CN112148280A - Block chain-based data evidence storage service templated development method - Google Patents
Block chain-based data evidence storage service templated development method Download PDFInfo
- Publication number
- CN112148280A CN112148280A CN202010992332.8A CN202010992332A CN112148280A CN 112148280 A CN112148280 A CN 112148280A CN 202010992332 A CN202010992332 A CN 202010992332A CN 112148280 A CN112148280 A CN 112148280A
- Authority
- CN
- China
- Prior art keywords
- user
- intelligent contract
- data
- signature
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/35—Creation or generation of source code model driven
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The invention discloses a block chain-based data evidence storage service templated development method, which comprises the following steps: designing an intelligent contract development template based on the Restful parameter template, and configuring a corresponding intelligent contract protocol; a user selects an intelligent contract development template according to an actual application scene and configures corresponding fields in the intelligent contract development template; generating a corresponding intelligent contract according to the selected intelligent contract development template and the configured field; and the user calls the generated intelligent contract according to the intelligent contract protocol to complete user management and/or evidence storage data management. The Restful parameter template is used for designing the intelligent contract development template, so that a user can complete the generation and deployment of the intelligent contract code only by filling in the field in the intelligent contract development template, and the service functions of user management, evidence storage data management and the like are easily realized. The service development cost is greatly reduced, and the service chaining can be realized at low cost without the need that a developer knows how to write intelligent contract codes.
Description
Technical Field
The invention relates to a block chain-based data evidence storage business templating development method.
Background
The problem of the existing data evidence storage business development is as follows:
(1) the difficulty of business development is great. Developers need to have a deep understanding of blockchain techniques and learn the corresponding programming languages in order to develop intelligent contracts.
(2) The security risk is high. The intelligent contracts written by developers may have security holes, so that attackers can freeze or steal assets in the contracts and delete the contracts by using the security holes.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the existing problems, a data evidence storing business templating development method based on a block chain is provided.
The technical scheme adopted by the invention is as follows:
a block chain-based data evidence storage service templated development method comprises the following steps:
designing an intelligent contract development template based on the Restful parameter template, and configuring a corresponding intelligent contract protocol; the intelligent contract development template comprises a user management template and a certificate storage data management template; the intelligent contract protocol comprises a user management protocol and a evidence storage data management protocol;
a user selects an intelligent contract development template according to an actual application scene and configures corresponding fields in the intelligent contract development template; generating a corresponding intelligent contract according to the selected intelligent contract development template and the configured field; the intelligent contracts comprise user management intelligent contracts and deposit data management intelligent contracts;
and the user calls the generated intelligent contract according to the intelligent contract protocol to complete user management and/or evidence storage data management.
Further, the user management template includes 5 fields:
name of field | Whether or not to fill | Description of field |
UID | Must fill in | User number |
UPK | Must fill in | User public key |
USign | Must fill in | User signature |
SSign | Non-necessary filling | Operator signature |
ULevel | Non-necessary filling | User identity rating |
。
Further, the user management protocol includes:
adding by the user: a user public key can be set, and the user public key is added after an operator signature SSign is verified;
and (3) updating by the user: the user signature USign needs to be verified and then can pass the updating;
and (3) deleting by the user: the user public key can be set and deleted after the operator signature SSign is verified.
Further, the method for the user to complete the user management according to the user management intelligent contract generated by the user management protocol call comprises the following steps:
A. user addition, including:
(1) a user locally generates a signature key pair { a user private key USK and a user public key UPK };
(2) the user sends { user adding request and user public key UPK } to the registration server to request identity registration;
(3) the registration server verifies the user signature, generates a user number UID for the user, calculates a signature SSign for { user adding request, the user number UID and a user public key UPK }, and returns { operator signature SSign and the user number UID } to the user;
(4) the user calls a user management intelligent contract, and the block chain verifies the signature SSign of the operator and then completes user addition;
B. user updates, including:
(1) calculating a signature USign of { a user updating request and a user number UID } by a user;
(2) the user calls a user management intelligent contract, and the block chain verifies the user signature USign and then completes user updating;
C. user deletion, including:
(1) the user sends { user deleting request, user number UID } to the registration server to request identity deletion;
(2) the registration server verifies the user signature, generates a user number UID for the user, calculates a signature SSign for { the user deleting request, the user number UID and the user public key UPK }, and returns { the operator signature SSign } to the user;
(3) and the user calls the user management intelligent contract, and the block chain verifies the signature SSign of the operator and then completes the user deletion.
Further, the evidence data management template comprises 7 fields:
name of field | Whether or not to fill | Description of field |
AID | Must fill in | Deposit certificate data numbering |
UID | Must fill in | Number of storage certificate owner |
UPK | Must fill in | The storage certificate owner's business |
AState | Non-necessary filling | The state of the deposit certificate data |
DSign | Must fill in | Signature of the owner of the deposit certificate |
type | Non-necessary filling | Data type |
op | Non-necessary filling | Manipulation of data |
。
Further, the certificate storing data management protocol is as follows: the addition, modification, deletion, and verification of the credential data must first verify the signature of the owner of the credential.
Furthermore, the method for the user to call the generated intelligent contract for the evidence storage data management according to the evidence storage data management protocol and complete the evidence storage data management comprises the following steps:
A. adding the evidence storing data, comprising:
(1) calculating a signature DSign of the { accreditation data adding request, the user number UID, the accreditation data number AID and the accreditation data D } by the user;
(2) the user calls an intelligent contract for managing the evidence storage data, and the addition of the evidence storage data is completed after the signature DSign is verified by the block chain;
B. and modifying the deposit certificate data, including:
(1) calculating a signature DSign of { certificate storing data modification request, user number UID, certificate storing data number AID and certificate storing data modification operation } by a user;
(2) the user calls an intelligent contract for managing the certificate-storing data, and the certificate-storing data is modified after the signature DSign is verified by the block chain;
C. and deleting the certificate storing data, including:
(1) the user calculates a signature DSign of the { certificate-storing data deleting request, the user number UID and the certificate-storing data number AID };
(2) the user calls an intelligent contract for managing the evidence storage data, and the deletion of the evidence storage data is completed after the block chain verifies the signature DSign;
D. verification of the certificate existence data, comprising:
(1) a user acquires data information { evidence storing data number AID };
(2) calculating a signature DSign of { the certificate storing data query request, the user number UID and the certificate storing data number AID } by the user;
(3) the user sends { certificate storing data query request, user number UID, certificate storing data number AID and DSign } to the block chain to request for checking;
(4) checking AID by the block chain;
(5) the inspection result is returned.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
1. fast development of a block chain intelligent contract template: the invention provides an intelligent contract development template and an intelligent contract protocol, which greatly reduce the access cost of a service mode, do not need an access party to understand how to write an intelligent contract code, can realize chain link certificate saving at low cost by only building a block chain operation environment, and greatly reduce the learning and development cost of developers.
2. Intelligent contract code security: the invention automatically generates the corresponding intelligent contract code for the user according to the uploaded Restful interface field and the rule, thereby reducing the security risk caused by the user writing the intelligent contract code.
3. Intelligent contract agreement security: the invention realizes that the intelligent contract operates the user and the evidence storing data according to the user management protocol and the evidence storing data management protocol, the user management protocol and the evidence storing data management protocol need to verify the identity and the parameters of the intelligent contract caller, thereby avoiding unauthorized data access and modification and ensuring the data security from the protocol perspective.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic diagram of a block chain-based data verification service templating development method according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the detailed description and specific examples, while indicating the preferred embodiment of the invention, are intended for purposes of illustration only and are not intended to limit the scope of the invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The features and properties of the present invention are described in further detail below with reference to examples.
The invention designs the intelligent contract development template by utilizing the Restful parameter template so as to realize that the user can complete the generation and the deployment of the intelligent contract code only by filling in the field in the intelligent contract development template, and easily realize the business functions of user management, evidence storage data management and the like. The service development cost is greatly reduced, and the service chaining can be realized at low cost without the need that a developer knows how to write intelligent contract codes. Therefore, as shown in fig. 1, the method for templated development of data evidence service based on a block chain according to the present invention includes:
designing an intelligent contract development template based on a Restful parameter template, and configuring a corresponding intelligent contract protocol; the intelligent contract development template comprises a user management template and a certificate storage data management template; the intelligent contract protocol comprises a user management protocol and a evidence storage data management protocol;
in some embodiments, the user management template includes 5 fields, { UID, UPK, USign, SSign, ULevel }, as shown in Table 1.
Table 1:
based on the user management template, the configured user management protocol comprises:
adding by the user: a user public key can be set, and the user public key is added after an operator signature SSign is verified;
and (3) updating by the user: the user signature USign needs to be verified and then can pass the updating;
and (3) deleting by the user: the user public key can be set and deleted after the operator signature SSign is verified.
In some embodiments, the forensic data management template includes 7 fields, { AID, UID, UPK, state, DSign, type, op }, as shown in table 2.
Table 2:
name of field | Whether or not to fill | Description of field |
AID | Must fill in | Deposit certificate data numbering |
UID | Must fill in | Number of storage certificate owner |
UPK | Must fill in | The storage certificate owner's business |
AState | Non-necessary filling | The state of the deposit certificate data |
DSign | Must fill in | Signature of the owner of the deposit certificate |
type | Non-necessary filling | Data type |
op | Non-necessary filling | Manipulation of data |
。
Based on the certificate-storing data management template, the configured certificate-storing data management protocol is as follows: the addition, modification, deletion, and verification of the credential data must first verify the signature of the owner of the credential.
The step provides an intelligent contract development template and an intelligent contract protocol, the access cost of a service mode is greatly reduced, an access party does not need to understand how to write an intelligent contract code, chain link evidence saving can be realized at low cost only by building a block chain operation environment, and the learning and development cost of a developer is greatly reduced.
Secondly, selecting an intelligent contract development template by a user according to an actual application scene, and configuring corresponding fields in the intelligent contract development template; generating a corresponding intelligent contract according to the selected intelligent contract development template and the configured field; the intelligent contracts comprise user management intelligent contracts and deposit data management intelligent contracts;
the step completes intelligent contract development and deployment, and the system automatically generates corresponding intelligent contract codes for the users according to the uploaded Restful interface fields and rules, so that the security risk caused by the users writing the intelligent contract codes is reduced. It should be noted that the generated intelligent contract code is a written intelligent contract code close to completion in advance, and includes user management and data storage management functions, and the generated complete intelligent contract code and the initialized intelligent contract are called through configured fields, so as to provide corresponding services.
And step three, the user calls the generated intelligent contract according to the intelligent contract protocol to complete user management and/or evidence storage data management.
When selecting the user management template, the user calls the generated user management intelligent contract according to the user management protocol, and the method for completing the user management comprises the following steps:
A. user addition, including:
(1) a user locally generates a signature key pair { a user private key USK and a user public key UPK };
(2) the user sends { user adding request and user public key UPK } to the registration server to request identity registration;
(3) the registration server verifies the user signature, generates a user number UID for the user, calculates a signature SSign for { user adding request, the user number UID and a user public key UPK }, and returns { operator signature SSign and the user number UID } to the user;
(4) the user calls a user management intelligent contract, and the block chain verifies the signature SSign of the operator and then completes user addition;
B. user updates, including:
(1) calculating a signature USign of { a user updating request and a user number UID } by a user;
(2) the user calls a user management intelligent contract, and the block chain verifies the user signature USign and then completes user updating;
C. user deletion, including:
(1) the user sends { user deleting request, user number UID } to the registration server to request identity deletion;
(2) the registration server verifies the user signature, generates a user number UID for the user, calculates a signature SSign for { the user deleting request, the user number UID and the user public key UPK }, and returns { the operator signature SSign } to the user;
(3) and the user calls the user management intelligent contract, and the block chain verifies the signature SSign of the operator and then completes the user deletion.
When selecting the evidence data management template, the user calls the generated intelligent contract for the evidence data management according to the evidence data management protocol, and the method for completing the evidence data management comprises the following steps:
A. adding the evidence storing data, comprising:
(1) calculating a signature DSign of the { accreditation data adding request, the user number UID, the accreditation data number AID and the accreditation data D } by the user;
(2) the user calls an intelligent contract for managing the evidence storage data, and the addition of the evidence storage data is completed after the signature DSign is verified by the block chain;
B. and modifying the deposit certificate data, including:
(1) calculating a signature DSign of { certificate storing data modification request, user number UID, certificate storing data number AID and certificate storing data modification operation } by a user;
(2) the user calls an intelligent contract for managing the certificate-storing data, and the certificate-storing data is modified after the signature DSign is verified by the block chain;
C. and deleting the certificate storing data, including:
(1) the user calculates a signature DSign of the { certificate-storing data deleting request, the user number UID and the certificate-storing data number AID };
(2) the user calls an intelligent contract for managing the evidence storage data, and the deletion of the evidence storage data is completed after the block chain verifies the signature DSign;
D. verification of the certificate existence data, comprising:
(1) a user acquires data information { evidence storing data number AID };
(2) calculating a signature DSign of { the certificate storing data query request, the user number UID and the certificate storing data number AID } by the user;
(3) the user sends { certificate storing data query request, user number UID, certificate storing data number AID and DSign } to the block chain to request for checking;
(4) checking AID by the block chain;
(5) the inspection result is returned.
The step realizes that the intelligent contract operates the user and the evidence storing data according to the user management protocol and the evidence storing data management protocol, the user management protocol and the evidence storing data management protocol need to verify the identity and the parameters of the intelligent contract caller, the unauthorized data access and modification are avoided, and the data security is ensured from the protocol perspective.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.
Claims (7)
1. A block chain-based data evidence storage service templated development method is characterized by comprising the following steps:
designing an intelligent contract development template based on the Restful parameter template, and configuring a corresponding intelligent contract protocol; the intelligent contract development template comprises a user management template and a certificate storage data management template; the intelligent contract protocol comprises a user management protocol and a evidence storage data management protocol;
a user selects an intelligent contract development template according to an actual application scene and configures corresponding fields in the intelligent contract development template; generating a corresponding intelligent contract according to the selected intelligent contract development template and the configured field; the intelligent contracts comprise user management intelligent contracts and deposit data management intelligent contracts;
and the user calls the generated intelligent contract according to the intelligent contract protocol to complete user management and/or evidence storage data management.
2. The blockchain-based data evidence business templated development method according to claim 1, wherein the user management template comprises 5 fields:
。
3. The blockchain-based data certification business templated development method according to claim 2, wherein the user management protocol comprises:
adding by the user: a user public key can be set, and the user public key is added after an operator signature SSign is verified;
and (3) updating by the user: the user signature USign needs to be verified and then can pass the updating;
and (3) deleting by the user: the user public key can be set and deleted after the operator signature SSign is verified.
4. The templatized development method of a blockchain-based data evidence business, according to claim 3, wherein a user invokes a generated user management intelligent contract according to a user management protocol, and the method for completing user management comprises:
A. user addition, including:
(1) a user locally generates a signature key pair { a user private key USK and a user public key UPK };
(2) the user sends { user adding request and user public key UPK } to the registration server to request identity registration;
(3) the registration server verifies the user signature, generates a user number UID for the user, calculates a signature SSign for { user adding request, the user number UID and a user public key UPK }, and returns { operator signature SSign and the user number UID } to the user;
(4) the user calls a user management intelligent contract, and the block chain verifies the signature SSign of the operator and then completes user addition;
B. user updates, including:
(1) calculating a signature USign of { a user updating request and a user number UID } by a user;
(2) the user calls a user management intelligent contract, and the block chain verifies the user signature USign and then completes user updating;
C. user deletion, including:
(1) the user sends { user deleting request, user number UID } to the registration server to request identity deletion;
(2) the registration server verifies the user signature, generates a user number UID for the user, calculates a signature SSign for { the user deleting request, the user number UID and the user public key UPK }, and returns { the operator signature SSign } to the user;
(3) and the user calls the user management intelligent contract, and the block chain verifies the signature SSign of the operator and then completes the user deletion.
5. The blockchain-based data credentialing business templated development method of claim 1, wherein the credentialing data management template comprises 7 fields:
。
6. The blockchain-based data certificate service templated development method according to claim 4, wherein the certificate data management protocol is: the addition, modification, deletion, and verification of the credential data must first verify the signature of the owner of the credential.
7. The templatized development method of a data evidence service based on a blockchain according to claim 5, wherein a user invokes a generated evidence data management intelligent contract according to an evidence data management protocol, and the method for completing the evidence data management comprises:
A. adding the evidence storing data, comprising:
(1) calculating a signature DSign of the { accreditation data adding request, the user number UID, the accreditation data number AID and the accreditation data D } by the user;
(2) the user calls an intelligent contract for managing the evidence storage data, and the addition of the evidence storage data is completed after the signature DSign is verified by the block chain;
B. and modifying the deposit certificate data, including:
(1) calculating a signature DSign of { certificate storing data modification request, user number UID, certificate storing data number AID and certificate storing data modification operation } by a user;
(2) the user calls an intelligent contract for managing the certificate-storing data, and the certificate-storing data is modified after the signature DSign is verified by the block chain;
C. and deleting the certificate storing data, including:
(1) the user calculates a signature DSign of the { certificate-storing data deleting request, the user number UID and the certificate-storing data number AID };
(2) the user calls an intelligent contract for managing the evidence storage data, and the deletion of the evidence storage data is completed after the block chain verifies the signature DSign;
D. verification of the certificate existence data, comprising:
(1) a user acquires data information { evidence storing data number AID };
(2) calculating a signature DSign of { the certificate storing data query request, the user number UID and the certificate storing data number AID } by the user;
(3) the user sends { certificate storing data query request, user number UID, certificate storing data number AID and DSign } to the block chain to request for checking;
(4) checking AID by the block chain;
(5) the inspection result is returned.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010992332.8A CN112148280B (en) | 2020-09-21 | 2020-09-21 | Block chain-based data evidence storage service templated development method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010992332.8A CN112148280B (en) | 2020-09-21 | 2020-09-21 | Block chain-based data evidence storage service templated development method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112148280A true CN112148280A (en) | 2020-12-29 |
CN112148280B CN112148280B (en) | 2022-04-01 |
Family
ID=73892644
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010992332.8A Active CN112148280B (en) | 2020-09-21 | 2020-09-21 | Block chain-based data evidence storage service templated development method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112148280B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109359979A (en) * | 2018-10-11 | 2019-02-19 | 成都量子永华科技有限公司 | A kind of all-in-one machine management platform based on MBM block chain |
CN112329007A (en) * | 2021-01-06 | 2021-02-05 | 睿至科技集团有限公司 | Sensitive data controllable sharing system and method |
CN114826618A (en) * | 2022-05-06 | 2022-07-29 | 珠海复旦创新研究院 | Certificate distribution and access control integrated system |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107862215A (en) * | 2017-09-29 | 2018-03-30 | 阿里巴巴集团控股有限公司 | A kind of date storage method, data query method and device |
CN109214883A (en) * | 2018-07-27 | 2019-01-15 | 阿里巴巴集团控股有限公司 | Service lease method, apparatus, system and electronic equipment based on block chain |
CN109460527A (en) * | 2018-09-25 | 2019-03-12 | 中国平安人寿保险股份有限公司 | Product data configuration method, device, computer equipment and storage medium |
EP3458982A1 (en) * | 2017-02-06 | 2019-03-27 | Northern Trust Corporation | Systems and methods for digital identity management and permission controls within distributed network nodes |
WO2019082100A1 (en) * | 2017-10-24 | 2019-05-02 | Tata Consultancy Services Limited | System and method for generating a blockchain application for different blockchain technologies |
CN110827145A (en) * | 2018-08-07 | 2020-02-21 | 北京果仁宝软件技术有限责任公司 | Processing method and system based on block chain intelligent contract |
CN110851127A (en) * | 2019-10-28 | 2020-02-28 | 杭州趣链科技有限公司 | Universal evidence storage method based on block chain |
CN110990879A (en) * | 2019-11-08 | 2020-04-10 | 中国电子科技网络信息安全有限公司 | Data evidence storing method based on block chain |
CN111490873A (en) * | 2020-03-25 | 2020-08-04 | 上海物融智能科技有限公司 | Block chain-based certificate information processing method and system |
CN111506579A (en) * | 2020-05-28 | 2020-08-07 | 支付宝(杭州)信息技术有限公司 | Method, program and equipment for generating intelligent contract code |
CN111526200A (en) * | 2020-04-27 | 2020-08-11 | 远光软件股份有限公司 | Data storage access method and system based on block chain and cloud platform |
-
2020
- 2020-09-21 CN CN202010992332.8A patent/CN112148280B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3458982A1 (en) * | 2017-02-06 | 2019-03-27 | Northern Trust Corporation | Systems and methods for digital identity management and permission controls within distributed network nodes |
CN107862215A (en) * | 2017-09-29 | 2018-03-30 | 阿里巴巴集团控股有限公司 | A kind of date storage method, data query method and device |
WO2019082100A1 (en) * | 2017-10-24 | 2019-05-02 | Tata Consultancy Services Limited | System and method for generating a blockchain application for different blockchain technologies |
CN109214883A (en) * | 2018-07-27 | 2019-01-15 | 阿里巴巴集团控股有限公司 | Service lease method, apparatus, system and electronic equipment based on block chain |
CN110827145A (en) * | 2018-08-07 | 2020-02-21 | 北京果仁宝软件技术有限责任公司 | Processing method and system based on block chain intelligent contract |
CN109460527A (en) * | 2018-09-25 | 2019-03-12 | 中国平安人寿保险股份有限公司 | Product data configuration method, device, computer equipment and storage medium |
CN110851127A (en) * | 2019-10-28 | 2020-02-28 | 杭州趣链科技有限公司 | Universal evidence storage method based on block chain |
CN110990879A (en) * | 2019-11-08 | 2020-04-10 | 中国电子科技网络信息安全有限公司 | Data evidence storing method based on block chain |
CN111490873A (en) * | 2020-03-25 | 2020-08-04 | 上海物融智能科技有限公司 | Block chain-based certificate information processing method and system |
CN111526200A (en) * | 2020-04-27 | 2020-08-11 | 远光软件股份有限公司 | Data storage access method and system based on block chain and cloud platform |
CN111506579A (en) * | 2020-05-28 | 2020-08-07 | 支付宝(杭州)信息技术有限公司 | Method, program and equipment for generating intelligent contract code |
Non-Patent Citations (3)
Title |
---|
DIANHUI MAO等: "Visual and User-Defined Smart Contract Designing System Based on Automatic Coding", 《IEEE ACCESS》 * |
杨东勇: "基于多种群遗传算法的检测器生成算法研究", 《自动化学报》 * |
沈智镔等: "基于区块链的电子签名和印章应用体系设计", 《水利信息化》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109359979A (en) * | 2018-10-11 | 2019-02-19 | 成都量子永华科技有限公司 | A kind of all-in-one machine management platform based on MBM block chain |
CN112329007A (en) * | 2021-01-06 | 2021-02-05 | 睿至科技集团有限公司 | Sensitive data controllable sharing system and method |
CN112329007B (en) * | 2021-01-06 | 2021-04-13 | 睿至科技集团有限公司 | Sensitive data controllable sharing system and method |
CN114826618A (en) * | 2022-05-06 | 2022-07-29 | 珠海复旦创新研究院 | Certificate distribution and access control integrated system |
Also Published As
Publication number | Publication date |
---|---|
CN112148280B (en) | 2022-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112148280B (en) | Block chain-based data evidence storage service templated development method | |
JP6872015B2 (en) | Secure access to sensitive data using blockchain ledger | |
CN110321735B (en) | Business handling method, system and storage medium based on zero knowledge certification | |
CN111144881A (en) | Selective access to asset transfer data | |
WO2019033394A1 (en) | Blockchain system and right management method therefor | |
CN110311782A (en) | Zero-knowledge proof method, system and the storage medium of personal information | |
CN112287034B (en) | Data synchronization method, equipment and computer readable storage medium | |
CN110147684A (en) | For realizing the method and apparatus of block chain data-privacy protection | |
CN110990879B (en) | Data evidence storing method based on block chain | |
CN112287033B (en) | Data synchronization method, equipment and computer readable storage medium | |
CN110149335B (en) | Method and equipment for establishing private area for block chain data privacy protection | |
CN113271311A (en) | Digital identity management method and system in cross-link network | |
CN112380219B (en) | Method for defining block chain cochain data service stipulation and application service stipulation | |
CN105791259A (en) | Method for protecting personal information | |
CN112712372A (en) | Alliance chain cross-chain system and information calling method | |
CN114553440B (en) | Cross-data center identity authentication method and system based on block chain and attribute signature | |
CN110008665B (en) | Authority control method and device for blockchain | |
CN114928499A (en) | Access control method based on block chain and trust system | |
CN113452701A (en) | Cross-chain system and cross-chain system-oriented distributed user identity authentication model | |
CN117056981A (en) | Digital identity management method and device | |
CN115208637B (en) | Access control method of blockchain intelligent contract | |
CN109413200A (en) | A kind of method, client, MES and electronic equipment that resource imports | |
CN114297598B (en) | User permission processing method and device | |
CN110807203A (en) | Data processing method, service operation center platform, system and storage medium | |
CN113890751A (en) | Method, apparatus and readable storage medium for controlling voting of alliance link authority |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |