CN111581668A - Block chain data management system - Google Patents

Block chain data management system Download PDF

Info

Publication number
CN111581668A
CN111581668A CN202010413907.6A CN202010413907A CN111581668A CN 111581668 A CN111581668 A CN 111581668A CN 202010413907 A CN202010413907 A CN 202010413907A CN 111581668 A CN111581668 A CN 111581668A
Authority
CN
China
Prior art keywords
data
endowment
data management
block chain
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010413907.6A
Other languages
Chinese (zh)
Other versions
CN111581668B (en
Inventor
陆家斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Bangbang Chain Intelligent Technology Co ltd
Original Assignee
Chongqing Bangbang Chain Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Bangbang Chain Intelligent Technology Co ltd filed Critical Chongqing Bangbang Chain Intelligent Technology Co ltd
Priority to CN202010413907.6A priority Critical patent/CN111581668B/en
Publication of CN111581668A publication Critical patent/CN111581668A/en
Application granted granted Critical
Publication of CN111581668B publication Critical patent/CN111581668B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2471Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to the technical field of data management, and particularly discloses a block chain data management system, which comprises: the data creating end is used for creating endowment data; the data confirmation end is used for creating a public key and a private key, receiving the endowment data from the data creation end and encrypting the endowment data based on the private key; the data management terminal is used for acquiring the public key and the encrypted endowment data from the data confirmation terminal, the block chain is locally stored in the data management terminal, and the data management terminal is also used for packaging the encrypted endowment data into a new block and adding the new block to the tail end of the block chain; the data creating end is further used for sending a query request to the data management end, the data management end is further used for receiving request confirmation information, and after receiving the request confirmation information, the encrypted endowment data is obtained from the block chain and is decrypted by using the public key; the data creation end is also used for sending the decrypted endowment data to the data creation end. By adopting the technical scheme of the invention, the leakage of the endowment data can be prevented.

Description

Block chain data management system
Technical Field
The present invention relates to the field of data management technologies, and in particular, to a block chain data management system.
Background
Traditional management of endowment data is achieved through a central database. But data in the centralized database can be tampered, authenticity of endowment data is difficult to guarantee, and once problems occur, responsibility is difficult to trace. In addition, the centralized server has the problem of single-point failure, which easily causes data loss and privacy disclosure, and some lawbreakers acquire the data in the database to perform illegal transactions, so that the users are difficult to perceive. Furthermore, the elderly, whether home-based care or in a care facility, often receive different care services, such as healthcare services, emergency rescue services, cultural education services, etc.; different endowment services are provided by different service parties and stored in central servers of different service parties, and data sharing is difficult to achieve.
In recent years, Blockchain (Blockchain) technology has become increasingly well known. The block chain is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, and the data in the blocks are guaranteed to be not falsified and forged in a cryptographic mode.
The block chain technology is applied to the management of the aged data, so that the data can be prevented from being tampered in the whole life cycle of the aged data, and the safety of the data is ensured. However, in the existing block chain technology, the contents in the blocks are public, which easily causes privacy disclosure.
For this reason, a management system capable of preventing leakage of aged care data is required.
Disclosure of Invention
The invention provides a block chain data management system which can prevent old data from leaking.
In order to solve the technical problem, the present application provides the following technical solutions:
a blockchain data management system, comprising:
the data creating end is used for creating endowment data;
the data confirmation end is used for creating a public key and a private key, receiving the endowment data from the data creation end and encrypting the endowment data based on the private key;
the data management terminal is used for acquiring the public key and the encrypted endowment data from the data confirmation terminal, the block chain is locally stored in the data management terminal, and the data management terminal is also used for packaging the encrypted endowment data into a new block and adding the new block to the tail end of the block chain;
the data creating end is further used for sending a query request to the data management end, the data management end is further used for receiving request confirmation information, and after receiving the request confirmation information, the encrypted endowment data is obtained from the block chain and is decrypted by using the public key; the data creation end is also used for sending the decrypted endowment data to the data creation end.
The basic scheme principle and the beneficial effects are as follows:
in the scheme, the data creation end is used by a person providing the endowment service, the data confirmation end is used by an old person receiving the endowment service, and the data management end is used by a manager of the endowment service. After the old people are subjected to the old care service by the old people providing the old care service, the old people providing the old care service creates old care data of the old people in the service at the data creation end; the data confirmation terminal used by the old people can receive the endowment data and encrypt the endowment data. The encrypted endowment data can be packaged into blocks by the data management end and added into a block chain. The endowment data is stored in a block chain mode, and the endowment data can be prevented from being tampered. Endowment data has passed through asymmetric encryption, even by the people acquisition, also can't learn concrete content, can effectively prevent revealing of endowment data, guarantee endowment data's security.
Meanwhile, in the scheme, when the personnel providing the endowment service need to inquire the endowment data of the old people, the data creation terminal can send an inquiry request to the data management terminal to perform subsequent inquiry, guarantee that the endowment data can be shared, and avoid the occurrence of an information island.
Further, the data creation end is also used for decrypting the encrypted endowment data to generate a decryption log; the data creation end is also used for packing the decryption log into a new block.
By generating the decryption log, the decryption record of the aged data can be recorded, and the decryption log is packaged into a new block, so that the decryption log can be prevented from being tampered, and the decryption log can be traced after problems occur.
Further, the endowment data comprises service items, service objects and detailed information.
Through the endowment data, detailed record information can be left for the endowment service.
Further, when the data confirmation terminal encrypts the endowment data based on the private key, only the detailed information is encrypted.
Service items and service objects are not encrypted, and subsequent retrieval is facilitated.
Further, the query request includes a querier, a query object, and a query term.
The specific requirements of the query can be known through the query request.
Further, the data creating end is further configured to, after receiving the request confirmation information, retrieve the encrypted endowment data from all blocks of the block chain based on the query object and the query item, and decrypt the retrieved encrypted endowment data with the public key.
Through sufficient retrieval, the required endowment data can be found.
Further, the data creating end also prestores a white list, wherein the white list comprises a permission object and a permission query item; and the data management terminal also judges whether the received request confirmation information has the authority or not based on the white list, and if so, retrieves the encrypted endowment data from all blocks of the block chain based on the query object and the query item.
By establishing the white list, the manager is not required to check each query request and input request confirmation information, so that the checking workload of the manager can be reduced, and meanwhile, the waiting time for the query of the personnel providing the endowment service can be reduced.
Further, the data management terminal is further configured to send the query request to the data confirmation terminal after receiving the request confirmation information, and the data confirmation terminal is further configured to display the query request.
The old people can know that the old people inquire the old care information through the data confirmation terminal.
Further, the number of the data management ends is greater than or equal to two, and each data management end is used for calculating the residual computing power information; the data management ends are connected through a network and are also used for transmitting endowment data, decryption logs and residual computing power information; each data management end is also used for calculating the data management end with the most residual computing power according to the residual computing power information; and the data management end with the most residual computing power is used for acquiring all aged data and decrypting logs, packaging the aged data and the decrypted logs into a new block and adding the new block to the tail end of the block chain.
In the preferred scheme, each data management end is used as a block chain node; and the data is stored in a distributed manner, so that the safety of the data is ensured. In the prior art, a workload proof method is usually adopted to determine which block with block chain link points packed can be added into a block chain; however, this method results in a large amount of wasted electric energy, which undoubtedly increases the operation cost of the whole system. In reality, the data management end often processes other tasks, such as daily office work performed by management personnel. In the preferred scheme, the data management end with the most residual computing power is adopted for packaging; the interference of packaging on other tasks can be effectively reduced to the minimum. Meanwhile, workload is abandoned, so that energy consumption is reduced, and operation cost is reduced.
Further, the decryption log comprises inquirers, inquiry objects, inquiry items and inquiry time.
Through recording various decrypted information in detail, tracing after problems occur is facilitated
Drawings
Fig. 1 is a logic diagram of a first embodiment of a blockchain data management system.
Detailed Description
The following is further detailed by way of specific embodiments:
example one
As shown in fig. 1, a block chain data management system of the present embodiment includes a data creation end, a data confirmation end, and a data management end. In this embodiment, the number of the data creation end, the number of the data confirmation end, and the number of the data management end are all greater than or equal to two.
The data creator is used by a person who provides an elderly care service, such as a medical person who provides a healthcare service. And the data creation end is used for creating endowment data. The data creation end is a computer or a mobile phone, and in the embodiment, is a computer. The endowment data includes service items, service objects, and detailed information. The detailed information refers to recorded information of specific contents of the service item; for example, in the healthcare service, the detailed information includes a physical examination report if it is a physical examination, and a diagnosis report if it is a disease diagnosis. The data creating end is also used for sending a query request to the data management end; in this embodiment, the query request includes a querier, a query object, and a query term.
The data confirmation terminal is used by the old who receives the endowment service. The data confirmation terminal is a computer or a mobile phone, and in the embodiment, the mobile phone. The data confirmation end is used for creating a public key and a private key, receiving the endowment data from the data creation end, and encrypting the endowment data based on the private key. In this embodiment, when the data confirmation terminal encrypts the endowment data based on the private key, only the detailed information is encrypted. For example, after a community doctor A performs medical care service on an old person B, the community doctor A creates endowment data of the old person B at a data creation end; and the data confirmation terminal used by the old B can receive the endowment data and encrypt the endowment data.
The data management end is used by managers of the endowment service, and complete block chains are stored locally in each data management end. Each data management end is also used for acquiring the public key and the encrypted endowment data from the data confirmation end. In this embodiment, each data management terminal only receives the public key and the encrypted endowment data sent by the data validation terminal in the jurisdiction. Each data management terminal establishes association with a plurality of data confirmation terminals (so that one administrator is responsible for managing a plurality of old people) and directional transmission of information belong to the prior art, and details are not repeated here. In other embodiments, the manager can also push other information to the data confirmation end through the data management end.
Each data management terminal is also used for receiving the query request. Each data management terminal is further used for receiving confirmation request information, retrieving the encrypted endowment data from all blocks of the block chain based on query objects and query items in the query request after receiving the request confirmation information, and decrypting the retrieved encrypted endowment data by using the public key. The data creation end is also used for sending the decrypted endowment data to the data creation end.
The data creating end is also used for generating a decryption log after decrypting the encrypted endowment data. In this embodiment, the decryption log includes the inquirer, the inquiry object, the inquiry item, and the inquiry time. In this embodiment, each data management terminal only retrieves the query request of the elderly people in the jurisdiction. In other words, in the query request, the query object is the old person in charge of the administrator to which the data management end belongs, and the data management end can perform retrieval. Therefore, all data management terminals can be effectively prevented from responding to the query request, and repeated retrieval is avoided.
For example, before performing medical care service on the old people B, the community doctor a needs to know the past physical examination report or diagnosis report of the old people B, and the community doctor a can send a query request through the data creation terminal, specifically, the query request is that: A. and querying the object: b, querying items: medical care services. The administrator C can see the inquiry request of the community doctor A at the data management end, if the administrator C agrees, confirmation request information can be input, each data management end can conduct retrieval in the existing block, and finally the aged care data decrypted by the old people B are sent to the data creation end of the community doctor A.
Each data management end is used for calculating the residual computing power information; the data management ends are connected with each other through a network and are also used for transmitting encrypted endowment data, encrypted decryption logs and residual computing power information; each data management end is also used for calculating the data management end with the most residual computing power according to the residual computing power information; and the data management end with the most residual computing power is used for acquiring all encrypted endowment data and decryption logs, packaging the encrypted endowment data and the decryption logs into a new block and adding the new block to the tail end of the block chain. The block packing and the block chain for adding blocks belong to the prior art, and are not described herein again.
The data management terminal is also used for sending the query request to the data confirmation terminal after receiving the request confirmation information, and the data confirmation terminal is also used for displaying the query request. For example, a community doctor A sends a query request through a data creation end, and an old B can also see the query request through a data confirmation end, so that the old B can know that a person is looking up the old data.
Example two
The difference between this embodiment and the first embodiment is that a white list is also pre-stored in the data creation end in this embodiment, where the white list includes a permission object and a permission query item; and the data management terminal also judges whether the received request confirmation information has the authority or not based on the white list, and if so, retrieves the encrypted endowment data from all blocks of the block chain based on the query object and the query item.
For example, the whitelist includes permission objects: d, permission query item: and (6) legal consultation. When lawyer D needs to know the past legal consultation condition of old man B before carrying out legal consultation service on old man B, a query request is sent through a data creating end, and the query request is specifically a query man: D. and querying the object: b, querying items: and (6) legal consultation. The data management end judges that the received request confirmation information is authorized (the permission object is consistent with the inquirer and the inquiry item is consistent with the permission inquiry item) based on the white list, and at this time, the intervention of the administrator C is not needed. The auditing workload of the administrator C can be reduced, and the waiting time of inquiry can also be reduced.
EXAMPLE III
The difference between this embodiment and the first embodiment is that, in this embodiment, the endowment data further includes service time. In this embodiment, the data confirmation terminal is further configured to collect voice information during a service process. The data confirmation terminal is also internally stored with a preset sentence library, and the sentence library comprises a first key sentence, a second key sentence and a third key sentence. The data confirmation terminal is also used for matching the voice information with the sentence library. When the data confirmation end matches a first key sentence from the sentence library, starting timing, when the data confirmation end matches a second key sentence from the sentence library, calculating the interval duration of the first key sentence and the second key sentence, judging whether the interval duration is less than a preset duration, if not, marking the data confirmation end as invalid time, and restarting to match the first key sentence; if the interval duration is less than the preset duration, when the data confirmation end is matched with the third key statement, the timing duration from the matching to the first key statement to the matching to the third key statement is marked as service time. In this embodiment, the data confirmation terminal is a mobile phone.
The data confirmation terminal is further used for outputting key statement selection information when a plurality of first key statements, second key statements or third key statements are matched, and determining information marking service time based on the received key statements. The data confirmation terminal is also used for calculating the difference value between the service time obtained by the terminal and the service time created by the data creation terminal, judging whether the difference value is smaller than a preset statistical error, if so, marking the service time created by the data creation terminal as authenticated service time, and encrypting the endowment data based on a private key. And if the difference is larger than the preset statistical error, marking the service time created by the creation end as the service time to be authenticated, adding the service time obtained by the terminal into the endowment data, and encrypting the endowment data based on the private key.
In this embodiment, the first key statement is the words spoken by the service provider when the service item is started. Taking the service item of washing hair as an example, when starting, the service person usually says "let me give you a bar of washing hair", "do ready, we start washing hair bar", "start washing hair", "you come to wash hair bar", and the like. The second key sentence is the words that the service person says in the service project, taking the service project of washing hair as an example, in washing hair, the service person usually says "do the water temperature properly", "do not scald, cool, do not need to heat water", etc. The third key sentence is the word that the service person says when the service item ends, taking the service item of washing hair as an example, when the service item ends, the service person usually says "wash finished", "washed clean", and the like.
The voice information is matched with the sentence library, the service time is automatically recorded, the difference value between the service time obtained by the terminal and the service time created by the data creation end is calculated, whether the difference value is smaller than a preset statistical error or not is judged, and whether the service time input of the data creation end has a problem or not can be judged. And judging whether the interval duration is less than the preset duration, and if not, marking the data confirmation end as invalid time so as to improve the accuracy of acquisition. Or take a service item of washing hair as an example, when a service person says that the sentence "let me come to wash your head bar" may be said to start after meeting the old, and then the service person will be at home with the old chatter chatter, prepare a towel, and start real hair washing after half an hour. If only the matching of the first key sentence is started and the matching of the third key sentence is ended, a large amount of invalid time is easily recorded, resulting in a decrease in accuracy. By setting the second keyword, the interval duration between the first key sentence and the second key sentence is calculated, whether the service is immediately carried out after the timing is started can be effectively judged, and the accuracy of recording can be improved.
In practical situations, a service person may not say a key sentence more than once, for example, after the service person says "let me wash your head for" 2 minutes later, say "begin to wash head", the interval duration between the first key sentence and the second key sentence of two times is less than the preset duration, and then which first key sentence is taken as the time point for starting recording, in this embodiment, the key sentence selection information is output; and enabling the old to select, determining information based on the received key sentences input by the old, timing according to the first key sentence determined by the old as a starting point, recalculating, marking service time and outputting.
The first key sentence, the second key sentence, and the third key sentence may be set according to actual service items, and are not limited to hair washing as described in the present embodiment, but may be sanitary, cooking, massaging, physical examination, hair cutting, and the like.
The above are merely examples of the present invention, and the present invention is not limited to the field related to this embodiment, and the common general knowledge of the known specific structures and characteristics in the schemes is not described herein too much, and those skilled in the art can know all the common technical knowledge in the technical field before the application date or the priority date, can know all the prior art in this field, and have the ability to apply the conventional experimental means before this date, and those skilled in the art can combine their own ability to perfect and implement the scheme, and some typical known structures or known methods should not become barriers to the implementation of the present invention by those skilled in the art in light of the teaching provided in the present application. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (10)

1. A blockchain data management system, comprising:
the data creating end is used for creating endowment data;
the data confirmation end is used for creating a public key and a private key, receiving the endowment data from the data creation end and encrypting the endowment data based on the private key;
the data management terminal is used for acquiring the public key and the encrypted endowment data from the data confirmation terminal, the block chain is locally stored in the data management terminal, and the data management terminal is also used for packaging the encrypted endowment data into a new block and adding the new block to the tail end of the block chain;
the data creating end is further used for sending a query request to the data management end, the data management end is further used for receiving request confirmation information, and after receiving the request confirmation information, the encrypted endowment data is obtained from the block chain and is decrypted by using the public key; the data creation end is also used for sending the decrypted endowment data to the data creation end.
2. A block chain data management system according to claim 1, wherein: the data creation end is also used for decrypting the encrypted endowment data to generate a decryption log; the data creation end is also used for packing the decryption log into a new block.
3. A block chain data management system according to claim 2, wherein: the endowment data includes service items, service objects, and detailed information.
4. A block chain data management system according to claim 3, wherein: and when the data confirmation terminal encrypts the endowment data based on the private key, only the detailed information is encrypted.
5. A block chain data management system according to claim 4, wherein: the query request includes a querier, a query object, and a query term.
6. A block chain data management system according to claim 5, wherein: and the data creating end is also used for retrieving the encrypted endowment data from all blocks of the block chain based on the query object and the query item after receiving the request confirmation information, and decrypting the retrieved encrypted endowment data by using the public key.
7. A block chain data management system according to claim 6, wherein: the data creating end also prestores a white list, wherein the white list comprises a permission object and a permission query item; and the data management terminal also judges whether the received request confirmation information has the authority or not based on the white list, and if so, retrieves the encrypted endowment data from all blocks of the block chain based on the query object and the query item.
8. A block chain data management system according to claim 7, wherein: the data management terminal is also used for sending the query request to the data confirmation terminal after receiving the request confirmation information, and the data confirmation terminal is also used for displaying the query request.
9. A block chain data management system according to claim 8, wherein: the number of the data management ends is greater than or equal to two, and each data management end is used for calculating the residual computing power information; the data management ends are connected through a network and are also used for transmitting endowment data, decryption logs and residual computing power information; each data management end is also used for calculating the data management end with the most residual computing power according to the residual computing power information; and the data management end with the most residual computing power is used for acquiring all aged data and decrypting logs, packaging the aged data and the decrypted logs into a new block and adding the new block to the tail end of the block chain.
10. A blockchain data management system according to claim 9, wherein: the decryption log comprises inquirers, inquiry objects, inquiry items and inquiry time.
CN202010413907.6A 2020-05-15 2020-05-15 Block chain data management system Active CN111581668B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010413907.6A CN111581668B (en) 2020-05-15 2020-05-15 Block chain data management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010413907.6A CN111581668B (en) 2020-05-15 2020-05-15 Block chain data management system

Publications (2)

Publication Number Publication Date
CN111581668A true CN111581668A (en) 2020-08-25
CN111581668B CN111581668B (en) 2023-05-16

Family

ID=72126903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010413907.6A Active CN111581668B (en) 2020-05-15 2020-05-15 Block chain data management system

Country Status (1)

Country Link
CN (1) CN111581668B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583911A (en) * 2020-12-07 2021-03-30 常州工业职业技术学院 Block chain-based home and community mutual-help care service care system
CN112633854A (en) * 2020-12-31 2021-04-09 重庆电子工程职业学院 Student archive management system based on block chain
CN112633721A (en) * 2020-12-29 2021-04-09 无锡太湖学院 Community endowment information processing method and system based on block chain
CN113658709A (en) * 2021-07-30 2021-11-16 青岛海尔生物医疗股份有限公司 Method, device, computer equipment and storage medium for medical data information query

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109146475A (en) * 2018-07-19 2019-01-04 无锡天脉聚源传媒科技有限公司 A kind of endowment service time settlement information processing method and system based on block chain
CN109614806A (en) * 2018-12-03 2019-04-12 北京工业大学 Log Administration System based on block chain
WO2019134780A1 (en) * 2018-01-04 2019-07-11 Bundesdruckerei Gmbh Personal document block chain structure
CN110119390A (en) * 2019-05-09 2019-08-13 广州宸量信息科技股份有限公司 Financial Information wrapped steel joint system based on block chain
CN110379501A (en) * 2019-07-16 2019-10-25 无锡太湖学院 A kind of virtual home for destitute ecosystem based on block chain
CN110458558A (en) * 2019-07-04 2019-11-15 重庆金融资产交易所有限责任公司 Data encryption method, device and computer equipment based on block chain
CN110958123A (en) * 2019-12-09 2020-04-03 国网新疆电力有限公司信息通信公司 Block chain-based data secure transmission method
CN110995751A (en) * 2019-12-18 2020-04-10 姚其新 Big data intelligent medical treatment and old age care service method and system based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019134780A1 (en) * 2018-01-04 2019-07-11 Bundesdruckerei Gmbh Personal document block chain structure
CN109146475A (en) * 2018-07-19 2019-01-04 无锡天脉聚源传媒科技有限公司 A kind of endowment service time settlement information processing method and system based on block chain
CN109614806A (en) * 2018-12-03 2019-04-12 北京工业大学 Log Administration System based on block chain
CN110119390A (en) * 2019-05-09 2019-08-13 广州宸量信息科技股份有限公司 Financial Information wrapped steel joint system based on block chain
CN110458558A (en) * 2019-07-04 2019-11-15 重庆金融资产交易所有限责任公司 Data encryption method, device and computer equipment based on block chain
CN110379501A (en) * 2019-07-16 2019-10-25 无锡太湖学院 A kind of virtual home for destitute ecosystem based on block chain
CN110958123A (en) * 2019-12-09 2020-04-03 国网新疆电力有限公司信息通信公司 Block chain-based data secure transmission method
CN110995751A (en) * 2019-12-18 2020-04-10 姚其新 Big data intelligent medical treatment and old age care service method and system based on block chain

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583911A (en) * 2020-12-07 2021-03-30 常州工业职业技术学院 Block chain-based home and community mutual-help care service care system
CN112633721A (en) * 2020-12-29 2021-04-09 无锡太湖学院 Community endowment information processing method and system based on block chain
CN112633854A (en) * 2020-12-31 2021-04-09 重庆电子工程职业学院 Student archive management system based on block chain
CN113658709A (en) * 2021-07-30 2021-11-16 青岛海尔生物医疗股份有限公司 Method, device, computer equipment and storage medium for medical data information query
CN113658709B (en) * 2021-07-30 2024-03-15 青岛海尔生物医疗股份有限公司 Method, device, computer equipment and storage medium for medical data information query

Also Published As

Publication number Publication date
CN111581668B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
CN111581668A (en) Block chain data management system
CN108830601B (en) Smart city information safe use method and system based on block chain
TW201947446A (en) Blockchain-based information supervision method and device
CN111698088B (en) Key alternation method, key alternation device, electronic equipment and medium
CN111400401A (en) Electronic medical record storage system based on block chain
CN110545273B (en) Resource allocation method and system based on block chain application
CN109104404A (en) A kind of medical big data system and method for dynamic encryption
CN114912090A (en) Block chain-based clinical test result mutual-recognition method and system
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
Dixon et al. Using temporal logics of knowledge in the formal verification of security protocols
CN107743120B (en) Detachable encrypted test question data transmission system and method
Naeem et al. A Multilayer Encryption Model to Protect Healthcare Data in Cloud Environment
Jonas et al. Privacy-preserving record grouping and consent management based on a public-private key signature scheme: theoretical analysis and feasibility study
CN110971511B (en) Instant messaging processing method, device, equipment and computer readable storage medium
EP3704617B1 (en) Privacy-preserving log analysis
Pullagura et al. A Complex Integrated Approach of Blockchain With Bigdata For Secure Scientific Data Sharing
CN113111365B (en) Online psychological consultation privacy data protection method, storage medium and system based on envelope encryption
Paramesh et al. Blockchain in smart health: Synergy for next generation ehealth system
CN116881973B (en) Financial privacy data trusted computing method and system based on multiple data sources
CN116049322B (en) Data sharing platform and method based on privacy calculation
CN117499159B (en) Block chain-based data transaction method and device and electronic equipment
CN116628682B (en) Data contract type opening method based on data sandbox and related equipment
CN113160888B (en) DNA synthesis sequence supervision method based on block chain
CN115333875B (en) Data sharing method, system, device and storage medium
CN110809035B (en) Decentralized anti-counterfeiting data generation and management method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant