CN112883431A - Method for operating IT asset data on data management platform - Google Patents

Method for operating IT asset data on data management platform Download PDF

Info

Publication number
CN112883431A
CN112883431A CN202110082891.XA CN202110082891A CN112883431A CN 112883431 A CN112883431 A CN 112883431A CN 202110082891 A CN202110082891 A CN 202110082891A CN 112883431 A CN112883431 A CN 112883431A
Authority
CN
China
Prior art keywords
data
asset
platform
block chain
management platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110082891.XA
Other languages
Chinese (zh)
Inventor
龙玉江
李洵
龙娜
钟掖
甘润东
卫薇
赵威扬
王杰峰
王策
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Power Grid Co Ltd
Original Assignee
Guizhou Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Power Grid Co Ltd filed Critical Guizhou Power Grid Co Ltd
Priority to CN202110082891.XA priority Critical patent/CN112883431A/en
Publication of CN112883431A publication Critical patent/CN112883431A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention discloses an operation method of IT asset data on a data management platform, which comprises the following steps: s1, data cannot be tampered: calling a data management platform interface when maintaining the key information of the assets through a service system, synchronizing the latest IT asset data to a data management platform in real time, and enabling the data management platform to realize the chaining of the IT asset data through an integrated block chain module so as to realize non-tampering through a block chain technology; s2, enabling data to be traceable; s3, making the data credible; and S4, enabling data to be early-warned and monitored. According to the invention, through carrying out non-tampering processing, traceable processing, credibility processing and early warning and monitoring processing on the data of the IT assets, the non-tampering of the data of the IT assets is realized, the data is conveniently and truly traced, the credibility of the data of the IT assets is realized, and the consistency and the integrity of the data are ensured.

Description

Method for operating IT asset data on data management platform
Technical Field
The invention belongs to the technical field of data processing, and particularly relates to an operation method of IT asset data in a data management platform.
Background
The construction of systems such as slave data platforms and CMDBs is targeted at information management. The information has definite meanings, different information has own characteristics, the information management in different professional systems is different, and a uniform mode cannot be provided for the information management. An IT management system of a power grid in a current part of regions does not have a separate data management platform, and a data center is only responsible for data storage. According to the requirement of southern power grid digital transformation, related systems of IT management are increasing day by day, and related data are increasing continuously, so that a set of independent data management theory and platform are urgently needed to manage the related data, and the related data of IT management can be converted into an intangible asset.
At present, due to the limitation of the traditional technology, the current data management work has some problems: the method for operating the IT asset data on the data management platform is provided for solving the problems that the existing main data platform is huge in quantity and complex in data source, the data management based on the block chain cannot be realized at one time, and the reliability, the data traceability and the like exist.
Disclosure of Invention
The invention aims to provide an operation method of IT asset data in a data governance platform, so as to solve the problems in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme: an operation method of IT asset data in a data governance platform comprises the following steps:
s1, data cannot be tampered: calling a data management platform interface when maintaining the key information of the assets through a service system, synchronizing the latest IT asset data to a data management platform in real time, and enabling the data management platform to realize the chaining of the IT asset data through an integrated block chain module so as to realize non-tampering through a block chain technology;
s2, enabling data to be traceable: integrating external business system data upwards through the data management platform, integrating the functions of the blockchain modules downwards, and linking the external business system data through the functions of the data management platform integrated blockchain modules to ensure that the data is real and effective and cannot be falsified, so that the purpose of real traceability is achieved by checking the data on the blockchain through the data management platform integrated blockchain modules;
s3, making the data credible: data stored in a block chain system is trusted by storing the data of the block chain in a distributed manner and encrypting the data through mechanisms of various consensus algorithms, and the data is strongly mapped by combining the data of an IT asset service system and the data of the block chain through a data management platform in combination with the property that the data cannot be tampered on the block chain and the traceable property, so that the data of the IT asset is trusted;
s4, data can be early-warned and monitored: the method comprises the steps of integrating external business data through a data management platform, establishing data credibility and traceability after integrating a block chain module, guaranteeing the consistency and integrity of the data on the basis of non-tampering, monitoring whether the asset data of the external business system is consistent with the block chain data through a data verification service mode of the data management platform in a timing running mode, synchronizing early warning to related business personnel if the asset data is inconsistent with the block chain data, carrying out approval by the related business personnel, writing back the data to the related system if the approval is refused, and chaining the data to the block chain through the data management platform integrated block chain module.
Further, the specific processing procedure of making the data non-falsifiable in S1 is as follows: when the IT assets are input into the business system, simultaneously calling a data governance platform interface to be synchronized to a data governance platform, and linking data in a chain mode through an interface of a data governance platform integrated block chain module; when the IT assets are changed randomly, the changed conditions are linked by calling the data governance platform interface and the data governance platform integrated block chain module interface, and once the data are linked, the data are ensured not to be tampered.
Further, in the S1, a tamper-proof manner is used in the process of making data non-tamper, and the tamper-proof manner is that data is added, modified and deleted through the asset management system and then is synchronized to the data management platform, the data management platform links the asset data, so as to ensure real-time and accuracy of the blockchain data, and after the service system is tampered, a tamper source is found out through a post comparison manner, and then the service staff is notified of approval and timely processed through the early warning information of the data management platform.
Furthermore, in the process of making the data non-tamper-able in S1, a blockchain tamper-proof manner is also used, and the block chain tamper-proofing mode is to adopt a block chain storage structure to connect each block with the previous block and the next previous block through a hash algorithm, if the content of the previous block is not known, the current block cannot be generated, and if the data content in one block is to be tampered, the data content needs to be tampered with, not only the one block, but also all blocks after the block, i.e. all data history from this block onwards, which data not only exists on the server of a single party, but all blockchain nodes in the service network, and the data is also protected by using a cryptography technology, so that the data stored on the block chain is prevented from being tampered by the block chain technology.
Further, the function of making the data non-falsifiable in S1 is embodied as data security and authenticity of the IT asset data.
Further, in the step S3, making the data trusted, it is further required to construct a middleware service through the blockchain system, so as to provide a reliable, secure, and trusted support platform for the distributed ledger technology for data storage.
Further, the data verification service mode in S4 is that the data governance platform periodically compares the blockchain data with the IT asset business data in batches, actively discovers tampered data, and the nightly batch user data comparison system periodically compares the data about the IT asset and the blockchain database data in the asset management system, the financial management system, and the IT asset operation and maintenance management mobile application every day, actively discovers tampered data, generates a comparison result, and then notifies the client of the comparison result through the alarm platform, the database, and the mail system.
Further, the specific processing procedure of the data verification service mode in S4 is as follows: when the IT assets are illegally tampered, the system finds that the data are tampered, tampered information is displayed in an interface of a data management platform in a message notification mode and is displayed in a message list of the data management platform to check the tampering prompt, the system classifies the types and types of the messages, and then filtering and searching are carried out according to the IT asset management types and time; the specific display information is as follows: the specific data field that was tampered with, the discovery time, the last system change time, and the last change user.
Compared with the prior art, the invention has the beneficial effects that: according to the invention, through carrying out non-tampering processing, traceable processing, credibility processing and early warning and monitoring processing on the data of the IT assets, the non-tampering of the data of the IT assets is realized, the data is conveniently and truly traced, the credibility of the data of the IT assets is realized, and the consistency and the integrity of the data are ensured.
Drawings
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail with reference to the accompanying drawings, in which:
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1, the present invention provides a technical solution: an operation method of IT asset data in a data governance platform comprises the following steps:
s1, data cannot be tampered: calling a data management platform interface when maintaining the key information of the assets through a service system, synchronizing the latest IT asset data to a data management platform in real time, and enabling the data management platform to realize the chaining of the IT asset data through an integrated block chain module so as to realize non-tampering through a block chain technology;
s2, enabling data to be traceable: integrating external business system data upwards through the data management platform, integrating the functions of the blockchain modules downwards, and linking the external business system data through the functions of the data management platform integrated blockchain modules to ensure that the data is real and effective and cannot be falsified, so that the purpose of real traceability is achieved by checking the data on the blockchain through the data management platform integrated blockchain modules;
s3, making the data credible: data stored in a block chain system is trusted by storing the data of the block chain in a distributed manner and encrypting the data through mechanisms of various consensus algorithms, and the data is strongly mapped by combining the data of an IT asset service system and the data of the block chain through a data management platform in combination with the property that the data cannot be tampered on the block chain and the traceable property, so that the data of the IT asset is trusted;
s4, data can be early-warned and monitored: the method comprises the steps of integrating external business data through a data management platform, establishing data credibility and traceability after integrating a block chain module, guaranteeing the consistency and integrity of the data on the basis of non-tampering, monitoring whether the asset data of the external business system is consistent with the block chain data through a data verification service mode of the data management platform in a timing running mode, synchronizing early warning to related business personnel if the asset data is inconsistent with the block chain data, carrying out approval by the related business personnel, writing back the data to the related system if the approval is refused, and chaining the data to the block chain through the data management platform integrated block chain module.
In this embodiment, further, the specific processing procedure of making the data not to be tampered in step S1 is: when the IT assets are input into the business system, simultaneously calling a data governance platform interface to be synchronized to a data governance platform, and linking data in a chain mode through an interface of a data governance platform integrated block chain module; when the IT assets are changed randomly, the changed conditions are linked by calling the data governance platform interface and the data governance platform integrated block chain module interface, and once the data are linked, the data are ensured not to be tampered.
In this embodiment, further, in step S1, a tamper-proof manner is used in the process of making data non-tamper, and the tamper-proof manner is that data is added, modified, and synchronized to the data management platform after deletion operation, the block chain data is ensured to be real-time and accurate by chaining the asset data on the data management platform, after the service system is tampered, a tamper source is found out by a post-event comparison manner, and then the service staff is notified of approval and timely processed by warning information on the management platform.
In this embodiment, further, in the step S1, a way of block chain tamper resistance is used in the process of making the data non-tamper-able, and the block chain tamper-proofing mode is to adopt a block chain storage structure to connect each block with the previous block and the next previous block through a hash algorithm, if the content of the previous block is not known, the current block cannot be generated, and if the data content in one block is to be tampered, the data content needs to be tampered with, not only the one block, but also all blocks after the block, i.e. all data history from this block onwards, which data not only exists on the server of a single party, but all blockchain nodes in the service network, and the data is also protected by using a cryptography technology, so that the data stored on the block chain is prevented from being tampered by the block chain technology.
In this embodiment, the function of making the data non-falsifiable in step S1 is embodied as data security and authenticity of the IT asset data.
The authenticity of IT asset data is determined, and a section of unique characteristic data of original data with a fixed length, called as 'digital fingerprint' of the original data is generated by carrying out a series of hash operations on electronic data such as files, pictures, audio, video, identity information, behavior data, log data and the like related to a service system. When the original data is changed a little, the regenerated 'digital fingerprint' is different from the original fingerprint. Therefore, a digital fingerprint is stored in the service data of the relevant key type to the blockchain platform, and the digital fingerprint is effectively fixed through the non-tampering capability of the blockchain platform. Therefore, all relevant business systems need to be compared with the digital fingerprints corresponding to the fixed block chain platform in the process of calling the key electronic data so as to confirm the authenticity of the key electronic data; related electronic data comprises structured and unstructured digital fingerprints which are uniquely corresponding through Hash operation and are fixed in a block chain platform, and authenticity of data assets is confirmed. In the calling process of other business systems, besides the extraction of data assets from the existing business systems, the comparison and verification of the digital fingerprints need to be carried out on the block chain platform.
In this embodiment, in step S3, making the data trusted, it is further necessary to construct a middleware service through the blockchain system, so as to provide a reliable, secure, and trusted support platform for the distributed ledger technology for data storage.
In this embodiment, the data verification service in step S4 is to compare the blockchain data with the IT asset business data periodically in batches for the data governance platform, actively discover tampered data, compare the data about the IT asset in the asset management system, the financial management system, and the IT asset operation and maintenance management mobile application periodically with the blockchain database data every day at night, actively discover the tampered data, generate a comparison result, and notify the client of the comparison result through the alarm platform, the database, and the mail system.
In this embodiment, the specific processing procedure of the data verification service manner in step S4 is as follows: when the IT assets are illegally tampered, the system finds that the data are tampered, tampered information is displayed in an interface of a data management platform in a message notification mode and is displayed in a message list of the data management platform to check the tampering prompt, the system classifies the types and types of the messages, and then filtering and searching are carried out according to the IT asset management types and time; the specific display information is as follows: the specific data field that was tampered with, the discovery time, the last system change time, and the last change user.
Example 2
Referring to fig. 1, the present invention provides a technical solution: an operation method of IT asset data in a data governance platform comprises the following steps:
s1, data cannot be tampered: calling a data management platform interface when maintaining the key information of the assets through a service system, synchronizing the latest IT asset data to a data management platform in real time, and enabling the data management platform to realize the chaining of the IT asset data through an integrated block chain module so as to realize non-tampering through a block chain technology;
s2, enabling data to be traceable: integrating external business system data upwards through the data management platform, integrating the functions of the blockchain modules downwards, and linking the external business system data through the functions of the data management platform integrated blockchain modules to ensure that the data is real and effective and cannot be falsified, so that the purpose of real traceability is achieved by checking the data on the blockchain through the data management platform integrated blockchain modules;
s3, making the data credible: data stored in a block chain system is trusted by storing the data of the block chain in a distributed manner and encrypting the data through mechanisms of various consensus algorithms, and the data is strongly mapped by combining the data of an IT asset service system and the data of the block chain through a data management platform in combination with the property that the data cannot be tampered on the block chain and the traceable property, so that the data of the IT asset is trusted;
s4, data can be early-warned and monitored: the method comprises the steps of integrating external business data through a data management platform, establishing data credibility and traceability after integrating a block chain module, guaranteeing the consistency and integrity of the data on the basis of non-tampering, monitoring whether the asset data of the external business system is consistent with the block chain data through a data verification service mode of the data management platform in a timing running mode, synchronizing early warning to related business personnel if the asset data is inconsistent with the block chain data, carrying out approval by the related business personnel, writing back the data to the related system if the approval is refused, and chaining the data to the block chain through the data management platform integrated block chain module.
In this embodiment, the specific processing procedure for making the data not to be tampered in step S1 is as follows: when the IT assets are input into the business system, simultaneously calling a data governance platform interface to be synchronized to a data governance platform, and linking data in a chain mode through an interface of a data governance platform integrated block chain module; when the IT assets are changed randomly, the changed conditions are linked by calling the data governance platform interface and the data governance platform integrated block chain module interface, and once the data are linked, the data are ensured not to be tampered.
In this embodiment, in step S1, a tamper-proof manner is used in the process of making data non-tamper, and the tamper-proof manner is that data is added, modified, and deleted through the asset management system and then synchronized to the data administration platform, the data is linked through the data administration platform to ensure real-time and accuracy of the block chain data, after the service system is tampered, a tamper source is found out through a post-comparison manner, and then the service staff is notified of approval and timely processed through the administration platform warning information.
In this embodiment, in the step S1, a way of block chain tamper resistance is also used in the process of making data non-tamper-able, and the block chain tamper-proofing mode is to adopt a block chain storage structure to connect each block with the previous block and the next previous block through a hash algorithm, if the content of the previous block is not known, the current block cannot be generated, and if the data content in one block is to be tampered, the data content needs to be tampered with, not only the one block, but also all blocks after the block, i.e. all data history from this block onwards, which data not only exists on the server of a single party, but all blockchain nodes in the service network, and the data is also protected by using a cryptography technology, so that the data stored on the block chain is prevented from being tampered by the block chain technology.
In this embodiment, the function of making the data non-falsifiable in step S1 is embodied as data security and authenticity of the IT asset data.
The invention has the following effects: according to the invention, through carrying out non-tampering processing, traceable processing, credibility processing and early warning and monitoring processing on the data of the IT assets, the non-tampering of the data of the IT assets is realized, the data is conveniently and truly traced, the credibility of the data of the IT assets is realized, and the consistency and the integrity of the data are ensured.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. An operation method of IT asset data in a data governance platform is characterized by comprising the following steps:
s1, data cannot be tampered: calling a data management platform interface when maintaining the key information of the assets through a service system, synchronizing the latest IT asset data to a data management platform in real time, and enabling the data management platform to realize the chaining of the IT asset data through an integrated block chain module so as to realize non-tampering through a block chain technology;
s2, enabling data to be traceable: integrating external business system data upwards through the data management platform, integrating the functions of the blockchain modules downwards, and linking the external business system data through the functions of the data management platform integrated blockchain modules to ensure that the data is real and effective and cannot be falsified, so that the purpose of real traceability is achieved by checking the data on the blockchain through the data management platform integrated blockchain modules;
s3, making the data credible: data stored in a block chain system is trusted by storing the data of the block chain in a distributed manner and encrypting the data through mechanisms of various consensus algorithms, and the data is strongly mapped by combining the data of an IT asset service system and the data of the block chain through a data management platform in combination with the property that the data cannot be tampered on the block chain and the traceable property, so that the data of the IT asset is trusted;
s4, data can be early-warned and monitored: the method comprises the steps of integrating external business data through a data management platform, establishing data credibility and traceability after integrating a block chain module, guaranteeing the consistency and integrity of the data on the basis of non-tampering, monitoring whether the asset data of the external business system is consistent with the block chain data through a data verification service mode of the data management platform in a timing running mode, synchronizing early warning to related business personnel if the asset data is inconsistent with the block chain data, carrying out approval by the related business personnel, writing back the data to the related system if the approval is refused, and chaining the data to the block chain through the data management platform integrated block chain module.
2. The method of claim 1 for operating IT asset data on a data governance platform, wherein: the specific processing procedure for making the data non-falsifiable in S1 is as follows: when the IT assets are input into the business system, simultaneously calling a data governance platform interface to be synchronized to a data governance platform, and linking data in a chain mode through an interface of a data governance platform integrated block chain module; when the IT assets are changed randomly, the changed conditions are linked by calling the data governance platform interface and the data governance platform integrated block chain module interface, and once the data are linked, the data are ensured not to be tampered.
3. The method of claim 1 for operating IT asset data on a data governance platform, wherein: in the S1, a tamper-proof manner is used in the process of making data non-tamper, and the tamper-proof manner is to add, modify, and delete data of the asset management system and then synchronize the data to the data management platform, link asset data on the data management platform to ensure real-time and accuracy of block chain data, find a tamper source through a post comparison manner after the service system is tampered, and notify a service staff of approval and timely processing through the early warning information of the data management platform.
4. The method of claim 1 for operating IT asset data on a data governance platform, wherein: in S1, a blockchain tamper-resistant manner is used in the process of making data non-tamperable, and the blockchain tamper-resistant manner is to use a blockchain storage structure, so that each block is connected to a previous block and another previous block through a hash algorithm, if the content of the previous block is unknown, the current block cannot be generated, if the content of data in a block is to be tampered with, the data to be tampered with is not only the block but also includes all blocks after the block, i.e., all data histories from the block backward, and the data not only exists on a server on a single side but all the blockchain nodes in the service network, and the data is protected by using a cryptography technology, so that the data stored in the blockchain is tamper-resistant through the blockchain technology.
5. The method of claim 1 for operating IT asset data on a data governance platform, wherein: the function of making the data non-falsifiable in S1 is embodied as data security and authenticity of IT asset data.
6. The method of claim 1 for operating IT asset data on a data governance platform, wherein: in the step S3, making the data trusted also requires building a middleware service through a blockchain system, so as to provide a reliable, secure, and trusted distributed ledger technology support platform for data storage.
7. The method of claim 1 for operating IT asset data on a data governance platform, wherein: the data verification service mode in S4 is that the data governance platform periodically compares the blockchain data with the IT asset business data in batches, actively discovers tampered data, and the nightly batch user data comparison system periodically compares the data about the IT asset and the blockchain database data in the asset management system, the financial management system, and the IT asset operation and maintenance management mobile application every day, actively discovers tampered data, and notifies the customer of the comparison result through the alarm platform, the database, and the mail system after generating the comparison result.
8. The method of claim 1 for operating IT asset data on a data governance platform, wherein: the specific processing procedure of the data verification service mode in S4 is as follows: when the IT assets are illegally tampered, the system finds that the data are tampered, tampered information is displayed in an interface of a data management platform in a message notification mode and is displayed in a message list of the data management platform to check the tampering prompt, the system classifies the types and types of the messages, and then filtering and searching are carried out according to the IT asset management types and time; the specific display information is as follows: the specific data field that was tampered with, the discovery time, the last system change time, and the last change user.
CN202110082891.XA 2021-01-21 2021-01-21 Method for operating IT asset data on data management platform Pending CN112883431A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110082891.XA CN112883431A (en) 2021-01-21 2021-01-21 Method for operating IT asset data on data management platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110082891.XA CN112883431A (en) 2021-01-21 2021-01-21 Method for operating IT asset data on data management platform

Publications (1)

Publication Number Publication Date
CN112883431A true CN112883431A (en) 2021-06-01

Family

ID=76051556

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110082891.XA Pending CN112883431A (en) 2021-01-21 2021-01-21 Method for operating IT asset data on data management platform

Country Status (1)

Country Link
CN (1) CN112883431A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113672972A (en) * 2021-07-01 2021-11-19 国网浙江省电力有限公司建设分公司 Important asset safety monitoring method based on middleboxes

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170124464A1 (en) * 2015-10-28 2017-05-04 Fractal Industries, Inc. Rapid predictive analysis of very large data sets using the distributed computational graph
CN107122477A (en) * 2017-05-02 2017-09-01 成都中远信电子科技有限公司 A kind of block chain storage system
CN110689433A (en) * 2019-09-26 2020-01-14 上海克而瑞信息技术有限公司 Resource management information service system, method and device based on alliance chain
CN111177275A (en) * 2020-01-02 2020-05-19 肖光昱 Block chain-based management method, terminal, device and storage medium
CN111259070A (en) * 2019-11-28 2020-06-09 国网山东省电力公司 Method and related device for storing and acquiring service data
CN111431940A (en) * 2020-04-28 2020-07-17 安徽农业大学 Block chain technology-based dry fruit supply chain information tamper-proof implementation method
CN111444277A (en) * 2020-03-31 2020-07-24 中国刑事警察学院 Anti-terrorist information collaborative sharing platform and method based on block chain technology

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170124464A1 (en) * 2015-10-28 2017-05-04 Fractal Industries, Inc. Rapid predictive analysis of very large data sets using the distributed computational graph
CN107122477A (en) * 2017-05-02 2017-09-01 成都中远信电子科技有限公司 A kind of block chain storage system
CN110689433A (en) * 2019-09-26 2020-01-14 上海克而瑞信息技术有限公司 Resource management information service system, method and device based on alliance chain
CN111259070A (en) * 2019-11-28 2020-06-09 国网山东省电力公司 Method and related device for storing and acquiring service data
CN111177275A (en) * 2020-01-02 2020-05-19 肖光昱 Block chain-based management method, terminal, device and storage medium
CN111444277A (en) * 2020-03-31 2020-07-24 中国刑事警察学院 Anti-terrorist information collaborative sharing platform and method based on block chain technology
CN111431940A (en) * 2020-04-28 2020-07-17 安徽农业大学 Block chain technology-based dry fruit supply chain information tamper-proof implementation method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
岳勇等: "数字技术赋能供应链金融的应用研究", 《网络空间安全》 *
龚炜: "区块链在政务领域中的应用", 《电子技术与软件工程》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113672972A (en) * 2021-07-01 2021-11-19 国网浙江省电力有限公司建设分公司 Important asset safety monitoring method based on middleboxes
CN113672972B (en) * 2021-07-01 2024-04-05 国网浙江省电力有限公司建设分公司 Important asset safety monitoring method based on middle platform

Similar Documents

Publication Publication Date Title
US20190156429A1 (en) Hierarchical meta-ledger transaction recording
US11949691B2 (en) Malicious peer identification
CN111177080B (en) Knowledge graph storage and verification method based on block chain and IPFS
US11943237B2 (en) Malicious peer identification for database block sequence
US11200260B2 (en) Database asset fulfillment chaincode deployment
US11593316B2 (en) Database snapshot for managing state synchronization
CN110266872B (en) Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium
TWI706283B (en) Block chain-based traffic statistics method, device and equipment
US11050822B2 (en) Secure data dissemination
CN114564757A (en) Data auditing method, device and equipment of block chain and readable storage medium
US20220237326A1 (en) System and method for certifying integrity of data assets
US11475401B2 (en) Computation of supply-chain metrics
US20210166188A1 (en) Computation of supply-chain metrics
CN115329381A (en) Sensitive data-based analysis and early warning method and device, computer equipment and medium
US20230198771A1 (en) Systems and methods for providing secure internet of things data notifications using blockchain
CN112883431A (en) Method for operating IT asset data on data management platform
CN114925391A (en) Method and device for monitoring circulation of private information, electronic equipment and storage medium
Huang A blockchain-based framework for secure log storage
US11379474B2 (en) Computation of containment relationships
CN113011960A (en) Block chain-based data access method, device, medium and electronic equipment
CN112949985B (en) Power grid engineering supervision method and device based on block chain and computer equipment
CN114626849A (en) Data protection method and protection device based on block chain
CN114491661A (en) Log tamper-proofing method and system based on block chain
US20210248271A1 (en) Document verification
D'Antonio et al. Data Provenance for healthcare: a blockchain-based approach

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210601