CN112532395A - Data credit granting system, method and medium based on block chain - Google Patents

Data credit granting system, method and medium based on block chain Download PDF

Info

Publication number
CN112532395A
CN112532395A CN202011349830.7A CN202011349830A CN112532395A CN 112532395 A CN112532395 A CN 112532395A CN 202011349830 A CN202011349830 A CN 202011349830A CN 112532395 A CN112532395 A CN 112532395A
Authority
CN
China
Prior art keywords
data
block chain
service
unit configured
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011349830.7A
Other languages
Chinese (zh)
Other versions
CN112532395B (en
Inventor
赵亮
张鹏
杨文韬
雷富强
张驰
甄君
程骏超
金群昊
王强
杨珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Zhigui Internet Technology Co ltd
CSSC Systems Engineering Research Institute
Original Assignee
Xi'an Zhigui Internet Technology Co ltd
CSSC Systems Engineering Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Zhigui Internet Technology Co ltd, CSSC Systems Engineering Research Institute filed Critical Xi'an Zhigui Internet Technology Co ltd
Priority to CN202011349830.7A priority Critical patent/CN112532395B/en
Publication of CN112532395A publication Critical patent/CN112532395A/en
Application granted granted Critical
Publication of CN112532395B publication Critical patent/CN112532395B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data credit granting system, a method and a medium based on a block chain. Wherein the system includes: a data acquisition unit configured to: acquiring original data from a marine terminal, and encrypting and signing the data according to a hardware-based embedded device private key to obtain first data; a data transmission unit configured to: introducing a third party supervision service based on a prediction machine to audit the first data in transmission; a data credentialing unit configured to: receiving the first data, storing the first data, adding a timestamp and uploading information to obtain second data, and uploading the second data to the block chain; and a data usage unit configured to: and writing access authority in the second data, and automatically executing access to the data through an intelligent contract in the block chain.

Description

Data credit granting system, method and medium based on block chain
Technical Field
The invention relates to the field of block chains, in particular to a data credit granting system, a data credit granting method and a data credit granting medium based on the block chains.
Background
In complex marine environments, communication and interoperability between devices is important. In the prior system construction, a centralized information system construction scheme is often adopted, a communication hub service is taken as a center, communication individuals are connected to the communication hub to carry out information interaction and coordination, and the information interaction between the communication individuals needs to be forwarded by the communication hub. Such a centralized system can realize complex environment communication, but faces a great potential safety hazard, and once the centralized communication hub is attacked maliciously, the whole system faces a risk of paralysis. And by adopting the block chain technology, trust reconstruction and trust interaction under unequal trust modes in a complex environment can be solved, and the safety problem of a centralized communication hub is solved.
Networking technology is network building technology. There are many types of computer networks, and there are different classification bases according to different networking technologies. Networks can be divided into: a circuit switched network, a packet switched network. According to the transmission technology, the method can be divided into: broadcast networks, non-broadcast multiple access networks, point-to-point networks. They can be classified into bus type, star type, ring type, tree type, full mesh and partial mesh networks according to topology. Wired and wireless networks may be further separated according to transmission media. The wired network refers to a network formed by connecting coaxial cables, twisted pairs and optical fibers. A wireless network refers to a type of network that uses an electromagnetic wave as a carrier to realize data transmission. Maritime equipment is mainly a wireless broadcast network and is under security considerations, typically a local area network.
As shown in fig. 1, a conventional offshore equipment networking system mostly adopts a tree structure, where an upper processing unit is a root node and a lower processing unit is a leaf node. A typical networking system is shown in the above figure. On one hand, the root node is responsible for collecting and gathering data and is connected with each leaf node; on the other hand, the system is connected with a land terminal and feeds back the land terminal according to the data acquisition and analysis result to perform decision support of related actions.
The offshore equipment networking system of the tree model has obvious advantages, is centralized in power, clear in instruction, smooth in information and clear in authority, can clearly define the structure of the whole system, and is very easy to increase and reduce certain organization. However, the defects of this system are also obvious, and how to ensure that the sensors on the offshore terminal equipment can reliably transmit data becomes a problem to be solved urgently at present under the complex offshore environment with weak connection and weak coordination.
Disclosure of Invention
The present invention is directed to a data signaling scheme based on a block chain, so as to solve the above technical problems in the prior art.
In a first aspect, the present invention provides a data authorization system based on a block chain, the system comprising: a data acquisition unit configured to: acquiring original data from a marine terminal, and encrypting and signing the data according to a hardware-based embedded device private key to obtain first data; a data transmission unit configured to: introducing a third party supervision service based on a prediction machine to audit the first data in transmission; a data credentialing unit configured to: receiving the first data, storing the first data, adding a timestamp and uploading information to obtain second data, and uploading the second data to the block chain; and a data usage unit configured to: and writing access authority in the second data, and automatically executing access to the data through an intelligent contract in the block chain.
According to the system provided by the first aspect of the present invention, the hardware-based embedded device private key is a U-shield, and is used for verifying the marine terminal.
According to the system provided by the first aspect of the invention, the prediction machine supports communication based on the https protocol with the server and provides monitoring evidence of the data acquisition service to the third party supervision service.
According to the system provided by the first aspect of the present invention, the data certification unit is specifically configured to certify the first data based on hash mapping, and verify the certified second data based on certification consensus.
The second aspect of the present invention provides a data granting method based on a block chain, the method including: step S1, acquiring original data from the offshore terminal, and encrypting and signing the data according to a hardware-based embedded device private key to obtain first data; step S2, a third-party supervision service is introduced based on the prediction machine to audit the first data in transmission; step S3, receiving the first data, storing the first data, adding a timestamp and uploading information to obtain second data, and uploading the second data to the block chain; and step S4, writing access authority in the second data, and automatically executing the access to the data through the intelligent contract in the block chain.
According to the method provided by the second aspect of the present invention, the hardware-based embedded device private key is a U-shield, and is used for verifying the marine terminal.
According to the method provided by the second aspect of the invention, the prediction machine supports communication based on https protocol with the server and provides monitoring evidence of the data acquisition service to the third party supervision service.
According to the method provided by the second aspect of the present invention, in the step S3, the first data is certified based on hash mapping, and the certified second data is verified based on certified consensus.
A third aspect of the invention provides a non-transitory computer readable medium having stored thereon instructions which, when executed by a processor, perform the steps of the block chain based data authoring method according to the second aspect of the invention.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description in the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic diagram of a tree structure of a conventional offshore equipment networking system;
fig. 2 is a schematic architecture diagram of a data signaling scheme based on block chains according to an embodiment of the present invention;
fig. 3 is a structural diagram of a data trust system based on a block chain according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a flow of intelligent contract invocation prediction machine contracts, according to an embodiment of the invention;
FIG. 5 is a block chain verification process according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a data access control flow according to an embodiment of the invention; and
fig. 7 is a flowchart of a data granting method based on a block chain according to an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The data trust scheme based on the block chain is adopted, as shown in fig. 2, the trusted data acquisition, the trusted transmission, the trusted evidence storage and the trusted use are surrounded, and the trusted guarantee of the whole life cycle of the offshore terminal data is realized through technical means and process optimization.
The invention provides a data credit system based on a block chain in a first aspect. Fig. 3 is a structural diagram of a data trust system based on a block chain according to an embodiment of the present invention; as shown in fig. 3, the system includes: a data acquisition unit 301 configured to: acquiring original data from a marine terminal, and encrypting and signing the data according to a hardware-based embedded device private key to obtain first data; a data transmission unit 302 configured to: introducing a third party supervision service based on a prediction machine to audit the first data in transmission; a data credentialing unit 303 configured to: receiving the first data, storing the first data, adding a timestamp and uploading information to obtain second data, and uploading the second data to the block chain; and a data usage unit 304 configured to: and writing access authority in the second data, and automatically executing access to the data through an intelligent contract in the block chain.
The data acquisition unit 301 encrypts and signs data acquired by the marine terminal by using a hardware-based embedded device private key, so as to ensure that the acquired content cannot be tampered and repudiated. In some embodiments, the hardware-based embedded device private key is a U-shield used to authenticate the marine terminal. The marine terminal is verified through a U shield, and the U shield is hardware private key equipment and is used for storing the unique identity of the equipment. The private key information of the device after the U shield is adopted is not stored in the network any more, but only exists in the U shield, and the device can verify whether the public keys of the device are matched or not through the private key in the U shield when the device joins the network. When the device sends the collected data to the blockchain network, the blockchain network may require the terminal device to store the device signature with a hardware private key. The terminal equipment must sign the endorsement to the data that gather, the network will carry out data, service interaction with the terminal station after obtaining the data that the signature confirms, and carry out block information synchronization with other terminals with the data, after the whole block chain reaches the consensus, the data can only be written into whole network. The safe private key storage device supports a safe CPU inner core, a hardware true random number, a national cipher algorithm and a USB/7816 interface, and can realize the functions of private key generation, signature, public key export, PIN code verification, recovery word import and export and the like.
The data transmission unit 302 introduces a third party supervision service by using a prediction machine technology, audits the transmission process, claims an audit report, and ensures the transmission process to be safe and credible. In some embodiments, the oracle supports https protocol-based communication with a server and provides monitoring evidence for a data acquisition service to the third party oversight service. The prediction machine technology is used for ensuring the credibility of the data transmission process, and corresponding prediction machine certificates are generated for the data transmission process through auditing and data certification services from trusted computing hardware to prove the credibility of the data transmission. The prediction machine needs to provide two independent service modules for data transmission and process audit, and the two modules interact with a data source together to complete data transmission and recording. The data transmission service is required to support the communication with the server through an https protocol, and meanwhile, different versions of communication rules such as TLS 1.0-1.2 are compatible. The process audit service is required to run in a trusted computing environment, and monitoring evidence of single-time data acquisition service can be provided for any third party to audit.
As shown in fig. 4, the intelligent contract on the chain performs trusted off-chain data transfer by invoking the predictive-machine contract. The transmission data and audit information obtained by the prediction machine contract are provided by an audit service module and a data transmission (uplink) module together. The two modules interact with a trusted data source together, one party is responsible for data transmission, and the other party is responsible for supervising the acquisition process. A verification mechanism is introduced to restrict a data transmission (uplink) service provider, a certain cryptography method is adopted, and on the premise of not influencing normal network communication, the uplink service is ensured to be restricted to be capable of only sending the data uplink provided by a credible data source (malicious prevention is avoided), and the restriction process can be verified.
Entering a certificate verification page of the predictive teller machine, uploading a certificate of the predictive teller machine from the local site, clicking verification to start verification of the certificate of the predictive teller machine, wherein the verification of the certificate is divided into six verification links: a valid certification file format; a valid server public key; a valid certificate key; the signature is effectively audited; a valid encrypted server response; the corresponding content is effectively decrypted. And when all six items of verification pass, the certificate passes verification, otherwise, the certificate fails verification. And if the certificate passes verification, the data transmission process is true and reliable, otherwise, the data transmission is in a problem, and the user is prompted to further check the data acquisition equipment and the data transmission service.
The data storage unit 303 stores the collected data by using a block chain technology, and adds a timestamp and uploading device/personnel information to ensure that the data storage is reliable. In a complex offshore environment, information interaction between terminals is frequent, and for information safety, data confidentiality, data evidence storage and post summary in the scene, a system builds an evidence storage chain on the basis of an offshore block chain terminal network to realize the real-time chain evidence storage of data information in the offshore complex environment. Through the technical characteristics of mass consensus, non-falsification, safety, transparency and the like of the block chain, the system is helped to realize data storage, and a credible data source is provided for subsequent data combing, summarizing and analyzing.
The business process of the chain of storing evidence is shown in fig. 5, and mainly includes several stages of data production, data hashing, data chaining, data consensus and data verification. 1) Data production; the system comprises various types such as audio-visual images and texts, and data is generated in individual equipment and local storage is completed according to the requirements of individual equipment on the sea. 2) Data hashing; the data itself is not used as the chain credentialing information, but the hash value of the data needs to perform the chain credentialing operation. The data hash and the data file are in a one-to-one correspondence relationship. After the data production is finished, the data hash calculation needs to be finished locally. 3) Storing a certificate uplink; and after the data hash calculation is completed, completing the uplink operation of the data hash through the local block link point, and sending a consensus request to the network. 4) Storing the certificate and identifying the certificate; in the evidence-depositing and identifying stage, each node in the block chain network confirms and endorses the deposited evidence, and after the identifying process is completed, each node uniformly records the Hash account book of various data evidence-depositing information. 5) Verifying the deposit certificate; in the process of post analysis, each node in the block chain network stores various information materials and information circulation records. Through extraction and comparison of the document and the chain certificate information, verification, combing and analysis of data can be completed, and credible data support is provided for post analysis. As a bottom layer supporting environment for information storage, a block chain system needs to have the characteristics of high concurrency, non-tampering, data security and privacy and the like so as to meet the requirements of timely storage of complex data and subsequent data verification and analysis.
The data using unit 304 writes the authority of the data, the authority of the using subject and the security access control rule into the block chain, and automatically executes the data through an intelligent contract to ensure the credibility of the data using process. In order to strengthen the safe access control of intelligent terminal data and services under the interactive scene of the offshore terminal, the invention builds a block chain-based safe access control mechanism, realizes effective authority control on sensitive data, execution services and results thereof, truly and comprehensively records the sensitive data, the execution services and the results thereof, provides relevant evidence and audit management support means for responsibility tracking for the terminal service, and realizes the credible use of the data.
As shown in fig. 6, the application layer on the terminal initiates a micro-service invocation request through the micro-service management module; the management module performs security access control detection through the block chain; all user authorities, all registered service authorities and the matching relation of the user authorities and the registered service authorities are stored in the block chain, and safety access control is automatically executed through an intelligent contract; the dynamic auditing module exists in all terminals, and can record and report the micro-service request, call and used conditions on the terminals; the chain audit analysis system is responsible for the full life cycle monitoring audit of all the microservices.
The whole process comprises the following steps: the application layer initiates a micro-service calling request to the micro-service management module; the micro service management module initiates a verification request to the block chain to verify whether the block chain conforms to the safety access control rule; after the block chain verifies whether the safety access control rule is met or not, corresponding approval information is returned to the micro-service management module; the micro service management module returns examination and approval information to the application layer; the microservice management module reports examination and approval information to an on-chain audit analysis system; after the micro-service management module agrees, the application layer initiates a request to the micro-service party, and the request flows through the requester dynamic audit module and the server dynamic audit module; the dynamic auditing module of the requesting party performs compliance check, and the log is forwarded after being kept; the requester dynamic audit module reports logs to an on-chain dynamic audit analysis system; the dynamic auditing module of the service side performs compliance check, and the log is forwarded after being kept; and the server side dynamic audit module reports the log to the dynamic audit analysis background.
The invention provides a data credit method based on a block chain in a second aspect. Fig. 7 is a flowchart of a data granting method based on a block chain according to an embodiment of the present invention, as shown in fig. 7, the method includes: step S1, acquiring original data from the offshore terminal, and encrypting and signing the data according to a hardware-based embedded device private key to obtain first data; step S2, a third-party supervision service is introduced based on the prediction machine to audit the first data in transmission; step S3, receiving the first data, storing the first data, adding a timestamp and uploading information to obtain second data, and uploading the second data to the block chain; and step S4, writing access authority in the second data, and automatically executing the access to the data through the intelligent contract in the block chain.
According to the method provided by the second aspect of the present invention, the hardware-based embedded device private key is a U-shield, and is used for verifying the marine terminal.
According to the method provided by the second aspect of the invention, the prediction machine supports communication based on https protocol with the server and provides monitoring evidence of the data acquisition service to the third party supervision service.
According to the method provided by the second aspect of the present invention, in the step S3, the first data is certified based on hash mapping, and the certified second data is verified based on certified consensus.
A third aspect of the invention provides a non-transitory computer readable medium having stored thereon instructions which, when executed by a processor, perform the steps of the block chain based data authoring method according to the second aspect of the invention.
In summary, the block chain-based data trust scheme provided by the present disclosure has the following technical advantages: 1) through the excellent shield, the credible identification and the credible data acquisition of the identity of the marine terminal are realized; 2) by the prediction machine, the credible data transmission of the offshore terminal is realized; 3) and the reliability of the data transmission process is verified by a prediction machine certificate verification technology. (ii) a 4) Data credibility storage is realized through data hash, timestamp, collection equipment/personnel information chaining; 5) automatically executing a security access control strategy through an intelligent contract to realize the trusted use of data; and 6) realizing credible retrospective audit by chaining the data full life cycle circulation records.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (9)

1. A block chain based data authoring system, said system comprising:
a data acquisition unit configured to: acquiring original data from a marine terminal, and encrypting and signing the data according to a hardware-based embedded device private key to obtain first data;
a data transmission unit configured to: introducing a third party supervision service based on a prediction machine to audit the first data in transmission;
a data credentialing unit configured to: receiving the first data, storing the first data, adding a timestamp and uploading information to obtain second data, and uploading the second data to the block chain; and
a data usage unit configured to: and writing access authority in the second data, and automatically executing access to the data through an intelligent contract in the block chain.
2. The block chain based data trust system of claim 1, wherein the hardware-based embedded device private key is a U-shield for authenticating the offshore terminal.
3. The blockchain-based data authoring system of claim 1, wherein the oracle machine supports https protocol-based communication with a server and provides surveillance evidence for data acquisition services to the third party oversight service.
4. The system according to claim 1, wherein the data credentialing unit is specifically configured to credit the first data based on a hash mapping and to verify the credited second data based on a credentialing consensus.
5. A data signaling method based on block chains, the method comprising:
step S1, acquiring original data from the offshore terminal, and encrypting and signing the data according to a hardware-based embedded device private key to obtain first data;
step S2, a third-party supervision service is introduced based on the prediction machine to audit the first data in transmission;
step S3, receiving the first data, storing the first data, adding a timestamp and uploading information to obtain second data, and uploading the second data to the block chain; and
and step S4, writing access authority in the second data, and automatically executing access to the data through the intelligent contract in the block chain.
6. The block chain based data trust method of claim 1, wherein the hardware-based embedded device private key is a U-shield for verifying the offshore terminal.
7. The blockchain-based data crediting method according to claim 1, wherein the predicting machine supports https protocol-based communication with a server and provides monitoring evidence of a data acquisition service to the third party supervising service.
8. The block chain-based data crediting method according to claim 1, wherein in the step S3, the first data is credited based on hash mapping, and the credited second data is verified based on credentialing consensus.
9. A non-transitory computer readable medium having stored thereon instructions which, when executed by a processor, perform the steps of the block chain based data authoring method of claims 5-8.
CN202011349830.7A 2020-11-26 2020-11-26 Block chain-based data credit system, method and medium Active CN112532395B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011349830.7A CN112532395B (en) 2020-11-26 2020-11-26 Block chain-based data credit system, method and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011349830.7A CN112532395B (en) 2020-11-26 2020-11-26 Block chain-based data credit system, method and medium

Publications (2)

Publication Number Publication Date
CN112532395A true CN112532395A (en) 2021-03-19
CN112532395B CN112532395B (en) 2024-02-27

Family

ID=74993758

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011349830.7A Active CN112532395B (en) 2020-11-26 2020-11-26 Block chain-based data credit system, method and medium

Country Status (1)

Country Link
CN (1) CN112532395B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114969835A (en) * 2022-08-01 2022-08-30 北京笔新互联网科技有限公司 Webpage information evidence storing method and device
CN116032952A (en) * 2022-12-27 2023-04-28 西安交通大学 Copyright certification system and certification method based on blockchain

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108964905A (en) * 2018-07-18 2018-12-07 胡祥义 A kind of safe and efficient block chain implementation method
US20190057379A1 (en) * 2017-08-21 2019-02-21 American Express Travel Related Services Company, Inc. Systems and methods for data file transfer balancing and control on blockchain
CN110287739A (en) * 2019-06-17 2019-09-27 西安纸贵互联网科技有限公司 Data safety control method and system based on hardware private keys memory technology
CN110581854A (en) * 2019-09-12 2019-12-17 北京笔新互联网科技有限公司 intelligent terminal safety communication method based on block chain
CN111080292A (en) * 2019-11-25 2020-04-28 支付宝(杭州)信息技术有限公司 Method and device for acquiring block chain transaction signature data
CN111368953A (en) * 2020-03-10 2020-07-03 大仝智能科技有限公司 Product anti-counterfeiting traceability system and method
CN111475574A (en) * 2020-04-09 2020-07-31 成都九宽科技有限公司 Data acquisition device based on block chain
CN111737654A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
WO2020207090A1 (en) * 2019-04-12 2020-10-15 创新先进技术有限公司 Blockchain-based data processing system and method, computing device and storage medium
CN111798209A (en) * 2020-06-30 2020-10-20 远光软件股份有限公司 Engineering project management method based on block chain, electronic equipment and storage medium
CN111930852A (en) * 2020-09-29 2020-11-13 北京百度网讯科技有限公司 Data processing method, device and equipment based on block chain and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190057379A1 (en) * 2017-08-21 2019-02-21 American Express Travel Related Services Company, Inc. Systems and methods for data file transfer balancing and control on blockchain
CN108964905A (en) * 2018-07-18 2018-12-07 胡祥义 A kind of safe and efficient block chain implementation method
WO2020207090A1 (en) * 2019-04-12 2020-10-15 创新先进技术有限公司 Blockchain-based data processing system and method, computing device and storage medium
CN110287739A (en) * 2019-06-17 2019-09-27 西安纸贵互联网科技有限公司 Data safety control method and system based on hardware private keys memory technology
CN110581854A (en) * 2019-09-12 2019-12-17 北京笔新互联网科技有限公司 intelligent terminal safety communication method based on block chain
CN111080292A (en) * 2019-11-25 2020-04-28 支付宝(杭州)信息技术有限公司 Method and device for acquiring block chain transaction signature data
CN111368953A (en) * 2020-03-10 2020-07-03 大仝智能科技有限公司 Product anti-counterfeiting traceability system and method
CN111475574A (en) * 2020-04-09 2020-07-31 成都九宽科技有限公司 Data acquisition device based on block chain
CN111798209A (en) * 2020-06-30 2020-10-20 远光软件股份有限公司 Engineering project management method based on block chain, electronic equipment and storage medium
CN111737654A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN111930852A (en) * 2020-09-29 2020-11-13 北京百度网讯科技有限公司 Data processing method, device and equipment based on block chain and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯晴;薛静宜;吴钟乐;宫良;: "区块链在广电的安全应用研究", 广播与电视技术, no. 04 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114969835A (en) * 2022-08-01 2022-08-30 北京笔新互联网科技有限公司 Webpage information evidence storing method and device
CN114969835B (en) * 2022-08-01 2022-10-25 北京笔新互联网科技有限公司 Webpage information evidence storing method and device
CN116032952A (en) * 2022-12-27 2023-04-28 西安交通大学 Copyright certification system and certification method based on blockchain

Also Published As

Publication number Publication date
CN112532395B (en) 2024-02-27

Similar Documents

Publication Publication Date Title
Huang et al. Blockchain-based mobile crowd sensing in industrial systems
CN108681966B (en) Information supervision method and device based on block chain
CN113495920B (en) Content auditing system, method and device based on blockchain and storage medium
CN110957025A (en) Medical health information safety management system
CN113114632B (en) Can peg graft formula intelligence financial auditing platform
Shaikh et al. BIoMT modular infrastructure: the recent challenges, issues, and limitations in blockchain hyperledger‐enabled e‐healthcare application
CN113515756B (en) High-credibility digital identity management method and system based on block chain
CN112532395A (en) Data credit granting system, method and medium based on block chain
CN117313122A (en) Data sharing and exchanging management system based on block chain
CN112214544A (en) Ubiquitous power Internet of things edge data safe storage method based on permission block chain
CN113205345A (en) Agricultural product certificate tracing system based on Ether house block chain technology and tracing method thereof
CN112837194A (en) Intelligent system
Qiang et al. Mine consortium blockchain: the application research of coal mine safety production based on blockchain
CN114254269B (en) System and method for determining rights of biological digital assets based on block chain technology
Gao et al. BFR‐SE: A Blockchain‐Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine‐Grained Access Control in Cloud Environment
CN118051894A (en) Method for generating safety identity identifier
Wei et al. The adoption of blockchain technologies in data sharing: a state of the art survey
Duan et al. An edge cloud data integrity protection scheme based on Blockchain
Lakshmi et al. Emerging Technologies and Security in Cloud Computing
Cheng et al. Ocean data sharing based on blockchain
Shahin et al. Big data platform privacy and security, a review
CN114372092A (en) Case collaborative search processing method, system, device and electronic equipment
Dong et al. ETSB: energy trading system based on blockchain
Liu et al. Overview of Internet of Medical Things Security Based on Blockchain Access Control
Zhu et al. Exploration of Application Security for Medical Electronic Health Card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant