CN112822224A - Safe transmission method for financial data query - Google Patents

Safe transmission method for financial data query Download PDF

Info

Publication number
CN112822224A
CN112822224A CN202110421055.XA CN202110421055A CN112822224A CN 112822224 A CN112822224 A CN 112822224A CN 202110421055 A CN202110421055 A CN 202110421055A CN 112822224 A CN112822224 A CN 112822224A
Authority
CN
China
Prior art keywords
address information
node
financial data
reading unit
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110421055.XA
Other languages
Chinese (zh)
Other versions
CN112822224B (en
Inventor
郭云鹏
孙泉辉
程嵩
高翔
郭端宏
金绍君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Zhejiang Electric Power Co Ltd
Jinhua Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
State Grid Zhejiang Electric Power Co Ltd
Jinhua Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Zhejiang Electric Power Co Ltd, Jinhua Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical State Grid Zhejiang Electric Power Co Ltd
Priority to CN202110421055.XA priority Critical patent/CN112822224B/en
Publication of CN112822224A publication Critical patent/CN112822224A/en
Application granted granted Critical
Publication of CN112822224B publication Critical patent/CN112822224B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a safe transmission method for inquiring financial data, which is characterized in that a database stores financial data, a node cluster dispersedly stores address information and executes different tasks, the advantage of the number of nodes is utilized, the processing efficiency is higher, a user terminal is not directly connected with the database, the user terminal cannot predict which node the address information corresponding to the required financial information is stored in, the address of one financial data is divided into two parts for storage, a malicious user can steal the target data by just cracking two correct nodes at the same time, and a reading unit clears the address information after reading each time, thereby ensuring the safety.

Description

Safe transmission method for financial data query
Technical Field
The invention relates to the field of digital information transmission, in particular to a safe transmission method for financial data query.
Background
At present, with the increasingly wide application of computer technology and network communication and the increasingly abundant variety of services in different fields, it becomes more and more important to perform secure data transmission through a network. While data is transmitted in a network, security and privacy are very important basic features, especially in the financial or financial field.
In the prior art, a blockchain is a technical scheme for collectively maintaining a reliable database in a decentralized and distrust manner, and has decentralized, distributed storage and traceable characteristics. The distributed network is an infrastructure of a block chain, data generated on each node is broadcast to other nodes through the distributed network, and the other nodes verify the authenticity of the data through workload certification. The invention disclosed in publication number CN111259070A discloses a method and related device for storing and acquiring service data, including: the method comprises the steps that a block chain application service platform obtains set service data; performing multi-stage encryption on set service data to obtain a target hash value; and performing uplink storage on the target hash value according to the type of the set service data, and performing uplink storage according to the type of the set service data after performing multi-stage encryption on the set service data, thereby improving the safety of the service data and the orderliness of data storage.
However, the traditional block chain has the characteristics of high construction cost, high energy consumption and large resource occupation, and the distributed storage enables all nodes to store a large amount of data, but the responsibilities and functions of all nodes are almost not different, so that the larger the number of the nodes is, the lower the resource utilization rate is, and although the advantages in tamper resistance are obvious, the advantages in processing efficiency and data security are not obvious. Therefore, how to fully release the advantage of the number when the number of the nodes is increased is a direction worthy of research, and efficient utilization of resources is realized through the differentiated functions of the nodes, so that the safety of information transmission is improved.
Disclosure of Invention
Aiming at the problem of poor information transmission safety caused by repeated node responsibilities in the prior art, the invention provides a safety transmission method for financial data query, which has the advantages that the node responsibilities are divided and the contents are stored in a differentiated mode, so that the utilization rate of node resources is higher, the integrity degree of information stored by a single node is reduced, and the safety is improved.
The technical scheme of the invention is as follows.
A secure transmission method for financial data queries, comprising:
step S01, calculating hash values for each piece of financial data stored in the database, broadcasting keywords and hash values of each piece of financial data to a node cluster, selecting a first node and a second node from the node cluster, sending first address information and hash values of each piece of financial data to the first node, and sending second address information and hash values of each piece of financial data to the second node;
step S02, the user terminal verifies the identity of the operator, connects any node in the node cluster after passing through, inquires the keyword or hash value stored in the node according to the input keyword or hash value, and broadcasts the corresponding hash value to the node cluster if matching information exists;
step S03, after receiving the broadcasted hash value, the first node sends a first task request to the reading unit, and after the first task request passes the first address information corresponding to the hash value, the first address information is input to the reading unit, the reading unit reads the content stored in the data storage unit according to the first address information, and forwards the financial data corresponding to the first address information to the user terminal, and meanwhile, broadcasts a stage take-over signal to the node cluster;
step S04, the second node enters a preparation mode after receiving the reading instruction, after receiving the phase succession signal broadcasted by the reading unit, the second node sends a second task request to the reading unit, after the second task request passes the phase succession signal, the second address information corresponding to the hash value is input to the reading unit, the reading unit continues to read the data storage unit according to the second address information until the second task request is completed, the financial data corresponding to the second address information is forwarded to the user terminal, meanwhile, the completion signal is broadcasted, and the reading unit clears all address information.
The financial data are stored in the database, the node clusters store the address information in a dispersing way and execute different tasks, the advantages of the number of the nodes are utilized, the processing efficiency is high, the user terminal is not directly connected with the database, the user terminal cannot predict which node the address information corresponding to the required financial information is stored in, the address of one financial data is divided into two parts for storage, a malicious user can steal the target data only by just cracking two correct nodes at the same time, and the reading unit clears the address information after reading each time, so that the safety is guaranteed.
Preferably, the first address information is a start address, the second address information is the number of remaining addresses or an end address, when the second address information is the number of remaining addresses, the reading unit counts addresses synchronously while continuing to read until the number of read addresses meets a condition, and when the second address information is the end address, the reading unit continues to read the end address. Typically, a single address has a certain capacity limit, and one item of financial data is often stored in a plurality of consecutive addresses. When the starting address and the ending address of a financial data are A and B respectively, the content recorded by the corresponding first address information is A, the content recorded by the second address information is the difference value of B-A when the second address information is the rest addresses, and the content recorded by the second address information is B when the second address information is the ending address; when the second address information is the rest of the address number, the reading unit reads the data of B-A addresses after the address A has been read, and then the address number condition is met.
Preferably, the forwarding the financial data corresponding to the first address information to the user terminal includes: and the reading unit forwards the financial data to the user terminal through a third node, wherein the third node is randomly selected from the node cluster every time.
Preferably, the forwarding the financial data corresponding to the second address information to the user terminal includes: and the reading unit forwards the financial data to the user terminal through a fourth node, wherein the fourth node is randomly selected from the node cluster every time. That is, the node returning the information cannot predict unless just two correct nodes are broken, so that at least four kinds of nodes are involved in the whole transmission process, and the safety is high.
Preferably, the first node and the second node are randomly selected from the node cluster each time.
Preferably, if a plurality of task requests need to be processed simultaneously, the reading unit binds the task requests with the hash value and the address information, matches the hash value of the first task request when each second task request arrives, finds the first address information again, and continues to read according to the second address information; the reading unit selects to perform multi-thread simultaneous processing or single-thread sequential processing according to hardware or software conditions. As a checking means, the tasks before and after the same hash value are spliced to prevent reading of wrong addresses.
Preferably, the number of the first nodes and the number of the second nodes are 3n, n is a natural number greater than or equal to 1, the number of the first nodes and the number of the second nodes include m pseudo first nodes and m pseudo second nodes, 1 < m < n, the pseudo first nodes store false first address information, the pseudo second nodes store false second address information, when all the first nodes or the second nodes send task requests to the reading unit, the reading unit verifies the received first address information or the received second address information, if more than half of information of each kind is consistent, reading is carried out, and if not, an error is reported. A plurality of nodes are simultaneously selected in each class, a small amount of false address information exists, and the correctness of information stored in the nodes cannot be known before verification, so that even if an individual node is hijacked, the information cannot be accurately acquired, distributed storage of the same address information is superposed on the first address information and the second address information on the basis of distributed storage is realized, and compared with the traditional distributed storage, the distributed storage can only prevent tampering, and the method can also prevent stealing.
Preferably, after step S01 is completed, the sent address information in the database is cleared, and only the address information stored in the node is retained.
Preferably, after a complete reading process is completed, the original first node sends the used first address information and the hash value to the new first node and clears the used first address information of the original first node, and the original second node sends the used second address information and the hash value to the new second node and clears the used second address information of the original second node. The dynamic storage of the address in the node cluster is realized, and theoretically, all nodes need to be broken to know complete address information.
The beneficial effects of the invention include: through distributing to different tasks of node and different storage data, the quantity advantage of full play node improves the treatment effeciency, through the incompleteness of node information storage, prevents that complete information from revealing, and complete transmission step relates to a plurality of nodes, prevents that information from stealing to utilize the basis of scattered storage to overlap distributed storage and mix false information, guarantee information security.
Drawings
FIG. 1 is a flow chart of an embodiment of the present invention.
Detailed Description
The technical solution of the present application will be described with reference to the following examples. In addition, numerous specific details are set forth below in order to provide a better understanding of the present invention. It will be understood by those skilled in the art that the present invention may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present invention.
Example 1:
a secure transmission method for financial data query, as shown in fig. 1, comprising:
step S01, calculating hash values for each piece of financial data stored in the database, broadcasting keywords and hash values of each piece of financial data to the node cluster, selecting a first node and a second node from the node cluster, sending first address information and hash values of each piece of financial data to the first node, and sending second address information and hash values of each piece of financial data to the second node. The first node and the second node are randomly selected from the node cluster each time.
The reading unit synchronously counts the addresses when continuing reading until the number of the read addresses meets the condition. Typically, a single address has a certain capacity limit, and one item of financial data is often stored in a plurality of consecutive addresses. For example, when the start address of a piece of financial data is 0x00DC 0198 and the end address is 0x00DC EF05, the content described in the corresponding first address information is 0x00DC 0198, and the content described in the second address information is 60781 bytes; the reading unit satisfies the address number condition by reading 60781 bytes of data after having read the address 0x00DC 0198. In addition, since addresses are generally divided into blocks in a large-capacity storage system, recording can be performed directly in units of blocks, and recording is not performed in units of bytes, and the counting principle is the same as above.
And step S02, the user terminal verifies the identity of the operator, connects any node in the node cluster after passing through, inquires the keyword or the hash value stored in the node according to the input keyword or hash value, and broadcasts the corresponding hash value to the node cluster if matching information exists.
Step S03, after receiving the broadcasted hash value, the first node sends a first task request to the reading unit, and after passing the first task request, inputs the first address information corresponding to the hash value to the reading unit, and the reading unit reads the content stored in the data storage unit according to the first address information, and the reading unit forwards the financial data to the user terminal through a third node, where the third node is randomly selected from the node cluster each time, and simultaneously broadcasts a stage take-over signal to the node cluster.
Step S04, the second node enters a preparation mode after receiving the reading instruction, after receiving the phase succession signal broadcasted by the reading unit, the second node sends a second task request to the reading unit, after the second task request passes the phase succession signal, the second address information corresponding to the hash value is input to the reading unit, the reading unit continues to read the data storage unit according to the second address information until the second task request is completed, the reading unit forwards the financial data to the user terminal through a fourth node, the fourth node randomly selects from the node cluster every time, and simultaneously broadcasts a completion signal, and the reading unit clears all address information. That is, the node returning the information cannot predict unless just two correct nodes are broken, so that at least four kinds of nodes are involved in the whole transmission process, and the safety is high.
If a reading unit of this embodiment needs to process multiple task requests at the same time, the reading unit binds the task requests with hash values and address information, matches the hash value of the first task request when each second task request arrives, and finds the first address information again, and then continues to read according to the second address information; the reading unit selects to perform multi-thread simultaneous processing or single-thread sequential processing according to hardware or software conditions. As a checking means, the tasks before and after the same hash value are spliced to prevent reading of wrong addresses.
In the embodiment, financial data is stored in the database, address information is stored in a node cluster in a dispersing manner, different tasks are executed, the advantage of the number of nodes is utilized, the processing efficiency is high, no direct connection exists between the user terminal and the database, the user terminal cannot predict which node the address information corresponding to the required financial information is stored in, the address of one financial data is divided into two parts for storage, a malicious user just needs to crack two correct nodes at the same time to steal target data, the reading unit clears the address information after reading is completed every time, and the safety is guaranteed.
Example 2:
the present embodiment is generally consistent with the previous embodiment, and the difference is that after step S01 is completed, the sent address information in the database is cleared, and only the address information stored in the node is retained; and the number of the first nodes and the second nodes is 9, the pseudo-first nodes and the pseudo-second nodes are included, the pseudo-first nodes store false first address information, the pseudo-second nodes store false second address information, when all the first nodes or the second nodes send task requests to the reading unit, the reading unit verifies the received first address information or the received second address information, if more than half of the information of each kind is consistent, reading is carried out, and if not, errors are reported. A plurality of nodes are simultaneously selected in each class, a small amount of false address information exists, and the correctness of information stored in the nodes cannot be known before verification, so that even if an individual node is hijacked, the information cannot be accurately acquired, distributed storage of the same address information is superposed on the first address information and the second address information on the basis of distributed storage is realized, and compared with the traditional distributed storage, the distributed storage can only prevent tampering, and the method can also prevent stealing.
After a complete reading process is completed, the original first node sends the used first address information and the hash value to the new first node and eliminates the used first address information of the original first node, and the original second node sends the used second address information and the hash value to the new second node and eliminates the used second address information of the original second node. The dynamic storage of the address in the node cluster is realized, and theoretically, all nodes need to be broken to know complete address information.
The embodiment gives full play to the quantity advantage of the nodes through distributing different tasks and different storage data to the nodes, improves the processing efficiency, prevents complete information leakage through the incompleteness of node information storage, prevents information stealing through the complete transmission step involving a plurality of nodes, and ensures information safety by overlapping distributed storage and mixing false information on the basis of utilizing the dispersed storage.
Through the description of the above embodiments, those skilled in the art will understand that, for convenience and simplicity of description, only the division of the above functional modules is used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of a specific device is divided into different functional modules to complete all or part of the above described functions.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (9)

1. A secure transmission method for financial data queries, comprising:
step S01, calculating hash values for each piece of financial data stored in the database, broadcasting keywords and hash values of each piece of financial data to a node cluster, selecting a first node and a second node from the node cluster, sending first address information and hash values of each piece of financial data to the first node, and sending second address information and hash values of each piece of financial data to the second node;
step S02, the user terminal verifies the identity of the operator, connects any node in the node cluster after passing through, inquires the keyword or hash value stored in the node according to the input keyword or hash value, and broadcasts the corresponding hash value to the node cluster if matching information exists;
step S03, after receiving the broadcasted hash value, the first node sends a first task request to the reading unit, and after the first task request passes the first address information corresponding to the hash value, the first address information is input to the reading unit, the reading unit reads the content stored in the data storage unit according to the first address information, and forwards the financial data corresponding to the first address information to the user terminal, and meanwhile, broadcasts a stage take-over signal to the node cluster;
step S04, the second node enters a preparation mode after receiving the reading instruction, after receiving the phase succession signal broadcasted by the reading unit, the second node sends a second task request to the reading unit, after the second task request passes the phase succession signal, the second address information corresponding to the hash value is input to the reading unit, the reading unit continues to read the data storage unit according to the second address information until the second task request is completed, the financial data corresponding to the second address information is forwarded to the user terminal, meanwhile, the completion signal is broadcasted, and the reading unit clears all address information.
2. The secure transmission method for querying financial data according to claim 1, wherein the first address information is a start address, the second address information is the remaining address number or an end address, when the second address information is the remaining address number, the reading unit synchronously counts addresses when continuing to read until the number of read addresses meets a condition, and then the reading unit finishes when continuing to read the end address when the second address information is the end address.
3. The secure transmission method for the financial data query according to claim 1, wherein the forwarding the financial data corresponding to the first address information to the user terminal includes: and the reading unit forwards the financial data to the user terminal through a third node, wherein the third node is randomly selected from the node cluster every time.
4. The secure transmission method for the financial data query according to claim 1 or 3, wherein the forwarding the financial data corresponding to the second address information to the user terminal includes: and the reading unit forwards the financial data to the user terminal through a fourth node, wherein the fourth node is randomly selected from the node cluster every time.
5. A method of secure transmission for financial data queries as claimed in claim 1, in which the first and second nodes are randomly chosen from a cluster of nodes for each time.
6. The secure transmission method for querying financial data according to claim 1, wherein the reading unit binds the task request with the hash value and the address information if a plurality of task requests need to be processed simultaneously, matches the hash value of the first task request when each second task request arrives, and finds the first address information again, and then continues to read according to the second address information; the reading unit selects to perform multi-thread simultaneous processing or single-thread sequential processing according to hardware or software conditions.
7. The secure transmission method for the financial data inquiry according to claim 1 or 5, wherein the number of the first node and the second node is 3n, n is a natural number greater than or equal to 1, the secure transmission method comprises m pseudo first nodes and m pseudo second nodes, 1 < m < n, the pseudo first nodes store the false first address information, the pseudo second nodes store the false second address information, when all the first or second nodes send task requests to the reading unit, the reading unit verifies the received first or second address information, and when more than half of each kind of information is consistent, the reading is performed, otherwise, an error is reported.
8. A secure transmission method for financial data inquiry according to claim 1, wherein after step S01 is completed, the sent address information in the database is cleared, and only the address information stored in the node is retained.
9. The secure transmission method for financial data inquiry according to claim 1, wherein after a complete reading process is completed, the original first node sends the used first address information and the hash value to the new first node and clears the used first address information of the original first node, and the original second node sends the used second address information and the hash value to the new second node and clears the used second address information of the original second node.
CN202110421055.XA 2021-04-19 2021-04-19 Safe transmission method for financial data query Active CN112822224B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110421055.XA CN112822224B (en) 2021-04-19 2021-04-19 Safe transmission method for financial data query

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110421055.XA CN112822224B (en) 2021-04-19 2021-04-19 Safe transmission method for financial data query

Publications (2)

Publication Number Publication Date
CN112822224A true CN112822224A (en) 2021-05-18
CN112822224B CN112822224B (en) 2021-06-22

Family

ID=75862570

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110421055.XA Active CN112822224B (en) 2021-04-19 2021-04-19 Safe transmission method for financial data query

Country Status (1)

Country Link
CN (1) CN112822224B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139081A (en) * 2011-11-28 2013-06-05 中兴通讯股份有限公司 Update method and nodes for distributed hash table routing lists
CN107273759A (en) * 2017-05-08 2017-10-20 上海点融信息科技有限责任公司 Method, equipment and computer-readable recording medium for protecting block chain data
CN107977163A (en) * 2017-01-24 2018-05-01 腾讯科技(深圳)有限公司 Shared data recovery method and device
CN109491968A (en) * 2018-11-13 2019-03-19 浙江鲸腾网络科技有限公司 A kind of document handling method, device, equipment and computer readable storage medium
CN109543455A (en) * 2018-11-06 2019-03-29 联动优势科技有限公司 A kind of data archiving method and device of block chain
WO2019221651A1 (en) * 2018-05-18 2019-11-21 Telefonaktiebolaget Lm Ericsson (Publ) Method and network node for managing access to a blockchain
WO2020034194A1 (en) * 2018-08-17 2020-02-20 西门子股份公司 Method, device, and system for processing distributed data, and machine readable medium
CN111259070A (en) * 2019-11-28 2020-06-09 国网山东省电力公司 Method and related device for storing and acquiring service data
CN111582959A (en) * 2020-05-08 2020-08-25 国网浙江省电力有限公司杭州供电公司 WBS-based intelligent order processing system
CN112036995A (en) * 2020-08-20 2020-12-04 深圳市易链信息技术有限公司 Large-scale enterprise financial data management method and system based on block chain and readable storage medium
CN112667567A (en) * 2021-03-18 2021-04-16 国网浙江省电力有限公司 Operation cost archiving method and device combining electric power data and power grid topology

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139081A (en) * 2011-11-28 2013-06-05 中兴通讯股份有限公司 Update method and nodes for distributed hash table routing lists
CN107977163A (en) * 2017-01-24 2018-05-01 腾讯科技(深圳)有限公司 Shared data recovery method and device
CN107273759A (en) * 2017-05-08 2017-10-20 上海点融信息科技有限责任公司 Method, equipment and computer-readable recording medium for protecting block chain data
WO2019221651A1 (en) * 2018-05-18 2019-11-21 Telefonaktiebolaget Lm Ericsson (Publ) Method and network node for managing access to a blockchain
WO2020034194A1 (en) * 2018-08-17 2020-02-20 西门子股份公司 Method, device, and system for processing distributed data, and machine readable medium
CN109543455A (en) * 2018-11-06 2019-03-29 联动优势科技有限公司 A kind of data archiving method and device of block chain
CN109491968A (en) * 2018-11-13 2019-03-19 浙江鲸腾网络科技有限公司 A kind of document handling method, device, equipment and computer readable storage medium
CN111259070A (en) * 2019-11-28 2020-06-09 国网山东省电力公司 Method and related device for storing and acquiring service data
CN111582959A (en) * 2020-05-08 2020-08-25 国网浙江省电力有限公司杭州供电公司 WBS-based intelligent order processing system
CN112036995A (en) * 2020-08-20 2020-12-04 深圳市易链信息技术有限公司 Large-scale enterprise financial data management method and system based on block chain and readable storage medium
CN112667567A (en) * 2021-03-18 2021-04-16 国网浙江省电力有限公司 Operation cost archiving method and device combining electric power data and power grid topology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HTTPS://WWW.ZUOCOIN.COM/A/NEWS/EXPERIENCE/2019/0329/32324.HTML: "BUMO:大规模数据的差异化分布式存储", 《左链科技》 *

Also Published As

Publication number Publication date
CN112822224B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN110868440B (en) Block chain male chain
US20210328814A1 (en) Blockchain integrated stations and automatic blockchain construction methods and apparatuses
CN111383021B (en) Node management method, device, equipment and medium based on block chain network
CN111885050B (en) Data storage method and device based on block chain network, related equipment and medium
CN113518005B (en) Block consensus method, device, equipment and storage medium
CN113256424B (en) Transaction data processing method, device, equipment and storage medium
CN111401904B (en) Consensus method and system in alliance chain
CN112822224B (en) Safe transmission method for financial data query
CN111680282B (en) Node management method, device, equipment and medium based on block chain network
CN110784324B (en) Node admission method and device
WO2023040453A1 (en) Transaction information processing method and apparatus
CN110633326A (en) Method and system for uplink of weather data of Internet of things on block chain
CN110619023A (en) Water source detection data chaining method and device of Internet of things by combining block chains
CN113886487B (en) Message transmission method, system, medium, equipment and mobile terminal
CN117035740B (en) Construction method of bridge structure detection monitoring and maintenance data traceability system
CN116484326B (en) Multi-account access authority management method and related device based on NFT
CN115760388B (en) Block chain-based consensus method, device, equipment and storage medium
CN113300853B (en) Financial credit information management method, device, electronic equipment and storage medium
CN115001707B (en) Device authentication method based on block chain and related device
CN116760632B (en) Data processing method, device, equipment and readable storage medium
CN117579372A (en) Service request processing method and device, storage medium and electronic equipment
CN117575592A (en) Block chain cross-slice consensus method based on star-shaped slicing architecture
CN117455661A (en) Data processing method, device, equipment and medium based on block chain
CN116975122A (en) Event query method, device, equipment and medium
CN117648159A (en) Method and device for parallelizing execution of block chain transaction and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant