CN112202737A - Worker skill rating method based on block chain technology - Google Patents

Worker skill rating method based on block chain technology Download PDF

Info

Publication number
CN112202737A
CN112202737A CN202010969773.6A CN202010969773A CN112202737A CN 112202737 A CN112202737 A CN 112202737A CN 202010969773 A CN202010969773 A CN 202010969773A CN 112202737 A CN112202737 A CN 112202737A
Authority
CN
China
Prior art keywords
grade
certificate
module
encryption
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010969773.6A
Other languages
Chinese (zh)
Inventor
李士春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tiger Craft Technology Investment Development Co ltd
Original Assignee
Shenzhen Tiger Craft Technology Investment Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tiger Craft Technology Investment Development Co ltd filed Critical Shenzhen Tiger Craft Technology Investment Development Co ltd
Priority to CN202010969773.6A priority Critical patent/CN112202737A/en
Publication of CN112202737A publication Critical patent/CN112202737A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a worker skill rating method based on block chain technology. The invention discloses a worker skill rating method based on block chain technology, which comprises a general server, an encryption module, a writing block, a network transmission module, a storage medium module, a certificate generation module and a certificate verification module, the output end of the encryption module is connected with the input end of the certificate generation module, the output end of the certificate generation module is connected with the input end of the certificate verification module, the output end of the network transmission module is connected with the input end of the encryption module, the grade is rewritten in the certificate checking module, the original data block is checked according to the obtained certificate, only increase and decrease can be carried out, so that the system is more accurate and error-free when the skill grade of a worker is rated, therefore, the accuracy is improved, and meanwhile, by using the system, the complicated operation steps in the manual rating process are reduced, so that the labor burden of workers is reduced.

Description

Worker skill rating method based on block chain technology
Technical Field
The invention belongs to the technical field of skill rating, and particularly relates to a worker skill rating method based on a block chain technology.
Background
The worker skill level criteria is a scale that measures the work level and the worker skill level. And (3) making a teaching plan of a mechanic school or a professional high school and main bases for training, checking, grading and upgrading workers. Each industry department makes a technical grade (standard) table according to the complexity, the accuracy and the responsibility of work of different types of work, theoretical knowledge and production skills which are necessary for workers to complete the work, and the like. Each job in the table is specified with a highest and lowest rating. Generally divided into eight grades such as first grade, middle grade and high grade. Wherein, the grade 1-3 is primary, the grade 4-6 is intermediate, and the grade 7-8 is advanced.
Aiming at the characteristics that industrial workers of construction units in the building industry have large popularity and are scattered, and other units need to be reevaluated when the skills of industrial workers of other units are assessed to a new unit, the invention realizes the skill rating assessment method of industrial workers by using the characteristics of the block chain technology which cannot be tampered and the consensus trust mechanism.
Disclosure of Invention
The invention aims to: in order to solve the above-mentioned proposed problems, a worker skill rating method for a block chain technology-based is provided.
The technical scheme adopted by the invention is as follows: the utility model provides a worker skill rating method for based on block chain technique, includes total server, encryption module, writes into the block, network transmission module, storage medium module, voucher generation module, voucher check module, the output of total server is connected with the input of encryption module, the output of encryption module is connected with the input of voucher generation module, the output of voucher generation module is connected with the input of voucher check module, the output of network transmission module is connected with the input of encryption module, the output of storage medium module is connected with the input of encryption module, the output of writing into the block is connected with the input of total server.
In a preferred embodiment, when a group of worker data generates a write block from a node in the write block, other nodes in a block chain participate in data encryption together, a zookeeper of a microservice framework can be used as a registry during encryption, a public key exists in the registry, all nodes need to be registered in the registry and continuously acquire a certificate generated by an ore machine, and the ore machine adopts an algorithm defining a consensus process to ensure consistency. And (3) encrypting data by using an AES encryption algorithm by using the credential MD5 generated by the mining machine as a key and a public key, and obtaining a final data block by using the encrypted data and the credential.
In a preferred embodiment, the ZooKeeper inside the write block is based on a Fast Paxos algorithm, which has a livelock problem, that is, when multiple servers are submitted in a staggered manner, there is a possibility that none of the servers can be successfully submitted due to mutual exclusion, and Fast Paxos is optimized, and a leader (leader) is generated by selecting, and only the leader can submit the servers, and a specific algorithm can see Fast Paxos, so that to understand that the ZooKeeper first knows about Fast Paxos, the basic operation flow of the ZooKeeper is as follows:
s1, electing a Leader;
s2, synchronizing data;
s3, there are many algorithms in the Leader election process, but the election standards to be achieved are consistent;
s4, the Leader has the highest execution ID, similar to root authority;
s5, most machines in the cluster get response and accept the selected Leader.
In a preferred embodiment, when a server or system software needs to read worker data, the inside of the main server needs other server nodes to provide a certificate together, the worker information is stored in the encrypted data block itself, any node cannot be acquired independently, the node itself does not store data, when the data block information is read, all nodes need to perform data block decryption by using an algorithm of a consensus process, the certificate is attached to the tail section of the data block and proves that the tail section of the data block exists, and the information acquisition process is a process of performing AES decryption on the front section of the data block after being encoded by the certificate MD5 of the tail section of the data block.
In a preferred embodiment, the internal AES decryption process of the global server employs AES technology, which is a symmetric block encryption technology that uses 128-bit block encryption data and provides higher encryption strength than the RC4 algorithm of WEP/TKIPS; the encryption code table and the decryption code table of the AES are separated, and the encryption of the subkey is supported, which is superior to the former method of decrypting by using a special key; the AES algorithm supports any packet size, and the initial time is fast; in particular, it has parallelism that makes efficient use of processor resources; the AES has the advantages of wide application range, short waiting time, relative easy hiding, high throughput and the like, and is superior to the WEP algorithm in the aspects of performance and the like; by utilizing the algorithm for encryption, the security of the WLAN is greatly improved; the AES algorithm has been finally confirmed in the 802.11i standard, becoming a new generation of encryption algorithms to replace WEP; however, the AES algorithm has a high requirement on hardware, so AES cannot be implemented by upgrading firmware on the original device, and the chip must be redesigned.
In a preferred embodiment, a grade mechanism is added in the voucher generation module, so that the grade value can only be increased but cannot be reduced; the data block consists of a worker identity card number, a job code, a grade, a job level and a certificate, wherein the job code is a unique ID generated by the system, and the grade and the job level are replaced by numerical values.
In a preferred embodiment, the internal certificate of the certificate generation module must be generated by other nodes together, and cannot be generated by an independent node, the certificate exists in the tail section of the data block, and the information acquisition process is the process of performing AES decryption on the front section of the data block after the certificate MD5 in the tail section of the data block is encoded; the generation of the voucher is the mining process of the mining machine, and a series of serial numbers are obtained by the algorithm of other nodes.
In a preferred embodiment, the network transmission module adopts the highest grade to write in when obtaining the skill grade of a worker, wherein the certificate grade needs to be obtained from other nodes, and the grade of the worker is high at the beginning of the middle, 1 is high, 2 is middle, and 3 is primary; the job level is 1 at the lowest, and the higher the value, the job level is the second grade granularity of the grade.
In a preferred embodiment, the level of rewriting into the inside of the credential checking module needs to check the original data block according to the obtained credential, and only increase or decrease the level, the checking process is a decryption process, a public key is obtained from the registry first, the credential generation key and the public key are taken out from the data block to decrypt to obtain information, and when the entry level is greater than the original level, or the entry level is equal to the level and the role level is greater than the original role level, the mining machine is allowed to be notified to generate a new credential to be added to the tail of the original data block.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
1. in the invention, the grade is rewritten in the certificate checking module, the original data block is checked according to the obtained certificate, and only increase and decrease are needed, so that the system is more accurate and correct when the skill grade of a worker is graded, thereby improving the accuracy.
2. In the invention, the worker information encryption data block is transmitted through the network or written into the storage medium certificate to be generated by other nodes together, and can not be generated by independent nodes, and the worker information encryption data block is used together with the encryption module and the network transmission module, so that the information crisis caused by the leakage of the personal information of workers is avoided, and the safety of the system for storing the skill data is improved.
Drawings
FIG. 1 is a block diagram of the system architecture of the present invention.
The labels in the figure are: 1-a main server, 2-an encryption module, 3-a write block, 4-a network transmission module, 5-a storage medium module, 6-a certificate generation module and 7-a certificate verification module.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, a worker skill rating method based on a block chain technology includes a main server 1, an encryption module 2, a write-in block 3, a network transmission module 4, a storage medium module 5, a certificate generation module 6, and a certificate verification module 7, wherein an output end of the main server 1 is connected with an input end of the encryption module 2, an output end of the encryption module 2 is connected with an input end of the certificate generation module 6, and a grade mechanism added in the certificate generation module 6 is added in the certificate generation module, so that a grade value can only be increased or not decreased; the data block is composed of a worker identity card number, a job code, a grade, a job level and a certificate, the job code is a unique ID generated by the system, the grade and the job level are represented by numerical values, the generation of the internal certificate of the certificate generation module 6 must be jointly generated through other nodes and cannot be generated through independent nodes, the certificate has a tail section of the data block, and the information acquisition process is a process of carrying out AES decryption on a front section of the data block after the certificate MD5 of the tail section of the data block is encoded; the generation of the voucher is the process of mining by an ore machine, and a series of serial numbers are obtained by algorithms of other nodes; the output end of the certificate generation module 6 is connected with the input end of the certificate verification module 7, the grade is rewritten in the certificate verification module 7, the original data block needs to be verified according to the obtained certificate, only the grade can be increased but cannot be reduced, the verification process is a decryption process, a public key is obtained from a registration center, the certificate is taken out from the data block, a secret key and the public key are generated, decryption is carried out to obtain information, and when the grade of the entered parameter is larger than the original grade, or the grade of the entered parameter is equal to the grade and the role grade is larger than the original role grade, the mining machine is allowed to be informed to generate a new certificate and add the new certificate; the output end of the network transmission module 4 is connected with the input end of the encryption module 2, the network transmission module 4 adopts the highest grade to write in when obtaining the skill grade of a worker, wherein the certificate grade needs to be obtained from other nodes, the grade of the worker is high at the beginning of the middle, 1 is high, 2 is middle, and 3 is primary; the lowest job level is 1, the higher the numerical value is, the higher the job level is, and the second-level granularity of the grade is; the output end of the storage medium module 5 is connected with the input end of the encryption module 2, the output end of the writing block 3 is connected with the input end of the main server 1, when a server or system software needs to read worker data, other server nodes need to provide certificates together, the worker information is stored in the encrypted data block, any node cannot be acquired independently, the node does not store the data, when the server or system software reads the data block information, all nodes need to adopt an algorithm of a common identification process to decrypt the data block, the certificates are attached to the tail section of the data block and verify that the tail section of the data block exists, the information acquisition process is a process of carrying out AES decryption on the front section of the data block after being encoded by a certificate MD5 at the tail section of the data block, the AES technology is adopted in the internal AES decryption process of the main server 1, the AES technology is a symmetric block encryption technology, 128-bit block encrypted, provides higher encryption strength than the RC4 algorithm of WEP/TKIPS; the encryption code table and the decryption code table of the AES are separated, and the encryption of the subkey is supported, which is superior to the former method of decrypting by using a special key; the AES algorithm supports any packet size, and the initial time is fast; in particular, it has parallelism that makes efficient use of processor resources; the AES has the advantages of wide application range, short waiting time, relative easy hiding, high throughput and the like, and is superior to the WEP algorithm in the aspects of performance and the like; by utilizing the algorithm for encryption, the security of the WLAN is greatly improved; the AES algorithm has been finally confirmed in the 802.11i standard, becoming a new generation of encryption algorithms to replace WEP; however, the AES algorithm has a high requirement on hardware, so AES cannot be realized by upgrading firmware on the original device, and a chip must be redesigned; in the write-in block 3, when a group of worker data generates a write-in block from a node, other nodes in a block chain participate in data encryption together, a zookeeper of a microservice framework can be used as a registration center during encryption, a public key exists in the registration center, all nodes need to be registered in the registration center and continuously acquire a certificate generated by an ore machine, and the ore machine adopts an algorithm defining a consensus process to ensure consistency. The credential MD5 generated by an ore machine is used as a key and a public key to encrypt data by using an AES encryption algorithm, the encrypted data and the credential obtain a final data block, the ZooKeeper written in the block 3 is based on a Fast Paxos algorithm, and the Paxos algorithm has a livelock problem, that is, when a plurality of propers are submitted in a staggered manner, the ZooKeeper possibly excludes each other to cause that none of the propers can be successfully submitted, the Fast Paxos is optimized, a leader (leader) is generated by selecting, only the leader can submit the proser, and a concrete algorithm can see the Fast Paxos, so that the basic operation flow of the ZooKeeper needs to understand that the ZooKeeper first knows about the Fast Paxos: s1, electing a Leader;
s2, synchronizing data;
s3, there are many algorithms in the Leader election process, but the election standards to be achieved are consistent;
s4, the Leader has the highest execution ID, similar to root authority;
s5, most machines in the cluster get response and accept the selected Leader.
The present invention is not limited to the above preferred embodiments, and any modifications, equivalent substitutions and improvements made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. A worker skill rating method based on block chain technology comprises an overall server (1), an encryption module (2), a writing block (3), a network transmission module (4), a storage medium module (5), a certificate generation module (6) and a certificate verification module (7), and is characterized in that: the output of total server (1) is connected with the input of encryption module (2), the output of encryption module (2) is connected with the input of voucher generation module (6), the output of voucher generation module (6) is connected with the input of voucher verification module (7), the output of network transmission module (4) is connected with the input of encryption module (2), the output of storage medium module (5) is connected with the input of encryption module (2), the output of writing block (3) is connected with the input of total server (1).
2. A worker skill rating method for use in block chain based techniques, as claimed in claim 1, wherein: in the writing block (3), when a group of worker data generates a writing block from a node, other nodes in a block chain participate in data encryption together, a zookeeper of a microservice frame can be used as a registration center during encryption, a public key exists in the registration center, all nodes need to be registered in the registration center and continuously acquire a certificate generated by an ore machine, and the ore machine adopts an algorithm defining a consensus process to ensure consistency. And (3) encrypting data by using an AES encryption algorithm by using the credential MD5 generated by the mining machine as a key and a public key, and obtaining a final data block by using the encrypted data and the credential.
3. A worker skill rating method for use in block chain based techniques, as claimed in claim 2, wherein: the ZooKeeper in the writing block (3) is based on a Fast Paxos algorithm, the Paxos algorithm has a livelock problem, that is, when a plurality of proposers are submitted in a staggered manner, mutual exclusion is possible to cause that none of the proposers can be successfully submitted, Fast Paxos is optimized, a leader (leader) is generated by selection, only the leader can submit the proposer, and the specific algorithm can see Fast Paxos, so that the fundamental operation flow of the ZooKeeper is that the ZooKeeper firstly knows the Fast Paxos:
s1, electing a Leader;
s2, synchronizing data;
s3, there are many algorithms in the Leader election process, but the election standards to be achieved are consistent;
s4, the Leader has the highest execution ID, similar to root authority;
s5, most machines in the cluster get response and accept the selected Leader.
4. A worker skill rating method for use in block chain based techniques, as claimed in claim 1, wherein: when the server or system software needs to read worker data, the inside of the main server (1) needs other server nodes to provide certificates together, the worker information is stored in the encrypted data block, any node cannot be acquired independently, the node does not store the data, when the data block information is read, all the nodes need to adopt an algorithm of a consensus process to decrypt the data block, the certificates are attached to the tail section of the data block and prove that the tail section of the data block exists, and the information acquisition process is a process of carrying out AES decryption on the front section of the data block after the certificates MD5 of the tail section of the data block are encoded.
5. A worker skill rating method for use in block chain based techniques, as claimed in claim 4, wherein: the internal AES decryption process of the general server (1) adopts an AES technology, the AES technology is a symmetric block encryption technology, 128-bit block encryption data are used, and higher encryption strength is provided than the RC4 algorithm of WEP/TKIPS; the encryption code table and the decryption code table of the AES are separated, and the encryption of the subkey is supported, which is superior to the former method of decrypting by using a special key; the AES algorithm supports any packet size, and the initial time is fast; in particular, it has parallelism that makes efficient use of processor resources; the AES has the advantages of wide application range, short waiting time, relative easy hiding, high throughput and the like, and is superior to the WEP algorithm in the aspects of performance and the like; by utilizing the algorithm for encryption, the security of the WLAN is greatly improved; the AES algorithm has been finally confirmed in the 802.11i standard, becoming a new generation of encryption algorithms to replace WEP; however, the AES algorithm has a high requirement on hardware, so AES cannot be implemented by upgrading firmware on the original device, and the chip must be redesigned.
6. A worker skill rating method for use in block chain based techniques, as claimed in claim 1, wherein: a grade mechanism is added into the certificate generation module (6) so that the grade value can only be increased but not reduced; the data block consists of a worker identity card number, a job code, a grade, a job level and a certificate, the job code is a unique ID generated by the system, and the grade and the job level are represented by numerical values.
7. A worker skill rating method for use in block chain based techniques, as claimed in claim 1, wherein: the internal certificate of the certificate generation module (6) is generated by other nodes together, and cannot be generated by independent nodes, the certificate has the tail section of the data block, and the information acquisition process is the process of carrying out AES decryption on the front section of the data block after the certificate MD5 of the tail section of the data block is encoded; the generation of the voucher is the mining process of the mining machine, and a series of serial numbers are obtained by the algorithm of other nodes.
8. A worker skill rating method for use in block chain based techniques, as claimed in claim 1, wherein: the network transmission module (4) adopts the highest grade to write in when obtaining the skill grade of a worker, wherein the certificate grade needs to be obtained from other nodes, and the grade of the worker is high at the beginning of the middle, 1 is high, 2 is middle, and 3 is primary; the job level is 1 at the lowest, and the higher the value, the job level is the second grade granularity of the grade.
9. A worker skill rating method for use in block chain based techniques, as claimed in claim 1, wherein: the certificate checking module (7) is internally rewritten in the grade, the original data block is required to be checked according to the obtained certificate, the grade can only be increased or cannot be reduced, the checking process is a decryption process, a public key is obtained from the registration center, the certificate is taken out from the data block, a secret key and the public key are generated, decryption is carried out on the information, and when the participation grade is larger than the original grade, or the participation grade is equal to the grade and the role grade is larger than the original role grade, the mining machine is allowed to be informed to generate a new certificate and add the new certificate to the tail of the original data block.
CN202010969773.6A 2020-09-15 2020-09-15 Worker skill rating method based on block chain technology Pending CN112202737A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010969773.6A CN112202737A (en) 2020-09-15 2020-09-15 Worker skill rating method based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010969773.6A CN112202737A (en) 2020-09-15 2020-09-15 Worker skill rating method based on block chain technology

Publications (1)

Publication Number Publication Date
CN112202737A true CN112202737A (en) 2021-01-08

Family

ID=74015175

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010969773.6A Pending CN112202737A (en) 2020-09-15 2020-09-15 Worker skill rating method based on block chain technology

Country Status (1)

Country Link
CN (1) CN112202737A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113318456A (en) * 2021-06-30 2021-08-31 完美世界(重庆)互动科技有限公司 Data voucher system, method, apparatus and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180357683A1 (en) * 2017-06-08 2018-12-13 International Business Machines Corporation Rating data management
CN111259075A (en) * 2020-01-13 2020-06-09 腾讯科技(深圳)有限公司 Block chain-based medical information generation method, device, equipment and storage medium
CN111522665A (en) * 2020-04-24 2020-08-11 北京思特奇信息技术股份有限公司 Zookeeper-based method for realizing high availability and load balancing of Influxdb-proxy
CN111598676A (en) * 2020-05-27 2020-08-28 叶睿 Financial accounting book keeping operation system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180357683A1 (en) * 2017-06-08 2018-12-13 International Business Machines Corporation Rating data management
CN111259075A (en) * 2020-01-13 2020-06-09 腾讯科技(深圳)有限公司 Block chain-based medical information generation method, device, equipment and storage medium
CN111522665A (en) * 2020-04-24 2020-08-11 北京思特奇信息技术股份有限公司 Zookeeper-based method for realizing high availability and load balancing of Influxdb-proxy
CN111598676A (en) * 2020-05-27 2020-08-28 叶睿 Financial accounting book keeping operation system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113318456A (en) * 2021-06-30 2021-08-31 完美世界(重庆)互动科技有限公司 Data voucher system, method, apparatus and medium
CN113318456B (en) * 2021-06-30 2024-04-02 完美世界(重庆)互动科技有限公司 Data credential system, method, apparatus, and medium

Similar Documents

Publication Publication Date Title
JP7292365B2 (en) Cryptographic methods and systems for secure extraction of data from blockchains
CN110268691B (en) Federated blockchain networks with verified blockchain and consensus protocols
Singh et al. Blockchain: Future of financial and cyber security
TWI666902B (en) Robust ATM network system and information processing method based on blockchain technology
US11496313B2 (en) User identity and trust models in decentralized and distributed systems
EP2608190B1 (en) Secret sharing system, secret sharing apparatus, secret sharing method, secret sorting method and secret sharing program
CN111989893A (en) Chain of proof and decomposition
CN110546636A (en) Confidentiality in federated blockchain networks
CN110932859B (en) User information processing method, device and equipment and readable storage medium
WO2022088606A1 (en) Gbdt and lr fusion method and apparatus based on federated learning, device, and storage medium
TWI835300B (en) A data matching method, device, equipment and medium
JP2021515271A (en) Computer-based voting process and system
CN109861956B (en) Data verification system, method, device and equipment based on state channel
US11354335B2 (en) Method and apparatus for obtaining number for transaction-accessed variable in blockchain in parallel
CN112597526B (en) Security data access method for alliance chain
CN112613601A (en) Neural network model updating method, device and computer storage medium
CN112202737A (en) Worker skill rating method based on block chain technology
CN117910045A (en) Privacy set intersection method and system
CN112001714B (en) Digital currency realization method based on blockchain technology
CN115580484B (en) Safe joint calculation method and system applicable to energy consumption data and storage medium
CN114629663B (en) Block chain-based digital commodity transaction method and device
CN116232583A (en) Key management method, device, equipment and storage medium based on KMS (KMS)
CN106789061A (en) The floating engineering detecting car data transmission method of magnetic, device and the floating engineering detecting car of magnetic
CN116561816B (en) Trusted evidence-storing method and device based on Lejia diagram contracts
US20220239482A1 (en) Method for verifying activity information by means of blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210108