CN112883431A - Method for operating IT asset data on data management platform - Google Patents
Method for operating IT asset data on data management platform Download PDFInfo
- Publication number
- CN112883431A CN112883431A CN202110082891.XA CN202110082891A CN112883431A CN 112883431 A CN112883431 A CN 112883431A CN 202110082891 A CN202110082891 A CN 202110082891A CN 112883431 A CN112883431 A CN 112883431A
- Authority
- CN
- China
- Prior art keywords
- data
- asset
- platform
- block chain
- management platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013523 data management Methods 0.000 title claims abstract description 66
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000012545 processing Methods 0.000 claims abstract description 21
- 238000005516 engineering process Methods 0.000 claims abstract description 18
- 238000012544 monitoring process Methods 0.000 claims abstract description 7
- 238000007726 management method Methods 0.000 claims description 22
- 238000013524 data verification Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 10
- 230000001360 synchronised effect Effects 0.000 claims description 7
- 230000008859 change Effects 0.000 claims description 6
- 238000013500 data storage Methods 0.000 claims description 4
- 230000007246 mechanism Effects 0.000 claims description 4
- 230000003203 everyday effect Effects 0.000 claims description 3
- 238000001914 filtration Methods 0.000 claims description 3
- 238000012423 maintenance Methods 0.000 claims description 3
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Abstract
The invention discloses an operation method of IT asset data on a data management platform, which comprises the following steps: s1, data cannot be tampered: calling a data management platform interface when maintaining the key information of the assets through a service system, synchronizing the latest IT asset data to a data management platform in real time, and enabling the data management platform to realize the chaining of the IT asset data through an integrated block chain module so as to realize non-tampering through a block chain technology; s2, enabling data to be traceable; s3, making the data credible; and S4, enabling data to be early-warned and monitored. According to the invention, through carrying out non-tampering processing, traceable processing, credibility processing and early warning and monitoring processing on the data of the IT assets, the non-tampering of the data of the IT assets is realized, the data is conveniently and truly traced, the credibility of the data of the IT assets is realized, and the consistency and the integrity of the data are ensured.
Description
Technical Field
The invention belongs to the technical field of data processing, and particularly relates to an operation method of IT asset data in a data management platform.
Background
The construction of systems such as slave data platforms and CMDBs is targeted at information management. The information has definite meanings, different information has own characteristics, the information management in different professional systems is different, and a uniform mode cannot be provided for the information management. An IT management system of a power grid in a current part of regions does not have a separate data management platform, and a data center is only responsible for data storage. According to the requirement of southern power grid digital transformation, related systems of IT management are increasing day by day, and related data are increasing continuously, so that a set of independent data management theory and platform are urgently needed to manage the related data, and the related data of IT management can be converted into an intangible asset.
At present, due to the limitation of the traditional technology, the current data management work has some problems: the method for operating the IT asset data on the data management platform is provided for solving the problems that the existing main data platform is huge in quantity and complex in data source, the data management based on the block chain cannot be realized at one time, and the reliability, the data traceability and the like exist.
Disclosure of Invention
The invention aims to provide an operation method of IT asset data in a data governance platform, so as to solve the problems in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme: an operation method of IT asset data in a data governance platform comprises the following steps:
s1, data cannot be tampered: calling a data management platform interface when maintaining the key information of the assets through a service system, synchronizing the latest IT asset data to a data management platform in real time, and enabling the data management platform to realize the chaining of the IT asset data through an integrated block chain module so as to realize non-tampering through a block chain technology;
s2, enabling data to be traceable: integrating external business system data upwards through the data management platform, integrating the functions of the blockchain modules downwards, and linking the external business system data through the functions of the data management platform integrated blockchain modules to ensure that the data is real and effective and cannot be falsified, so that the purpose of real traceability is achieved by checking the data on the blockchain through the data management platform integrated blockchain modules;
s3, making the data credible: data stored in a block chain system is trusted by storing the data of the block chain in a distributed manner and encrypting the data through mechanisms of various consensus algorithms, and the data is strongly mapped by combining the data of an IT asset service system and the data of the block chain through a data management platform in combination with the property that the data cannot be tampered on the block chain and the traceable property, so that the data of the IT asset is trusted;
s4, data can be early-warned and monitored: the method comprises the steps of integrating external business data through a data management platform, establishing data credibility and traceability after integrating a block chain module, guaranteeing the consistency and integrity of the data on the basis of non-tampering, monitoring whether the asset data of the external business system is consistent with the block chain data through a data verification service mode of the data management platform in a timing running mode, synchronizing early warning to related business personnel if the asset data is inconsistent with the block chain data, carrying out approval by the related business personnel, writing back the data to the related system if the approval is refused, and chaining the data to the block chain through the data management platform integrated block chain module.
Further, the specific processing procedure of making the data non-falsifiable in S1 is as follows: when the IT assets are input into the business system, simultaneously calling a data governance platform interface to be synchronized to a data governance platform, and linking data in a chain mode through an interface of a data governance platform integrated block chain module; when the IT assets are changed randomly, the changed conditions are linked by calling the data governance platform interface and the data governance platform integrated block chain module interface, and once the data are linked, the data are ensured not to be tampered.
Further, in the S1, a tamper-proof manner is used in the process of making data non-tamper, and the tamper-proof manner is that data is added, modified and deleted through the asset management system and then is synchronized to the data management platform, the data management platform links the asset data, so as to ensure real-time and accuracy of the blockchain data, and after the service system is tampered, a tamper source is found out through a post comparison manner, and then the service staff is notified of approval and timely processed through the early warning information of the data management platform.
Furthermore, in the process of making the data non-tamper-able in S1, a blockchain tamper-proof manner is also used, and the block chain tamper-proofing mode is to adopt a block chain storage structure to connect each block with the previous block and the next previous block through a hash algorithm, if the content of the previous block is not known, the current block cannot be generated, and if the data content in one block is to be tampered, the data content needs to be tampered with, not only the one block, but also all blocks after the block, i.e. all data history from this block onwards, which data not only exists on the server of a single party, but all blockchain nodes in the service network, and the data is also protected by using a cryptography technology, so that the data stored on the block chain is prevented from being tampered by the block chain technology.
Further, the function of making the data non-falsifiable in S1 is embodied as data security and authenticity of the IT asset data.
Further, in the step S3, making the data trusted, it is further required to construct a middleware service through the blockchain system, so as to provide a reliable, secure, and trusted support platform for the distributed ledger technology for data storage.
Further, the data verification service mode in S4 is that the data governance platform periodically compares the blockchain data with the IT asset business data in batches, actively discovers tampered data, and the nightly batch user data comparison system periodically compares the data about the IT asset and the blockchain database data in the asset management system, the financial management system, and the IT asset operation and maintenance management mobile application every day, actively discovers tampered data, generates a comparison result, and then notifies the client of the comparison result through the alarm platform, the database, and the mail system.
Further, the specific processing procedure of the data verification service mode in S4 is as follows: when the IT assets are illegally tampered, the system finds that the data are tampered, tampered information is displayed in an interface of a data management platform in a message notification mode and is displayed in a message list of the data management platform to check the tampering prompt, the system classifies the types and types of the messages, and then filtering and searching are carried out according to the IT asset management types and time; the specific display information is as follows: the specific data field that was tampered with, the discovery time, the last system change time, and the last change user.
Compared with the prior art, the invention has the beneficial effects that: according to the invention, through carrying out non-tampering processing, traceable processing, credibility processing and early warning and monitoring processing on the data of the IT assets, the non-tampering of the data of the IT assets is realized, the data is conveniently and truly traced, the credibility of the data of the IT assets is realized, and the consistency and the integrity of the data are ensured.
Drawings
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail with reference to the accompanying drawings, in which:
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1, the present invention provides a technical solution: an operation method of IT asset data in a data governance platform comprises the following steps:
s1, data cannot be tampered: calling a data management platform interface when maintaining the key information of the assets through a service system, synchronizing the latest IT asset data to a data management platform in real time, and enabling the data management platform to realize the chaining of the IT asset data through an integrated block chain module so as to realize non-tampering through a block chain technology;
s2, enabling data to be traceable: integrating external business system data upwards through the data management platform, integrating the functions of the blockchain modules downwards, and linking the external business system data through the functions of the data management platform integrated blockchain modules to ensure that the data is real and effective and cannot be falsified, so that the purpose of real traceability is achieved by checking the data on the blockchain through the data management platform integrated blockchain modules;
s3, making the data credible: data stored in a block chain system is trusted by storing the data of the block chain in a distributed manner and encrypting the data through mechanisms of various consensus algorithms, and the data is strongly mapped by combining the data of an IT asset service system and the data of the block chain through a data management platform in combination with the property that the data cannot be tampered on the block chain and the traceable property, so that the data of the IT asset is trusted;
s4, data can be early-warned and monitored: the method comprises the steps of integrating external business data through a data management platform, establishing data credibility and traceability after integrating a block chain module, guaranteeing the consistency and integrity of the data on the basis of non-tampering, monitoring whether the asset data of the external business system is consistent with the block chain data through a data verification service mode of the data management platform in a timing running mode, synchronizing early warning to related business personnel if the asset data is inconsistent with the block chain data, carrying out approval by the related business personnel, writing back the data to the related system if the approval is refused, and chaining the data to the block chain through the data management platform integrated block chain module.
In this embodiment, further, the specific processing procedure of making the data not to be tampered in step S1 is: when the IT assets are input into the business system, simultaneously calling a data governance platform interface to be synchronized to a data governance platform, and linking data in a chain mode through an interface of a data governance platform integrated block chain module; when the IT assets are changed randomly, the changed conditions are linked by calling the data governance platform interface and the data governance platform integrated block chain module interface, and once the data are linked, the data are ensured not to be tampered.
In this embodiment, further, in step S1, a tamper-proof manner is used in the process of making data non-tamper, and the tamper-proof manner is that data is added, modified, and synchronized to the data management platform after deletion operation, the block chain data is ensured to be real-time and accurate by chaining the asset data on the data management platform, after the service system is tampered, a tamper source is found out by a post-event comparison manner, and then the service staff is notified of approval and timely processed by warning information on the management platform.
In this embodiment, further, in the step S1, a way of block chain tamper resistance is used in the process of making the data non-tamper-able, and the block chain tamper-proofing mode is to adopt a block chain storage structure to connect each block with the previous block and the next previous block through a hash algorithm, if the content of the previous block is not known, the current block cannot be generated, and if the data content in one block is to be tampered, the data content needs to be tampered with, not only the one block, but also all blocks after the block, i.e. all data history from this block onwards, which data not only exists on the server of a single party, but all blockchain nodes in the service network, and the data is also protected by using a cryptography technology, so that the data stored on the block chain is prevented from being tampered by the block chain technology.
In this embodiment, the function of making the data non-falsifiable in step S1 is embodied as data security and authenticity of the IT asset data.
The authenticity of IT asset data is determined, and a section of unique characteristic data of original data with a fixed length, called as 'digital fingerprint' of the original data is generated by carrying out a series of hash operations on electronic data such as files, pictures, audio, video, identity information, behavior data, log data and the like related to a service system. When the original data is changed a little, the regenerated 'digital fingerprint' is different from the original fingerprint. Therefore, a digital fingerprint is stored in the service data of the relevant key type to the blockchain platform, and the digital fingerprint is effectively fixed through the non-tampering capability of the blockchain platform. Therefore, all relevant business systems need to be compared with the digital fingerprints corresponding to the fixed block chain platform in the process of calling the key electronic data so as to confirm the authenticity of the key electronic data; related electronic data comprises structured and unstructured digital fingerprints which are uniquely corresponding through Hash operation and are fixed in a block chain platform, and authenticity of data assets is confirmed. In the calling process of other business systems, besides the extraction of data assets from the existing business systems, the comparison and verification of the digital fingerprints need to be carried out on the block chain platform.
In this embodiment, in step S3, making the data trusted, it is further necessary to construct a middleware service through the blockchain system, so as to provide a reliable, secure, and trusted support platform for the distributed ledger technology for data storage.
In this embodiment, the data verification service in step S4 is to compare the blockchain data with the IT asset business data periodically in batches for the data governance platform, actively discover tampered data, compare the data about the IT asset in the asset management system, the financial management system, and the IT asset operation and maintenance management mobile application periodically with the blockchain database data every day at night, actively discover the tampered data, generate a comparison result, and notify the client of the comparison result through the alarm platform, the database, and the mail system.
In this embodiment, the specific processing procedure of the data verification service manner in step S4 is as follows: when the IT assets are illegally tampered, the system finds that the data are tampered, tampered information is displayed in an interface of a data management platform in a message notification mode and is displayed in a message list of the data management platform to check the tampering prompt, the system classifies the types and types of the messages, and then filtering and searching are carried out according to the IT asset management types and time; the specific display information is as follows: the specific data field that was tampered with, the discovery time, the last system change time, and the last change user.
Example 2
Referring to fig. 1, the present invention provides a technical solution: an operation method of IT asset data in a data governance platform comprises the following steps:
s1, data cannot be tampered: calling a data management platform interface when maintaining the key information of the assets through a service system, synchronizing the latest IT asset data to a data management platform in real time, and enabling the data management platform to realize the chaining of the IT asset data through an integrated block chain module so as to realize non-tampering through a block chain technology;
s2, enabling data to be traceable: integrating external business system data upwards through the data management platform, integrating the functions of the blockchain modules downwards, and linking the external business system data through the functions of the data management platform integrated blockchain modules to ensure that the data is real and effective and cannot be falsified, so that the purpose of real traceability is achieved by checking the data on the blockchain through the data management platform integrated blockchain modules;
s3, making the data credible: data stored in a block chain system is trusted by storing the data of the block chain in a distributed manner and encrypting the data through mechanisms of various consensus algorithms, and the data is strongly mapped by combining the data of an IT asset service system and the data of the block chain through a data management platform in combination with the property that the data cannot be tampered on the block chain and the traceable property, so that the data of the IT asset is trusted;
s4, data can be early-warned and monitored: the method comprises the steps of integrating external business data through a data management platform, establishing data credibility and traceability after integrating a block chain module, guaranteeing the consistency and integrity of the data on the basis of non-tampering, monitoring whether the asset data of the external business system is consistent with the block chain data through a data verification service mode of the data management platform in a timing running mode, synchronizing early warning to related business personnel if the asset data is inconsistent with the block chain data, carrying out approval by the related business personnel, writing back the data to the related system if the approval is refused, and chaining the data to the block chain through the data management platform integrated block chain module.
In this embodiment, the specific processing procedure for making the data not to be tampered in step S1 is as follows: when the IT assets are input into the business system, simultaneously calling a data governance platform interface to be synchronized to a data governance platform, and linking data in a chain mode through an interface of a data governance platform integrated block chain module; when the IT assets are changed randomly, the changed conditions are linked by calling the data governance platform interface and the data governance platform integrated block chain module interface, and once the data are linked, the data are ensured not to be tampered.
In this embodiment, in step S1, a tamper-proof manner is used in the process of making data non-tamper, and the tamper-proof manner is that data is added, modified, and deleted through the asset management system and then synchronized to the data administration platform, the data is linked through the data administration platform to ensure real-time and accuracy of the block chain data, after the service system is tampered, a tamper source is found out through a post-comparison manner, and then the service staff is notified of approval and timely processed through the administration platform warning information.
In this embodiment, in the step S1, a way of block chain tamper resistance is also used in the process of making data non-tamper-able, and the block chain tamper-proofing mode is to adopt a block chain storage structure to connect each block with the previous block and the next previous block through a hash algorithm, if the content of the previous block is not known, the current block cannot be generated, and if the data content in one block is to be tampered, the data content needs to be tampered with, not only the one block, but also all blocks after the block, i.e. all data history from this block onwards, which data not only exists on the server of a single party, but all blockchain nodes in the service network, and the data is also protected by using a cryptography technology, so that the data stored on the block chain is prevented from being tampered by the block chain technology.
In this embodiment, the function of making the data non-falsifiable in step S1 is embodied as data security and authenticity of the IT asset data.
The invention has the following effects: according to the invention, through carrying out non-tampering processing, traceable processing, credibility processing and early warning and monitoring processing on the data of the IT assets, the non-tampering of the data of the IT assets is realized, the data is conveniently and truly traced, the credibility of the data of the IT assets is realized, and the consistency and the integrity of the data are ensured.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (8)
1. An operation method of IT asset data in a data governance platform is characterized by comprising the following steps:
s1, data cannot be tampered: calling a data management platform interface when maintaining the key information of the assets through a service system, synchronizing the latest IT asset data to a data management platform in real time, and enabling the data management platform to realize the chaining of the IT asset data through an integrated block chain module so as to realize non-tampering through a block chain technology;
s2, enabling data to be traceable: integrating external business system data upwards through the data management platform, integrating the functions of the blockchain modules downwards, and linking the external business system data through the functions of the data management platform integrated blockchain modules to ensure that the data is real and effective and cannot be falsified, so that the purpose of real traceability is achieved by checking the data on the blockchain through the data management platform integrated blockchain modules;
s3, making the data credible: data stored in a block chain system is trusted by storing the data of the block chain in a distributed manner and encrypting the data through mechanisms of various consensus algorithms, and the data is strongly mapped by combining the data of an IT asset service system and the data of the block chain through a data management platform in combination with the property that the data cannot be tampered on the block chain and the traceable property, so that the data of the IT asset is trusted;
s4, data can be early-warned and monitored: the method comprises the steps of integrating external business data through a data management platform, establishing data credibility and traceability after integrating a block chain module, guaranteeing the consistency and integrity of the data on the basis of non-tampering, monitoring whether the asset data of the external business system is consistent with the block chain data through a data verification service mode of the data management platform in a timing running mode, synchronizing early warning to related business personnel if the asset data is inconsistent with the block chain data, carrying out approval by the related business personnel, writing back the data to the related system if the approval is refused, and chaining the data to the block chain through the data management platform integrated block chain module.
2. The method of claim 1 for operating IT asset data on a data governance platform, wherein: the specific processing procedure for making the data non-falsifiable in S1 is as follows: when the IT assets are input into the business system, simultaneously calling a data governance platform interface to be synchronized to a data governance platform, and linking data in a chain mode through an interface of a data governance platform integrated block chain module; when the IT assets are changed randomly, the changed conditions are linked by calling the data governance platform interface and the data governance platform integrated block chain module interface, and once the data are linked, the data are ensured not to be tampered.
3. The method of claim 1 for operating IT asset data on a data governance platform, wherein: in the S1, a tamper-proof manner is used in the process of making data non-tamper, and the tamper-proof manner is to add, modify, and delete data of the asset management system and then synchronize the data to the data management platform, link asset data on the data management platform to ensure real-time and accuracy of block chain data, find a tamper source through a post comparison manner after the service system is tampered, and notify a service staff of approval and timely processing through the early warning information of the data management platform.
4. The method of claim 1 for operating IT asset data on a data governance platform, wherein: in S1, a blockchain tamper-resistant manner is used in the process of making data non-tamperable, and the blockchain tamper-resistant manner is to use a blockchain storage structure, so that each block is connected to a previous block and another previous block through a hash algorithm, if the content of the previous block is unknown, the current block cannot be generated, if the content of data in a block is to be tampered with, the data to be tampered with is not only the block but also includes all blocks after the block, i.e., all data histories from the block backward, and the data not only exists on a server on a single side but all the blockchain nodes in the service network, and the data is protected by using a cryptography technology, so that the data stored in the blockchain is tamper-resistant through the blockchain technology.
5. The method of claim 1 for operating IT asset data on a data governance platform, wherein: the function of making the data non-falsifiable in S1 is embodied as data security and authenticity of IT asset data.
6. The method of claim 1 for operating IT asset data on a data governance platform, wherein: in the step S3, making the data trusted also requires building a middleware service through a blockchain system, so as to provide a reliable, secure, and trusted distributed ledger technology support platform for data storage.
7. The method of claim 1 for operating IT asset data on a data governance platform, wherein: the data verification service mode in S4 is that the data governance platform periodically compares the blockchain data with the IT asset business data in batches, actively discovers tampered data, and the nightly batch user data comparison system periodically compares the data about the IT asset and the blockchain database data in the asset management system, the financial management system, and the IT asset operation and maintenance management mobile application every day, actively discovers tampered data, and notifies the customer of the comparison result through the alarm platform, the database, and the mail system after generating the comparison result.
8. The method of claim 1 for operating IT asset data on a data governance platform, wherein: the specific processing procedure of the data verification service mode in S4 is as follows: when the IT assets are illegally tampered, the system finds that the data are tampered, tampered information is displayed in an interface of a data management platform in a message notification mode and is displayed in a message list of the data management platform to check the tampering prompt, the system classifies the types and types of the messages, and then filtering and searching are carried out according to the IT asset management types and time; the specific display information is as follows: the specific data field that was tampered with, the discovery time, the last system change time, and the last change user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110082891.XA CN112883431A (en) | 2021-01-21 | 2021-01-21 | Method for operating IT asset data on data management platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110082891.XA CN112883431A (en) | 2021-01-21 | 2021-01-21 | Method for operating IT asset data on data management platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112883431A true CN112883431A (en) | 2021-06-01 |
Family
ID=76051556
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110082891.XA Pending CN112883431A (en) | 2021-01-21 | 2021-01-21 | Method for operating IT asset data on data management platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112883431A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113672972A (en) * | 2021-07-01 | 2021-11-19 | 国网浙江省电力有限公司建设分公司 | Important asset safety monitoring method based on middleboxes |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170124464A1 (en) * | 2015-10-28 | 2017-05-04 | Fractal Industries, Inc. | Rapid predictive analysis of very large data sets using the distributed computational graph |
CN107122477A (en) * | 2017-05-02 | 2017-09-01 | 成都中远信电子科技有限公司 | A kind of block chain storage system |
CN110689433A (en) * | 2019-09-26 | 2020-01-14 | 上海克而瑞信息技术有限公司 | Resource management information service system, method and device based on alliance chain |
CN111177275A (en) * | 2020-01-02 | 2020-05-19 | 肖光昱 | Block chain-based management method, terminal, device and storage medium |
CN111259070A (en) * | 2019-11-28 | 2020-06-09 | 国网山东省电力公司 | Method and related device for storing and acquiring service data |
CN111431940A (en) * | 2020-04-28 | 2020-07-17 | 安徽农业大学 | Block chain technology-based dry fruit supply chain information tamper-proof implementation method |
CN111444277A (en) * | 2020-03-31 | 2020-07-24 | 中国刑事警察学院 | Anti-terrorist information collaborative sharing platform and method based on block chain technology |
-
2021
- 2021-01-21 CN CN202110082891.XA patent/CN112883431A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170124464A1 (en) * | 2015-10-28 | 2017-05-04 | Fractal Industries, Inc. | Rapid predictive analysis of very large data sets using the distributed computational graph |
CN107122477A (en) * | 2017-05-02 | 2017-09-01 | 成都中远信电子科技有限公司 | A kind of block chain storage system |
CN110689433A (en) * | 2019-09-26 | 2020-01-14 | 上海克而瑞信息技术有限公司 | Resource management information service system, method and device based on alliance chain |
CN111259070A (en) * | 2019-11-28 | 2020-06-09 | 国网山东省电力公司 | Method and related device for storing and acquiring service data |
CN111177275A (en) * | 2020-01-02 | 2020-05-19 | 肖光昱 | Block chain-based management method, terminal, device and storage medium |
CN111444277A (en) * | 2020-03-31 | 2020-07-24 | 中国刑事警察学院 | Anti-terrorist information collaborative sharing platform and method based on block chain technology |
CN111431940A (en) * | 2020-04-28 | 2020-07-17 | 安徽农业大学 | Block chain technology-based dry fruit supply chain information tamper-proof implementation method |
Non-Patent Citations (2)
Title |
---|
岳勇等: "数字技术赋能供应链金融的应用研究", 《网络空间安全》 * |
龚炜: "区块链在政务领域中的应用", 《电子技术与软件工程》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113672972A (en) * | 2021-07-01 | 2021-11-19 | 国网浙江省电力有限公司建设分公司 | Important asset safety monitoring method based on middleboxes |
CN113672972B (en) * | 2021-07-01 | 2024-04-05 | 国网浙江省电力有限公司建设分公司 | Important asset safety monitoring method based on middle platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190156429A1 (en) | Hierarchical meta-ledger transaction recording | |
US11949691B2 (en) | Malicious peer identification | |
CN111177080B (en) | Knowledge graph storage and verification method based on block chain and IPFS | |
US11943237B2 (en) | Malicious peer identification for database block sequence | |
US11200260B2 (en) | Database asset fulfillment chaincode deployment | |
US11593316B2 (en) | Database snapshot for managing state synchronization | |
CN110266872B (en) | Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium | |
TWI706283B (en) | Block chain-based traffic statistics method, device and equipment | |
US11050822B2 (en) | Secure data dissemination | |
CN114564757A (en) | Data auditing method, device and equipment of block chain and readable storage medium | |
US20220237326A1 (en) | System and method for certifying integrity of data assets | |
US11475401B2 (en) | Computation of supply-chain metrics | |
US20210166188A1 (en) | Computation of supply-chain metrics | |
CN115329381A (en) | Sensitive data-based analysis and early warning method and device, computer equipment and medium | |
US20230198771A1 (en) | Systems and methods for providing secure internet of things data notifications using blockchain | |
CN112883431A (en) | Method for operating IT asset data on data management platform | |
CN114925391A (en) | Method and device for monitoring circulation of private information, electronic equipment and storage medium | |
Huang | A blockchain-based framework for secure log storage | |
US11379474B2 (en) | Computation of containment relationships | |
CN113011960A (en) | Block chain-based data access method, device, medium and electronic equipment | |
CN112949985B (en) | Power grid engineering supervision method and device based on block chain and computer equipment | |
CN114626849A (en) | Data protection method and protection device based on block chain | |
CN114491661A (en) | Log tamper-proofing method and system based on block chain | |
US20210248271A1 (en) | Document verification | |
D'Antonio et al. | Data Provenance for healthcare: a blockchain-based approach |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210601 |