CN112347491A - Method for endogenous data secure interaction of double-middlebox double-chain architecture - Google Patents

Method for endogenous data secure interaction of double-middlebox double-chain architecture Download PDF

Info

Publication number
CN112347491A
CN112347491A CN202011013609.4A CN202011013609A CN112347491A CN 112347491 A CN112347491 A CN 112347491A CN 202011013609 A CN202011013609 A CN 202011013609A CN 112347491 A CN112347491 A CN 112347491A
Authority
CN
China
Prior art keywords
data
chain
service
double
architecture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011013609.4A
Other languages
Chinese (zh)
Other versions
CN112347491B (en
Inventor
刘峰
齐佳音
李志斌
杨杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai University Of International Business And Economics
East China Normal University
Original Assignee
Shanghai University Of International Business And Economics
East China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai University Of International Business And Economics, East China Normal University filed Critical Shanghai University Of International Business And Economics
Priority to CN202011013609.4A priority Critical patent/CN112347491B/en
Publication of CN112347491A publication Critical patent/CN112347491A/en
Application granted granted Critical
Publication of CN112347491B publication Critical patent/CN112347491B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures

Abstract

The invention discloses a method for endogenous data security interaction of a double-middlebox double-chain architecture, which comprises the double-middlebox architecture and the double-chain architecture, wherein the double-middlebox architecture comprises a service, a service system, a service center, a data center, a service foundation and a data foundation, and the double-chain architecture comprises data information, a data chain, a service chain and a service record. According to the method for the safe interaction of the endogenous data of the double-middle-station double-chain architecture, the block chain technology is introduced into the middle station, the interaction safety of the endogenous data is improved, the credibility of the middle station data before uplink is guaranteed, an improved Shupu threshold endogenous data interaction protocol is constructed to guarantee the safety of the data before uplink, an interaction mechanism fusing signature under a chain and signature on the chain is designed on the basis of the work, the data interaction efficiency of the double-middle-station double-chain is improved, the middle-station business can be more efficient when relevant information of the middle-station data is extracted, and the business processing capacity is enhanced.

Description

Method for endogenous data secure interaction of double-middlebox double-chain architecture
Technical Field
The invention relates to the technical field of data information management, in particular to a method for endogenous data security interaction of a double-middlebox double-chain architecture.
Background
Traditional data middleboxes mainly serve for layering and attribute separation of data, and have the capability of precipitating common data. The data center station is a sharing platform which collects, calculates, stores and processes mass data through a data technology and simultaneously unifies standards and calibers. It was first proposed by Alibama in a 2016 research report, with the aim of helping to achieve global data specifications in an attempt to adequately leverage the functionality developed by technology platforms to front-end applications. The reasons for the occurrence of the platform in the Alibara data come from the ever-changing data requirements and the high-speed timeliness requirements of a plurality of internal business departments, and the data requirements of a plurality of business foreground are met, and simultaneously the linear expandable problem of large-scale data, the decoupling problem of a complex activity scene business system and the like are also solved. However, the concept of stations in data is still too broad and there is no industry standard in the industry. When the domestic science and technology companies compete to develop the large and medium platform planning, the information officer of the first seat of the Ali Bara pioneers has developed the architecture idea of the business medium platform in different occasions in recent years. The business middle station is an integrated system with which all application systems must establish contact so as to better realize the operation mechanism of the enterprise core business. And (4) considering a new idea of fusing and innovating the service middling station and the data middling station to further refine the function of the middling station. However, a prominent problem existing in the fusion process of the data center station and the service center station is the efficiency problem of data interaction. When a plurality of service flows and data flows are transmitted interactively among the middlings, a complete service and data processing process is difficult to be clarified. The mixing of the endogenous service information and the data information leads to the complicated tracing of the service flow and the complicated scheduling of the data flow, and the safety of data interaction also faces certain challenges. Therefore, how to ensure that the efficiency of endogenous data interaction between the middlings is improved under a safe condition to promote the construction of the middlings is an urgent issue to be researched. In response to the above problem, the present research uses a blockchain technique to split the interactive data. The block chain technology, as a point-to-point emerging computer technology, can provide possible approaches in the aspects of solving the problems of difficult service tracing and rough data scheduling. By means of the technical characteristics of the block chain, on one hand, the privacy protection of the data security circulation and data security storage of the double-middlebox system enabling the data + service is realized, and on the other hand, by means of a consensus mechanism and an economic model, the ecological resources of the block chain are fused to perform technical fusion innovation on the actual landing scene. The block chain technology is fused with the double middleboxes, but does not invade related middlebox services, but is similar to be used as the bottom layer technology of a middlebox system to enable, so that the problem of low efficiency of directly processing mass data by the block chain technology is solved. By utilizing the advantages of transparent disclosure, difficult tampering and the like of the block chain, the processed valuable data can be circulated, stored and traced, so that the improvement of the data interaction efficiency is finally served. According to the research, service flow information and data flow information are respectively placed on a service chain and a data chain based on a block chain for storage according to different interactive data sources in a middlebox, and then an endogenous data interaction protocol oriented to a double-middlebox double-chain architecture is provided. Through the protocol, core data information authorizes uplink data information through a certain number of information main bodies in the stations in the set, and legal information is transmitted to the appointed block chain in batches. Meanwhile, a threshold signature algorithm of a core in the extraction protocol constructs an endogenous data interaction circulation model. Through experiments, the time overhead of the algorithm in data interaction is analyzed and compared with the traditional single signature and signature verification on a chain, and the protocol is proved to have certain advantages in improving the data interaction efficiency.
Disclosure of Invention
The invention aims to improve the interaction safety of endogenous data, ensure the credibility of the middlebox data before chaining, construct an improved Shupu threshold endogenous data interaction protocol to ensure the safety of the data before chaining, design an interaction mechanism integrating a down-chain signature and an on-chain signature check on the basis of the work, improve the data interaction efficiency of double middlebox double chains, and continuously subdivide a service structure on a service level, so that the middlebox can more efficiently extract relevant information of the middlebox data and enhance the service processing capacity.
In order to achieve the purpose, the invention provides the following technical scheme: a method for endogenous data security interaction of a double-middlebox double-chain architecture comprises the double-middlebox architecture and the double-chain architecture, wherein the double-middlebox architecture comprises a service, a service system, a service center, a data center, a service basis and a data basis, and the double-chain architecture comprises data information, a data chain, a service chain and a service record.
Preferably, the method for endogenous data secure interaction of the double-stage double-chain architecture comprises the following steps:
s1, different data can be processed in a data middle platform according to different algorithm models, and in a risk control model, the safety and the quality of main data need to be evaluated and analyzed;
s2, in the acquisition model, the uploaded data needs to be classified, and the integrated similar service data is collected for subsequent processing; for the calculation model, extracting key information in the data to perform analysis and calculation according to business needs, and then giving a corresponding processing result;
s3, according to specific services and data reading requirements, combining block chains with different consensus mechanisms, different economic models and different transaction processing capabilities, so that a service system which best meets the actual scene can be built by means of different block chain ecological strength;
s4, splitting a double-chain architecture according to a data chain and a service chain, and finally serving the data chain and the service chain in an application for processing, wherein data information is stored in a block of the data chain, service records are stored in the block of the service chain, the data chain in the architecture is used as a private chain according to service and data characteristics, the service chain can be a public chain or a alliance chain, and then the block chain stored by adopting a Merkle Tree (Merkle Tree) structure or the block chain stored by using a Merkle Patricia tree (Merkle Patricia Tree) structure is determined according to specific information of the data and the service records, and meanwhile, the number of the double-chain architecture is not limited to two chains, but two chains possibly distinguished by the data type and the service type are adopted. Each chain may be cooperatively communicated by a specific decentralized application (Dapp) or calling service;
and S5, inputting a certain data source into a data center, after the data center collects data, carrying out safety analysis on information in the data source, then, after the data center has a circulation, storing the information into a data chain, meanwhile, delivering service data extracted from the data source to the service center for processing and judgment, carrying out different service processing on different main bodies, then, transmitting the service data to the service chain for storage, and outputting a result feedback according to service requirements.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the method for the endogenous data security interaction of the double-middlebox double-chain architecture, the block chain technology is introduced into the middlebox, the interaction security of the endogenous data is improved, the credibility of the middlebox data before uplink is guaranteed, and an improved Shupu threshold endogenous data interaction protocol is constructed to guarantee the security of the data before uplink.
2. According to the method for the endogenous data safety interaction of the double-middle-platform double-chain architecture, an interaction mechanism integrating under-chain signature and on-chain signature verification is designed on the basis of the work, and the data interaction efficiency of the double-middle-platform double-chain is improved. Experimental results show that the mechanism reduces 42.1% of time overhead and improves the efficiency of data interaction between the two systems of the middle station and the block chain.
3. According to the method for the endogenous data safety interaction of the double-middle-platform double-chain architecture, on the aspect of a service, the service structure needs to be continuously subdivided, so that the service middle platform can be more efficient when extracting relevant information of the data middle platform, and the service processing capacity is enhanced.
Drawings
FIG. 1 is a diagram of a dual-center platform architecture according to the present invention;
FIG. 2 is a schematic diagram of a double-stranded framework of the present invention;
FIG. 3 is a flow chart of double-stage double-chain interaction according to the present invention;
FIG. 4 is a schematic diagram of the algorithm flow of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-4, in this embodiment: a method for endogenous data security interaction of a double-middlebox double-chain architecture comprises the double-middlebox architecture and the double-chain architecture, wherein the double-middlebox architecture comprises a service, a service system, a service center, a data center, a service basis and a data basis, and the double-chain architecture comprises data information, a data chain, a service chain and a service record.
Referring to fig. 1, the basic element of the service center platform is composed of a service micro service platform, a distributed database, a message queue and application monitoring, and the upper layer allocates different services, capabilities and management measures according to different service bodies. The right half data center station is composed of four parts, namely data acquisition, data analysis, data service and data safety, and different data can be processed differently in the data center station according to different algorithm models. In the risk control model, the safety and the quality of main data need to be evaluated and analyzed; in the acquisition model, the uploaded data needs to be classified, and the integrated similar service data is collected for subsequent processing; for the calculation model, extracting key information in the data to perform analysis and calculation according to business needs, and then giving a corresponding processing result; in addition, the data center station can also provide an interface for data query and provide corresponding data interface configuration, so that adjustment can be conveniently carried out according to service requirements, and then calling is carried out. Under the double-middle platform structure, when the business analysis is carried out, the business middle platform is used for processing; when data analysis is carried out, the data center is used for processing, so that the coupling degree of service and data is reduced. Meanwhile, the two can supplement each other and improve each other to form an enhanced closed loop, further reduce the redundancy of information in each middle station and improve certain calculation efficiency.
Referring to fig. 2, according to the specific service and the data reading requirement, the block chains with different consensus mechanisms, different economic models and different transaction processing capabilities are combined, so that a service system most suitable for the actual scene can be built by means of different ecological strength of the block chains. The double-chain architecture is split according to the data chain and the service chain, and is finally served to be processed in one application. The data information is stored in the block of the data chain, and the service record is stored in the block of the service chain. According to the service and data characteristics, the data chain in the architecture is used as a private chain, and the service chain can be a public chain or a federation chain. And then, according to the data and the specific information of the service record, determining whether the block chain is stored by adopting a merkel tree (MerkleTree) structure or stored by adopting a merkel patriciaTree (MerklePatricia tree) structure. Meanwhile, for the double-chain architecture, the number is not limited to two chains, but two chains distinguished by a data type and a service type are possible. Each chain may be cooperatively communicated by a specific decentralized application (Dapp) or calling service. 1) any user node in the chain can check the rough service processing condition under the condition of not knowing the private data information, thus ensuring the data security and the truthfulness and credibility of the service record; 2) service records and data information are separated, compared with single-chain processing, redundancy of most node accounting information can be reduced at the same time, and the throughput performance of the system is improved to a certain extent; 3) the system operation and maintenance and management are convenient, and smooth expansion of services can be logically performed. And combining the basic knowledge to provide a data interaction process under a double-middle-platform double-chain structure.
Referring to fig. 3, a certain data source is input to the data center, and after data is collected by the data center, security analysis is performed on information in the data source. Then the information is stored in a data chain through the circulation of the data center. Meanwhile, the service data extracted from the data source is delivered to the service center station for processing and judgment. And carrying out different business processing on different subjects, then transmitting the different subjects to a business chain for storage, and outputting result feedback according to business requirements, namely implementing business services. If the business main body needs to carry out the relevant service, the business main body needs to access the business service of the business middle station, and after the business service is fed back to the business middle station, the business main body requests the data middle station for calling the relevant data, and records the business data to the business chain. And the data center station carries out legal confirmation after receiving the request, then calls the content on the data chain to return, and finally feeds back the content to the service main body. Therefore, the structural design of the double-middle station not only effectively improves the accuracy and efficiency of data in service link fragmentation, but also reduces data coupling, and is beneficial to pre-classifying data sets in future services. Moreover, a double-chain structure is integrated on the basis that the double-middle-station structure is taken as a core, and compared with a single-block chain structure, the decoupling concept is more effectively utilized to reasonably distinguish uplink information. The cross-chain interaction technology with relatively low efficiency and performance is not used, and meanwhile, the concurrent data volume of the block chain data can be reduced to the maximum extent, the throughput is improved, and the overall efficiency of the double-middle-station double-chain system is greatly improved. However, when the technical advantages of the dual-middlewares and the dual-chains are fully utilized, an unavoidable problem arises, that is, in order to fully utilize the advantages of block chain disclosure, transparency, whole-process encryption and safety tracing, the problem of low efficiency is faced when signature and signature verification are performed between the dual-middlewares and the dual-chains, so that how to design a relatively efficient interaction protocol to improve the interaction efficiency is very important.
Wherein, the verification is to verify whether the downlink-uplink data coordination technology in the chain in the present study is reasonable and effective, and an algorithm flow chart of a formalized certification is firstly given for analysis, as shown in fig. 4: firstly, the first step of the algorithm is to generate a polynomial of key agreement according to formula (1); secondly, the fragmentation key is constructed according to the formula (2) and distributed to the service body or the data body through an anonymous channel.
sigM
encrypted(···)
On the basis, a threshold signature of the service record or the data information is given, whether the number of signature people reaches the threshold specified number is judged, if not, the authorization fails, and the following operation cannot be carried out; if the threshold specified number is reached, calculating an aggregated signature according to equations (4) - (6); then, the contract is verified according to the formula (7), and the validity of the signature is judged. If not, the business record or the data information can be uplink failed; if the information is legal, the encryption function is called to carry out the encrypted uplink operation of the service record or the data information, and the encryption mode is as follows. encrypted message (8) is a message to be encrypted, and is a public key used for encryption. Finally, if the content stored in the chain needs to be queried, a decryption function is called, and the decryption mode is as follows. The decrypted is an encyptedprkey, (9) prkey, among them, is a private key used for decryption. After the plaintext of the decrypted service record or data information is obtained, a complete formalized certification process is ended. From the above formalized proof, it can be seen that two rounds of inquiries are performed before data chaining, namely, the verification of the number of signature persons during data transmission and the verification of aggregated signatures ensure the safe transmission of data. After data is linked up, the data is encrypted by a specific algorithm function, and then the data can be completely and reliably obtained by only using a corresponding decryption function for decryption during calling.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (2)

1. A method for endogenous data secure interaction of a double-middlebox double-chain architecture, which comprises the double-middlebox architecture and the double-chain architecture, and is characterized in that: the double-middle platform architecture comprises a business service, a business system, a business center, a data center, a business base and a data base, and the double-chain architecture comprises data information, a data chain, a business chain and a business record.
2. The method for endogenous data secure interaction of a dual-stage double-chain architecture according to claim 1, wherein: the method comprises the following steps:
s1, different data can be processed in a data middle platform according to different algorithm models, and in a risk control model, the safety and the quality of main data need to be evaluated and analyzed;
s2, in the acquisition model, the uploaded data needs to be classified, and the integrated similar service data is collected for subsequent processing; for the calculation model, extracting key information in the data to perform analysis and calculation according to business needs, and then giving a corresponding processing result;
s3, according to specific services and data reading requirements, combining block chains with different consensus mechanisms, different economic models and different transaction processing capabilities, so that a service system which best meets the actual scene can be built by means of different block chain ecological strength;
s4, splitting a double-chain architecture according to a data chain and a service chain, and finally serving the data chain and the service chain in an application for processing, wherein data information is stored in a block of the data chain, service records are stored in the block of the service chain, the data chain in the architecture is used as a private chain according to service and data characteristics, the service chain can be a public chain or a alliance chain, and then the block chain stored by adopting a Merkle Tree (Merkle Tree) structure or the block chain stored by using a Merkle Patricia tree (Merkle Patricia Tree) structure is determined according to specific information of the data and the service records, and meanwhile, the number of the double-chain architecture is not limited to two chains, but two chains possibly distinguished by the data type and the service type are adopted. Each chain may be cooperatively communicated by a specific decentralized application (Dapp) or calling service;
and S5, inputting a certain data source into a data center, after the data center collects data, carrying out safety analysis on information in the data source, then, after the data center has a circulation, storing the information into a data chain, meanwhile, delivering service data extracted from the data source to the service center for processing and judgment, carrying out different service processing on different main bodies, then, transmitting the service data to the service chain for storage, and outputting a result feedback according to service requirements.
CN202011013609.4A 2020-09-24 2020-09-24 Endogenous data security interaction method for double-middle-platform double-chain architecture Active CN112347491B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011013609.4A CN112347491B (en) 2020-09-24 2020-09-24 Endogenous data security interaction method for double-middle-platform double-chain architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011013609.4A CN112347491B (en) 2020-09-24 2020-09-24 Endogenous data security interaction method for double-middle-platform double-chain architecture

Publications (2)

Publication Number Publication Date
CN112347491A true CN112347491A (en) 2021-02-09
CN112347491B CN112347491B (en) 2023-06-27

Family

ID=74358151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011013609.4A Active CN112347491B (en) 2020-09-24 2020-09-24 Endogenous data security interaction method for double-middle-platform double-chain architecture

Country Status (1)

Country Link
CN (1) CN112347491B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116142268A (en) * 2023-04-24 2023-05-23 中国铁道科学研究院集团有限公司通信信号研究所 Train control equipment dynamic monitoring system based on middle platform architecture

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050240592A1 (en) * 2003-08-27 2005-10-27 Ascential Software Corporation Real time data integration for supply chain management
US20050262188A1 (en) * 2003-08-27 2005-11-24 Ascential Software Corporation Multiple service bindings for a real time data integration service
CN106569786A (en) * 2015-10-10 2017-04-19 阿里巴巴集团控股有限公司 Development method of service application and system
WO2018032372A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Trusted power grid transaction platform based on block chain technology
CN107992621A (en) * 2017-12-22 2018-05-04 杭州云象网络技术有限公司 A kind of intelligent cinematic industry service system based on block chain multichain technological incorporation
CN108848108A (en) * 2018-07-25 2018-11-20 贵州电网有限责任公司 Based on mobile Internet+innovation item PDCA process management platform
CN109685486A (en) * 2018-11-28 2019-04-26 杭州云象网络技术有限公司 A kind of polymeric chain framework based on block chain technology
CN109918878A (en) * 2019-04-24 2019-06-21 中国科学院信息工程研究所 A kind of industrial internet of things equipment authentication and safety interacting method based on block chain
CN109948373A (en) * 2019-04-02 2019-06-28 东莞市伟信科技服务有限公司 A kind of multiparty service data interactive method
CN110109930A (en) * 2019-05-15 2019-08-09 山东省计算中心(国家超级计算济南中心) Government data storage, querying method and system based on block chain duplex structure
CN110247965A (en) * 2019-06-13 2019-09-17 食品安全与营养(贵州)信息科技有限公司 A kind of storage method and system of the IoT data-storage system based on block chain
WO2020062211A1 (en) * 2018-09-30 2020-04-02 北京大学深圳研究生院 Method and system for mimicry storage tamper-proof log fused with blockchain technology
CN111008840A (en) * 2020-03-05 2020-04-14 支付宝(杭州)信息技术有限公司 Service processing system, service processing method, device and equipment
CN111010430A (en) * 2019-12-05 2020-04-14 江苏荣泽信息科技股份有限公司 Cloud computing security data sharing method based on double-chain structure
WO2020113545A1 (en) * 2018-12-07 2020-06-11 北京大学深圳研究生院 Method for generating and managing multimodal identified network on the basis of consortium blockchain voting consensus algorithm
CN111370133A (en) * 2020-03-03 2020-07-03 安徽高山科技有限公司 Medical data management platform based on block chain
CN111400751A (en) * 2020-03-12 2020-07-10 厦门区块链云科技有限公司 Disaster recovery cloud storage system construction method based on block chain technology

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050262188A1 (en) * 2003-08-27 2005-11-24 Ascential Software Corporation Multiple service bindings for a real time data integration service
US20050240592A1 (en) * 2003-08-27 2005-10-27 Ascential Software Corporation Real time data integration for supply chain management
CN106569786A (en) * 2015-10-10 2017-04-19 阿里巴巴集团控股有限公司 Development method of service application and system
WO2018032372A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Trusted power grid transaction platform based on block chain technology
CN107992621A (en) * 2017-12-22 2018-05-04 杭州云象网络技术有限公司 A kind of intelligent cinematic industry service system based on block chain multichain technological incorporation
CN108848108A (en) * 2018-07-25 2018-11-20 贵州电网有限责任公司 Based on mobile Internet+innovation item PDCA process management platform
WO2020062211A1 (en) * 2018-09-30 2020-04-02 北京大学深圳研究生院 Method and system for mimicry storage tamper-proof log fused with blockchain technology
CN109685486A (en) * 2018-11-28 2019-04-26 杭州云象网络技术有限公司 A kind of polymeric chain framework based on block chain technology
WO2020113545A1 (en) * 2018-12-07 2020-06-11 北京大学深圳研究生院 Method for generating and managing multimodal identified network on the basis of consortium blockchain voting consensus algorithm
CN109948373A (en) * 2019-04-02 2019-06-28 东莞市伟信科技服务有限公司 A kind of multiparty service data interactive method
CN109918878A (en) * 2019-04-24 2019-06-21 中国科学院信息工程研究所 A kind of industrial internet of things equipment authentication and safety interacting method based on block chain
CN110109930A (en) * 2019-05-15 2019-08-09 山东省计算中心(国家超级计算济南中心) Government data storage, querying method and system based on block chain duplex structure
CN110247965A (en) * 2019-06-13 2019-09-17 食品安全与营养(贵州)信息科技有限公司 A kind of storage method and system of the IoT data-storage system based on block chain
CN111010430A (en) * 2019-12-05 2020-04-14 江苏荣泽信息科技股份有限公司 Cloud computing security data sharing method based on double-chain structure
CN111370133A (en) * 2020-03-03 2020-07-03 安徽高山科技有限公司 Medical data management platform based on block chain
CN111008840A (en) * 2020-03-05 2020-04-14 支付宝(杭州)信息技术有限公司 Service processing system, service processing method, device and equipment
CN111400751A (en) * 2020-03-12 2020-07-10 厦门区块链云科技有限公司 Disaster recovery cloud storage system construction method based on block chain technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘峰;杨杰;李志斌;齐佳音;: "一种面向双中台双链架构的内生性数据安全交互协议研究", no. 05, pages 53 - 64 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116142268A (en) * 2023-04-24 2023-05-23 中国铁道科学研究院集团有限公司通信信号研究所 Train control equipment dynamic monitoring system based on middle platform architecture
CN116142268B (en) * 2023-04-24 2023-09-22 中国铁道科学研究院集团有限公司通信信号研究所 Train control equipment dynamic monitoring system based on middle platform architecture

Also Published As

Publication number Publication date
CN112347491B (en) 2023-06-27

Similar Documents

Publication Publication Date Title
CN112270550B (en) New energy power tracing method and system based on blockchain
CN104794170B (en) Network forensics content source tracing method and system based on the multiple Hash Bloom filter of fingerprint
Zhang et al. Recent advances in blockchain and artificial intelligence integration: Feasibility analysis, research issues, applications, challenges, and future work
CN111400734A (en) Intelligent logistics system based on block chain
CN106228344A (en) A kind of electronic government affairs system building method based on block chain technology
CN109815051A (en) The data processing method and system of block chain
CN114640523B (en) Computer data security encryption method and system
CN112232518B (en) Lightweight distributed federal learning system and method
CN114218322B (en) Data display method, device, equipment and medium based on ciphertext transmission
CN112508733A (en) Big data intelligence service system in electric wire netting space-time based on big dipper
CN110611661A (en) Acquired information sharing method and system based on double-authentication multiple-protection measures
CN102880897A (en) Application data sharing method of smart card and smart card
CN109754322A (en) A kind of data service system
CN112380179A (en) Block chain-based steel supply chain information secret sharing method and system
CN112347491A (en) Method for endogenous data secure interaction of double-middlebox double-chain architecture
CN103984728B (en) Range query integrity verification method for outsourcing space database
Wang et al. Research on integrity check method of cloud storage multi-copy data based on multi-agent
CN114238501A (en) Mine industry internet data sharing method based on block chain
CN107580037A (en) Block chain block generation method and system, intelligent bicycle lock, background server
CN109818831A (en) A kind of system data dynamic monitoring device and method across private network based on DMZ
Rathna et al. Survey on recent algorithms for privacy preserving data mining
Lv et al. A review of big data security and privacy protection technology
CN116414912A (en) Smart city information service system
CN116467026A (en) Cloud desktop data secure sharing and tracing method and system based on blockchain
CN107341218B (en) Information feedback method and system of core framework platform based on application service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant