CN111581668A - Block chain data management system - Google Patents
Block chain data management system Download PDFInfo
- Publication number
- CN111581668A CN111581668A CN202010413907.6A CN202010413907A CN111581668A CN 111581668 A CN111581668 A CN 111581668A CN 202010413907 A CN202010413907 A CN 202010413907A CN 111581668 A CN111581668 A CN 111581668A
- Authority
- CN
- China
- Prior art keywords
- data
- endowment
- data management
- block chain
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2471—Distributed queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Fuzzy Systems (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention relates to the technical field of data management, and particularly discloses a block chain data management system, which comprises: the data creating end is used for creating endowment data; the data confirmation end is used for creating a public key and a private key, receiving the endowment data from the data creation end and encrypting the endowment data based on the private key; the data management terminal is used for acquiring the public key and the encrypted endowment data from the data confirmation terminal, the block chain is locally stored in the data management terminal, and the data management terminal is also used for packaging the encrypted endowment data into a new block and adding the new block to the tail end of the block chain; the data creating end is further used for sending a query request to the data management end, the data management end is further used for receiving request confirmation information, and after receiving the request confirmation information, the encrypted endowment data is obtained from the block chain and is decrypted by using the public key; the data creation end is also used for sending the decrypted endowment data to the data creation end. By adopting the technical scheme of the invention, the leakage of the endowment data can be prevented.
Description
Technical Field
The present invention relates to the field of data management technologies, and in particular, to a block chain data management system.
Background
Traditional management of endowment data is achieved through a central database. But data in the centralized database can be tampered, authenticity of endowment data is difficult to guarantee, and once problems occur, responsibility is difficult to trace. In addition, the centralized server has the problem of single-point failure, which easily causes data loss and privacy disclosure, and some lawbreakers acquire the data in the database to perform illegal transactions, so that the users are difficult to perceive. Furthermore, the elderly, whether home-based care or in a care facility, often receive different care services, such as healthcare services, emergency rescue services, cultural education services, etc.; different endowment services are provided by different service parties and stored in central servers of different service parties, and data sharing is difficult to achieve.
In recent years, Blockchain (Blockchain) technology has become increasingly well known. The block chain is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, and the data in the blocks are guaranteed to be not falsified and forged in a cryptographic mode.
The block chain technology is applied to the management of the aged data, so that the data can be prevented from being tampered in the whole life cycle of the aged data, and the safety of the data is ensured. However, in the existing block chain technology, the contents in the blocks are public, which easily causes privacy disclosure.
For this reason, a management system capable of preventing leakage of aged care data is required.
Disclosure of Invention
The invention provides a block chain data management system which can prevent old data from leaking.
In order to solve the technical problem, the present application provides the following technical solutions:
a blockchain data management system, comprising:
the data creating end is used for creating endowment data;
the data confirmation end is used for creating a public key and a private key, receiving the endowment data from the data creation end and encrypting the endowment data based on the private key;
the data management terminal is used for acquiring the public key and the encrypted endowment data from the data confirmation terminal, the block chain is locally stored in the data management terminal, and the data management terminal is also used for packaging the encrypted endowment data into a new block and adding the new block to the tail end of the block chain;
the data creating end is further used for sending a query request to the data management end, the data management end is further used for receiving request confirmation information, and after receiving the request confirmation information, the encrypted endowment data is obtained from the block chain and is decrypted by using the public key; the data creation end is also used for sending the decrypted endowment data to the data creation end.
The basic scheme principle and the beneficial effects are as follows:
in the scheme, the data creation end is used by a person providing the endowment service, the data confirmation end is used by an old person receiving the endowment service, and the data management end is used by a manager of the endowment service. After the old people are subjected to the old care service by the old people providing the old care service, the old people providing the old care service creates old care data of the old people in the service at the data creation end; the data confirmation terminal used by the old people can receive the endowment data and encrypt the endowment data. The encrypted endowment data can be packaged into blocks by the data management end and added into a block chain. The endowment data is stored in a block chain mode, and the endowment data can be prevented from being tampered. Endowment data has passed through asymmetric encryption, even by the people acquisition, also can't learn concrete content, can effectively prevent revealing of endowment data, guarantee endowment data's security.
Meanwhile, in the scheme, when the personnel providing the endowment service need to inquire the endowment data of the old people, the data creation terminal can send an inquiry request to the data management terminal to perform subsequent inquiry, guarantee that the endowment data can be shared, and avoid the occurrence of an information island.
Further, the data creation end is also used for decrypting the encrypted endowment data to generate a decryption log; the data creation end is also used for packing the decryption log into a new block.
By generating the decryption log, the decryption record of the aged data can be recorded, and the decryption log is packaged into a new block, so that the decryption log can be prevented from being tampered, and the decryption log can be traced after problems occur.
Further, the endowment data comprises service items, service objects and detailed information.
Through the endowment data, detailed record information can be left for the endowment service.
Further, when the data confirmation terminal encrypts the endowment data based on the private key, only the detailed information is encrypted.
Service items and service objects are not encrypted, and subsequent retrieval is facilitated.
Further, the query request includes a querier, a query object, and a query term.
The specific requirements of the query can be known through the query request.
Further, the data creating end is further configured to, after receiving the request confirmation information, retrieve the encrypted endowment data from all blocks of the block chain based on the query object and the query item, and decrypt the retrieved encrypted endowment data with the public key.
Through sufficient retrieval, the required endowment data can be found.
Further, the data creating end also prestores a white list, wherein the white list comprises a permission object and a permission query item; and the data management terminal also judges whether the received request confirmation information has the authority or not based on the white list, and if so, retrieves the encrypted endowment data from all blocks of the block chain based on the query object and the query item.
By establishing the white list, the manager is not required to check each query request and input request confirmation information, so that the checking workload of the manager can be reduced, and meanwhile, the waiting time for the query of the personnel providing the endowment service can be reduced.
Further, the data management terminal is further configured to send the query request to the data confirmation terminal after receiving the request confirmation information, and the data confirmation terminal is further configured to display the query request.
The old people can know that the old people inquire the old care information through the data confirmation terminal.
Further, the number of the data management ends is greater than or equal to two, and each data management end is used for calculating the residual computing power information; the data management ends are connected through a network and are also used for transmitting endowment data, decryption logs and residual computing power information; each data management end is also used for calculating the data management end with the most residual computing power according to the residual computing power information; and the data management end with the most residual computing power is used for acquiring all aged data and decrypting logs, packaging the aged data and the decrypted logs into a new block and adding the new block to the tail end of the block chain.
In the preferred scheme, each data management end is used as a block chain node; and the data is stored in a distributed manner, so that the safety of the data is ensured. In the prior art, a workload proof method is usually adopted to determine which block with block chain link points packed can be added into a block chain; however, this method results in a large amount of wasted electric energy, which undoubtedly increases the operation cost of the whole system. In reality, the data management end often processes other tasks, such as daily office work performed by management personnel. In the preferred scheme, the data management end with the most residual computing power is adopted for packaging; the interference of packaging on other tasks can be effectively reduced to the minimum. Meanwhile, workload is abandoned, so that energy consumption is reduced, and operation cost is reduced.
Further, the decryption log comprises inquirers, inquiry objects, inquiry items and inquiry time.
Through recording various decrypted information in detail, tracing after problems occur is facilitated
Drawings
Fig. 1 is a logic diagram of a first embodiment of a blockchain data management system.
Detailed Description
The following is further detailed by way of specific embodiments:
example one
As shown in fig. 1, a block chain data management system of the present embodiment includes a data creation end, a data confirmation end, and a data management end. In this embodiment, the number of the data creation end, the number of the data confirmation end, and the number of the data management end are all greater than or equal to two.
The data creator is used by a person who provides an elderly care service, such as a medical person who provides a healthcare service. And the data creation end is used for creating endowment data. The data creation end is a computer or a mobile phone, and in the embodiment, is a computer. The endowment data includes service items, service objects, and detailed information. The detailed information refers to recorded information of specific contents of the service item; for example, in the healthcare service, the detailed information includes a physical examination report if it is a physical examination, and a diagnosis report if it is a disease diagnosis. The data creating end is also used for sending a query request to the data management end; in this embodiment, the query request includes a querier, a query object, and a query term.
The data confirmation terminal is used by the old who receives the endowment service. The data confirmation terminal is a computer or a mobile phone, and in the embodiment, the mobile phone. The data confirmation end is used for creating a public key and a private key, receiving the endowment data from the data creation end, and encrypting the endowment data based on the private key. In this embodiment, when the data confirmation terminal encrypts the endowment data based on the private key, only the detailed information is encrypted. For example, after a community doctor A performs medical care service on an old person B, the community doctor A creates endowment data of the old person B at a data creation end; and the data confirmation terminal used by the old B can receive the endowment data and encrypt the endowment data.
The data management end is used by managers of the endowment service, and complete block chains are stored locally in each data management end. Each data management end is also used for acquiring the public key and the encrypted endowment data from the data confirmation end. In this embodiment, each data management terminal only receives the public key and the encrypted endowment data sent by the data validation terminal in the jurisdiction. Each data management terminal establishes association with a plurality of data confirmation terminals (so that one administrator is responsible for managing a plurality of old people) and directional transmission of information belong to the prior art, and details are not repeated here. In other embodiments, the manager can also push other information to the data confirmation end through the data management end.
Each data management terminal is also used for receiving the query request. Each data management terminal is further used for receiving confirmation request information, retrieving the encrypted endowment data from all blocks of the block chain based on query objects and query items in the query request after receiving the request confirmation information, and decrypting the retrieved encrypted endowment data by using the public key. The data creation end is also used for sending the decrypted endowment data to the data creation end.
The data creating end is also used for generating a decryption log after decrypting the encrypted endowment data. In this embodiment, the decryption log includes the inquirer, the inquiry object, the inquiry item, and the inquiry time. In this embodiment, each data management terminal only retrieves the query request of the elderly people in the jurisdiction. In other words, in the query request, the query object is the old person in charge of the administrator to which the data management end belongs, and the data management end can perform retrieval. Therefore, all data management terminals can be effectively prevented from responding to the query request, and repeated retrieval is avoided.
For example, before performing medical care service on the old people B, the community doctor a needs to know the past physical examination report or diagnosis report of the old people B, and the community doctor a can send a query request through the data creation terminal, specifically, the query request is that: A. and querying the object: b, querying items: medical care services. The administrator C can see the inquiry request of the community doctor A at the data management end, if the administrator C agrees, confirmation request information can be input, each data management end can conduct retrieval in the existing block, and finally the aged care data decrypted by the old people B are sent to the data creation end of the community doctor A.
Each data management end is used for calculating the residual computing power information; the data management ends are connected with each other through a network and are also used for transmitting encrypted endowment data, encrypted decryption logs and residual computing power information; each data management end is also used for calculating the data management end with the most residual computing power according to the residual computing power information; and the data management end with the most residual computing power is used for acquiring all encrypted endowment data and decryption logs, packaging the encrypted endowment data and the decryption logs into a new block and adding the new block to the tail end of the block chain. The block packing and the block chain for adding blocks belong to the prior art, and are not described herein again.
The data management terminal is also used for sending the query request to the data confirmation terminal after receiving the request confirmation information, and the data confirmation terminal is also used for displaying the query request. For example, a community doctor A sends a query request through a data creation end, and an old B can also see the query request through a data confirmation end, so that the old B can know that a person is looking up the old data.
Example two
The difference between this embodiment and the first embodiment is that a white list is also pre-stored in the data creation end in this embodiment, where the white list includes a permission object and a permission query item; and the data management terminal also judges whether the received request confirmation information has the authority or not based on the white list, and if so, retrieves the encrypted endowment data from all blocks of the block chain based on the query object and the query item.
For example, the whitelist includes permission objects: d, permission query item: and (6) legal consultation. When lawyer D needs to know the past legal consultation condition of old man B before carrying out legal consultation service on old man B, a query request is sent through a data creating end, and the query request is specifically a query man: D. and querying the object: b, querying items: and (6) legal consultation. The data management end judges that the received request confirmation information is authorized (the permission object is consistent with the inquirer and the inquiry item is consistent with the permission inquiry item) based on the white list, and at this time, the intervention of the administrator C is not needed. The auditing workload of the administrator C can be reduced, and the waiting time of inquiry can also be reduced.
EXAMPLE III
The difference between this embodiment and the first embodiment is that, in this embodiment, the endowment data further includes service time. In this embodiment, the data confirmation terminal is further configured to collect voice information during a service process. The data confirmation terminal is also internally stored with a preset sentence library, and the sentence library comprises a first key sentence, a second key sentence and a third key sentence. The data confirmation terminal is also used for matching the voice information with the sentence library. When the data confirmation end matches a first key sentence from the sentence library, starting timing, when the data confirmation end matches a second key sentence from the sentence library, calculating the interval duration of the first key sentence and the second key sentence, judging whether the interval duration is less than a preset duration, if not, marking the data confirmation end as invalid time, and restarting to match the first key sentence; if the interval duration is less than the preset duration, when the data confirmation end is matched with the third key statement, the timing duration from the matching to the first key statement to the matching to the third key statement is marked as service time. In this embodiment, the data confirmation terminal is a mobile phone.
The data confirmation terminal is further used for outputting key statement selection information when a plurality of first key statements, second key statements or third key statements are matched, and determining information marking service time based on the received key statements. The data confirmation terminal is also used for calculating the difference value between the service time obtained by the terminal and the service time created by the data creation terminal, judging whether the difference value is smaller than a preset statistical error, if so, marking the service time created by the data creation terminal as authenticated service time, and encrypting the endowment data based on a private key. And if the difference is larger than the preset statistical error, marking the service time created by the creation end as the service time to be authenticated, adding the service time obtained by the terminal into the endowment data, and encrypting the endowment data based on the private key.
In this embodiment, the first key statement is the words spoken by the service provider when the service item is started. Taking the service item of washing hair as an example, when starting, the service person usually says "let me give you a bar of washing hair", "do ready, we start washing hair bar", "start washing hair", "you come to wash hair bar", and the like. The second key sentence is the words that the service person says in the service project, taking the service project of washing hair as an example, in washing hair, the service person usually says "do the water temperature properly", "do not scald, cool, do not need to heat water", etc. The third key sentence is the word that the service person says when the service item ends, taking the service item of washing hair as an example, when the service item ends, the service person usually says "wash finished", "washed clean", and the like.
The voice information is matched with the sentence library, the service time is automatically recorded, the difference value between the service time obtained by the terminal and the service time created by the data creation end is calculated, whether the difference value is smaller than a preset statistical error or not is judged, and whether the service time input of the data creation end has a problem or not can be judged. And judging whether the interval duration is less than the preset duration, and if not, marking the data confirmation end as invalid time so as to improve the accuracy of acquisition. Or take a service item of washing hair as an example, when a service person says that the sentence "let me come to wash your head bar" may be said to start after meeting the old, and then the service person will be at home with the old chatter chatter, prepare a towel, and start real hair washing after half an hour. If only the matching of the first key sentence is started and the matching of the third key sentence is ended, a large amount of invalid time is easily recorded, resulting in a decrease in accuracy. By setting the second keyword, the interval duration between the first key sentence and the second key sentence is calculated, whether the service is immediately carried out after the timing is started can be effectively judged, and the accuracy of recording can be improved.
In practical situations, a service person may not say a key sentence more than once, for example, after the service person says "let me wash your head for" 2 minutes later, say "begin to wash head", the interval duration between the first key sentence and the second key sentence of two times is less than the preset duration, and then which first key sentence is taken as the time point for starting recording, in this embodiment, the key sentence selection information is output; and enabling the old to select, determining information based on the received key sentences input by the old, timing according to the first key sentence determined by the old as a starting point, recalculating, marking service time and outputting.
The first key sentence, the second key sentence, and the third key sentence may be set according to actual service items, and are not limited to hair washing as described in the present embodiment, but may be sanitary, cooking, massaging, physical examination, hair cutting, and the like.
The above are merely examples of the present invention, and the present invention is not limited to the field related to this embodiment, and the common general knowledge of the known specific structures and characteristics in the schemes is not described herein too much, and those skilled in the art can know all the common technical knowledge in the technical field before the application date or the priority date, can know all the prior art in this field, and have the ability to apply the conventional experimental means before this date, and those skilled in the art can combine their own ability to perfect and implement the scheme, and some typical known structures or known methods should not become barriers to the implementation of the present invention by those skilled in the art in light of the teaching provided in the present application. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.
Claims (10)
1. A blockchain data management system, comprising:
the data creating end is used for creating endowment data;
the data confirmation end is used for creating a public key and a private key, receiving the endowment data from the data creation end and encrypting the endowment data based on the private key;
the data management terminal is used for acquiring the public key and the encrypted endowment data from the data confirmation terminal, the block chain is locally stored in the data management terminal, and the data management terminal is also used for packaging the encrypted endowment data into a new block and adding the new block to the tail end of the block chain;
the data creating end is further used for sending a query request to the data management end, the data management end is further used for receiving request confirmation information, and after receiving the request confirmation information, the encrypted endowment data is obtained from the block chain and is decrypted by using the public key; the data creation end is also used for sending the decrypted endowment data to the data creation end.
2. A block chain data management system according to claim 1, wherein: the data creation end is also used for decrypting the encrypted endowment data to generate a decryption log; the data creation end is also used for packing the decryption log into a new block.
3. A block chain data management system according to claim 2, wherein: the endowment data includes service items, service objects, and detailed information.
4. A block chain data management system according to claim 3, wherein: and when the data confirmation terminal encrypts the endowment data based on the private key, only the detailed information is encrypted.
5. A block chain data management system according to claim 4, wherein: the query request includes a querier, a query object, and a query term.
6. A block chain data management system according to claim 5, wherein: and the data creating end is also used for retrieving the encrypted endowment data from all blocks of the block chain based on the query object and the query item after receiving the request confirmation information, and decrypting the retrieved encrypted endowment data by using the public key.
7. A block chain data management system according to claim 6, wherein: the data creating end also prestores a white list, wherein the white list comprises a permission object and a permission query item; and the data management terminal also judges whether the received request confirmation information has the authority or not based on the white list, and if so, retrieves the encrypted endowment data from all blocks of the block chain based on the query object and the query item.
8. A block chain data management system according to claim 7, wherein: the data management terminal is also used for sending the query request to the data confirmation terminal after receiving the request confirmation information, and the data confirmation terminal is also used for displaying the query request.
9. A block chain data management system according to claim 8, wherein: the number of the data management ends is greater than or equal to two, and each data management end is used for calculating the residual computing power information; the data management ends are connected through a network and are also used for transmitting endowment data, decryption logs and residual computing power information; each data management end is also used for calculating the data management end with the most residual computing power according to the residual computing power information; and the data management end with the most residual computing power is used for acquiring all aged data and decrypting logs, packaging the aged data and the decrypted logs into a new block and adding the new block to the tail end of the block chain.
10. A blockchain data management system according to claim 9, wherein: the decryption log comprises inquirers, inquiry objects, inquiry items and inquiry time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010413907.6A CN111581668B (en) | 2020-05-15 | 2020-05-15 | Block chain data management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010413907.6A CN111581668B (en) | 2020-05-15 | 2020-05-15 | Block chain data management system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111581668A true CN111581668A (en) | 2020-08-25 |
CN111581668B CN111581668B (en) | 2023-05-16 |
Family
ID=72126903
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010413907.6A Active CN111581668B (en) | 2020-05-15 | 2020-05-15 | Block chain data management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111581668B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112583911A (en) * | 2020-12-07 | 2021-03-30 | 常州工业职业技术学院 | Block chain-based home and community mutual-help care service care system |
CN112633854A (en) * | 2020-12-31 | 2021-04-09 | 重庆电子工程职业学院 | Student archive management system based on block chain |
CN112633721A (en) * | 2020-12-29 | 2021-04-09 | 无锡太湖学院 | Community endowment information processing method and system based on block chain |
CN113658709A (en) * | 2021-07-30 | 2021-11-16 | 青岛海尔生物医疗股份有限公司 | Method, device, computer equipment and storage medium for medical data information query |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109146475A (en) * | 2018-07-19 | 2019-01-04 | 无锡天脉聚源传媒科技有限公司 | A kind of endowment service time settlement information processing method and system based on block chain |
CN109614806A (en) * | 2018-12-03 | 2019-04-12 | 北京工业大学 | Log Administration System based on block chain |
WO2019134780A1 (en) * | 2018-01-04 | 2019-07-11 | Bundesdruckerei Gmbh | Personal document block chain structure |
CN110119390A (en) * | 2019-05-09 | 2019-08-13 | 广州宸量信息科技股份有限公司 | Financial Information wrapped steel joint system based on block chain |
CN110379501A (en) * | 2019-07-16 | 2019-10-25 | 无锡太湖学院 | A kind of virtual home for destitute ecosystem based on block chain |
CN110458558A (en) * | 2019-07-04 | 2019-11-15 | 重庆金融资产交易所有限责任公司 | Data encryption method, device and computer equipment based on block chain |
CN110958123A (en) * | 2019-12-09 | 2020-04-03 | 国网新疆电力有限公司信息通信公司 | Block chain-based data secure transmission method |
CN110995751A (en) * | 2019-12-18 | 2020-04-10 | 姚其新 | Big data intelligent medical treatment and old age care service method and system based on block chain |
-
2020
- 2020-05-15 CN CN202010413907.6A patent/CN111581668B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019134780A1 (en) * | 2018-01-04 | 2019-07-11 | Bundesdruckerei Gmbh | Personal document block chain structure |
CN109146475A (en) * | 2018-07-19 | 2019-01-04 | 无锡天脉聚源传媒科技有限公司 | A kind of endowment service time settlement information processing method and system based on block chain |
CN109614806A (en) * | 2018-12-03 | 2019-04-12 | 北京工业大学 | Log Administration System based on block chain |
CN110119390A (en) * | 2019-05-09 | 2019-08-13 | 广州宸量信息科技股份有限公司 | Financial Information wrapped steel joint system based on block chain |
CN110458558A (en) * | 2019-07-04 | 2019-11-15 | 重庆金融资产交易所有限责任公司 | Data encryption method, device and computer equipment based on block chain |
CN110379501A (en) * | 2019-07-16 | 2019-10-25 | 无锡太湖学院 | A kind of virtual home for destitute ecosystem based on block chain |
CN110958123A (en) * | 2019-12-09 | 2020-04-03 | 国网新疆电力有限公司信息通信公司 | Block chain-based data secure transmission method |
CN110995751A (en) * | 2019-12-18 | 2020-04-10 | 姚其新 | Big data intelligent medical treatment and old age care service method and system based on block chain |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112583911A (en) * | 2020-12-07 | 2021-03-30 | 常州工业职业技术学院 | Block chain-based home and community mutual-help care service care system |
CN112633721A (en) * | 2020-12-29 | 2021-04-09 | 无锡太湖学院 | Community endowment information processing method and system based on block chain |
CN112633854A (en) * | 2020-12-31 | 2021-04-09 | 重庆电子工程职业学院 | Student archive management system based on block chain |
CN113658709A (en) * | 2021-07-30 | 2021-11-16 | 青岛海尔生物医疗股份有限公司 | Method, device, computer equipment and storage medium for medical data information query |
CN113658709B (en) * | 2021-07-30 | 2024-03-15 | 青岛海尔生物医疗股份有限公司 | Method, device, computer equipment and storage medium for medical data information query |
Also Published As
Publication number | Publication date |
---|---|
CN111581668B (en) | 2023-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111581668A (en) | Block chain data management system | |
CN108830601B (en) | Smart city information safe use method and system based on block chain | |
TW201947446A (en) | Blockchain-based information supervision method and device | |
CN111698088B (en) | Key alternation method, key alternation device, electronic equipment and medium | |
CN111400401A (en) | Electronic medical record storage system based on block chain | |
CN110545273B (en) | Resource allocation method and system based on block chain application | |
CN109104404A (en) | A kind of medical big data system and method for dynamic encryption | |
CN114912090A (en) | Block chain-based clinical test result mutual-recognition method and system | |
CN117240625B (en) | Tamper-resistant data processing method and device and electronic equipment | |
Dixon et al. | Using temporal logics of knowledge in the formal verification of security protocols | |
CN107743120B (en) | Detachable encrypted test question data transmission system and method | |
Naeem et al. | A Multilayer Encryption Model to Protect Healthcare Data in Cloud Environment | |
Jonas et al. | Privacy-preserving record grouping and consent management based on a public-private key signature scheme: theoretical analysis and feasibility study | |
CN110971511B (en) | Instant messaging processing method, device, equipment and computer readable storage medium | |
EP3704617B1 (en) | Privacy-preserving log analysis | |
Pullagura et al. | A Complex Integrated Approach of Blockchain With Bigdata For Secure Scientific Data Sharing | |
CN113111365B (en) | Online psychological consultation privacy data protection method, storage medium and system based on envelope encryption | |
Paramesh et al. | Blockchain in smart health: Synergy for next generation ehealth system | |
CN116881973B (en) | Financial privacy data trusted computing method and system based on multiple data sources | |
CN116049322B (en) | Data sharing platform and method based on privacy calculation | |
CN117499159B (en) | Block chain-based data transaction method and device and electronic equipment | |
CN116628682B (en) | Data contract type opening method based on data sandbox and related equipment | |
CN113160888B (en) | DNA synthesis sequence supervision method based on block chain | |
CN115333875B (en) | Data sharing method, system, device and storage medium | |
CN110809035B (en) | Decentralized anti-counterfeiting data generation and management method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |