 | Cloud-signed electronic certificate cochain evidence storing and obtaining identification method |
CN115688183B (en) * | 2022-12-01 | 2023-06-23 | 国网冀北电力有限公司物资分公司 | Method for authenticating uplink evidence storage and evidence collection of cloud-signed electronic certificate |
Also Published As
Publication number | Publication date |
---|---|
CN111510298B (en) | 2022-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111510298B (en) | Cross-domain trusted data exchange method and system based on block chain | |
CN109409122B (en) | File storage method, electronic device and storage medium | |
CN110166411B (en) | Data transmission method, device and network node | |
CN112055025B (en) | Privacy data protection method based on block chain | |
CN110032545A (en) | File memory method, system and electronic equipment based on block chain | |
CN112199726A (en) | Block chain-based alliance trust distributed identity authentication method and system | |
CN112468441A (en) | Cross-heterogeneous-domain authentication system based on block chain | |
CN109951490A (en) | Webpage integrity assurance, system and electronic equipment based on block chain | |
CN110309197A (en) | Project data verification method and its device | |
CN113079215A (en) | Block chain-based wireless security access method for power distribution Internet of things | |
Urmila et al. | A comparitive study of blockchain applications for enhancing internet of things security | |
CN114553440B (en) | Cross-data center identity authentication method and system based on block chain and attribute signature | |
CN113111386A (en) | Privacy protection method for block chain transaction data | |
CN104539636A (en) | Video evidence service system | |
CN114547698A (en) | CORS service data storage system and method based on block chain | |
Raza et al. | Blockchain-based IoT: an overview | |
CN116260656B (en) | Main body trusted authentication method and system in zero trust network based on blockchain | |
CN102083068B (en) | Information sharing method and system | |
CN117056981A (en) | Digital identity management method and device | |
CN111444265A (en) | Government affair information sharing system based on block chain | |
CN103269371A (en) | EPC network DS checking method and system based on Anycast | |
CN115934832A (en) | Metering test detection data credible sharing method based on block chain | |
KR20210039190A (en) | Method for maintaining private information on blockchain network and device thereof | |
WO2023065467A1 (en) | Method for collaborative work between blockchain and internet of things | |
US11501295B2 (en) | Object distribution processing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |