CN113010716A - Data asset transaction method for power transmission line inspection data and computer readable medium - Google Patents

Data asset transaction method for power transmission line inspection data and computer readable medium Download PDF

Info

Publication number
CN113010716A
CN113010716A CN202110329182.7A CN202110329182A CN113010716A CN 113010716 A CN113010716 A CN 113010716A CN 202110329182 A CN202110329182 A CN 202110329182A CN 113010716 A CN113010716 A CN 113010716A
Authority
CN
China
Prior art keywords
data
transaction
node
state
transmission line
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110329182.7A
Other languages
Chinese (zh)
Inventor
何冰
谢小松
孟夏卿
王浩洋
余快
陈博
张伟
霍良安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Shanghai Electric Power Co Ltd
Original Assignee
State Grid Shanghai Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Shanghai Electric Power Co Ltd filed Critical State Grid Shanghai Electric Power Co Ltd
Priority to CN202110329182.7A priority Critical patent/CN113010716A/en
Publication of CN113010716A publication Critical patent/CN113010716A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/55Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention relates to a data asset transaction method and a computer readable medium for power transmission line inspection data, wherein the transaction method comprises the following steps: acquiring video information of a polling picture; carrying out classified encryption and making a unique identifier; performing data encapsulation uplink; if a transaction instruction input by a user is received, inquiring the block information to confirm the right of the picture or the video of the current transaction, and paying by a token to obtain a decrypted hash value; and if the decrypted hash value obtained by the buyer is matched with the encrypted hash value of the seller and the seller has ownership of the picture or the video, performing transaction, writing transaction information into the block for packaging, and otherwise, directly ending the current transaction. Compared with the prior art, the method has the advantages of automatically confirming the attribution of the data property rights, realizing routing inspection data circulation, being safe and reliable and the like.

Description

Data asset transaction method for power transmission line inspection data and computer readable medium
Technical Field
The invention relates to the technical field of transmission line inspection data transaction methods, in particular to a data asset transaction method and a computer readable medium for transmission line inspection data.
Background
At present, the inspection of the power transmission line is gradually changed from the original manual inspection to the machine inspection, and an inspection robot, a camera, an infrared camera and other electronic devices are adopted to acquire images or videos of the power transmission line, and then the images are processed through technologies such as a neural network and the like to obtain an inspection result.
A large amount of pictures and video data can be generated in the power transmission line inspection process, the pictures and the video data comprise inspection data uploaded by social personnel, monitoring data of fixed hidden dangers, inspection jigsaw data shot by an unmanned aerial vehicle and the like, the pictures and the video data are read and used by different main bodies in the whole power transmission line inspection process, and the pictures and the video data also become data assets of a power company, have economic attributes and can be shared by the society to generate higher value.
But the property right of the data resource is unknown at present, so that the problem of ownership dispute in the use process of the data can be caused; on the other hand, the security of data cannot be guaranteed, and the problems cause that the power company has a large amount of data resources and cannot generate social circulation value.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a data asset transaction method and a computer readable medium which can automatically confirm the attribution of data property rights and realize the routing inspection data circulation and are safe and reliable for the routing inspection data of the power transmission line.
The purpose of the invention can be realized by the following technical scheme:
a data asset transaction method for power transmission line inspection data comprises the following steps:
step 1: acquiring power transmission line inspection data uploaded by a user side, namely inspection picture video information;
step 2: classifying and encrypting the picture video information obtained in the step 1, and making a unique identifier;
and step 3: performing data packaging and chain loading on the classified and encrypted picture videos;
and 4, step 4: judging whether a transaction instruction input by a user is obtained, if so, executing a step 5, and if not, repeatedly executing a step 4;
and 5: inquiring the block information to confirm the picture or video right of the current transaction and paying in a token mode to obtain a decrypted hash value;
step 6: and if the decrypted hash value obtained by the buyer is matched with the encrypted hash value of the seller and the seller has ownership of the picture or the video, performing transaction, writing transaction information into the block for packaging, otherwise, directly ending the current transaction, and returning to the step 4.
Preferably, the step 1 specifically comprises:
the power transmission line operation and maintenance platform acquires picture video information submitted by a user side, wherein the picture video information comprises picture video attribute information, routing inspection event information, picture video photographer information, geographical position information and equipment ownership information.
Preferably, the step 2 specifically comprises:
and the power transmission line operation and maintenance platform performs classified encryption and data desensitization on the obtained picture video information, classifies the data into a shared type and an internal type, makes a unique identifier, and finally issues a certificate for a data owner.
Preferably, the step 3 specifically comprises:
performing data encapsulation and uplink on the classified and encrypted picture videos by using a block chain technology, wherein the data encapsulation and uplink method comprises the following steps:
step 3-1: adding a digital watermark encryption stamp of ownership to the picture video;
step 3-2: and performing fuzzification processing on the picture video to finish the encryption of the picture video.
Preferably, the step 5 specifically comprises:
the power transmission line operation and maintenance platform provides an interface for a data demander, and the data demander inquires required data information through the interface;
firstly, reading the fuzzified picture video corresponding to the required data, then inquiring the transaction information of the required data in the block, wherein the transaction information comprises unique data representation, encrypted hash value of the last transaction, a payment address, a receiving address and a transaction type, then obtaining the fuzzified picture video with an encrypted stamp, and finally paying and obtaining the decrypted hash value in a token mode.
Preferably, the step 6 specifically includes:
if the decrypted hash value obtained by the buyer is matched with the encrypted hash value of the seller and the seller has ownership of the picture video, performing transaction, writing transaction information into a block for packaging, obtaining a token generated in the transaction by an asset owner in the last transaction, and enabling the asset ownership to a new buyer;
and if the decryption hash value obtained by the buyer does not match the encrypted hash value of the seller, or the seller does not have ownership of the picture video, directly ending the transaction.
More preferably, the step 6 further comprises:
and if the competition of a plurality of nodes is met, selecting the node user with the highest credit value in the nodes with high competition advantage to trade.
More preferably, the method for acquiring the credit value comprises the following steps:
the credit value is specifically a credit accumulation value of a node, the credit accumulation value is initialized to 50 for the node which is accessed for the first time in a percentile counting mode, all the nodes can vote and evaluate the uploaded picture video, and the evaluation score is embodied as an additional value of the data asset and is also embodied as the credit accumulation value of the owner of the picture video.
More preferably, the node competition advantage is judged by a node state, specifically:
the node states comprise an N state node, a G state node, an E state node and a V state node, and respectively correspond to the NORMAL state, the GOOD state, the EXCEPTION state and the VICIOUS state of the nodes;
the newly entered node is distributed to be in an N state by default, when the number of times of effective blocks generated by the node is larger than a preset threshold value, the node in the N state is upgraded to be in a G state, and the node in the G state has competition advantages in node competition;
when the node generates an invalid block, the state is degraded to an E state, and the E state node has competition disadvantage in node competition;
when the number of invalid blocks generated by the nodes exceeds a preset threshold value, the high nodes are adjusted to be in a V state, and the nodes in the V state are forbidden to participate in node election within a period of time and cannot participate in the transaction of the picture video use right.
A computer readable medium storing a data asset transaction method for transmission line inspection data according to any one of the preceding claims.
Compared with the prior art, the invention has the following beneficial effects:
the method comprises the following steps of automatically determining the attribution of routing inspection data property rights, and realizing the circulation of routing inspection data: the data asset transaction method of the power transmission line inspection data writes data transaction information into a block, automatically confirms the ownership of the data in the whole transaction process, monitors and determines a first subject of data collection as an owner of the data by an inspection center, and classifies, encrypts, encapsulates, chains and shares the data to realize social circulation of the data assets.
Secondly, safety and reliability: the data asset transaction method for the power transmission line inspection data adopts the block chain technology to package and chain the data, and a credit mechanism is also introduced in the transaction process, so that the reliability of data transaction is ensured; meanwhile, a voting mechanism is introduced, so that abnormal nodes in the agent nodes can be removed quickly, and the safety of data is ensured.
Drawings
FIG. 1 is a flow diagram illustrating a data asset transaction method of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, shall fall within the scope of protection of the present invention.
A data asset transaction method of transmission line inspection data, the flow of which is shown in figure 1, comprises the following steps:
step 1: the method comprises the following steps of acquiring power transmission line inspection data uploaded by a user side, namely, image video information of inspection, and specifically:
the method comprises the steps that a power transmission line operation and maintenance platform obtains picture video information submitted by a user side, wherein the picture video information comprises picture video attribute information, routing inspection event information, picture video photographer information, geographical position information, equipment ownership information and the like;
step 2: classifying and encrypting the picture video information obtained in the step 1, and making a unique identifier, specifically:
the power transmission line operation and maintenance platform carries out classified encryption and data desensitization on the obtained picture video information, classifies the data into a shared type and an internal type, makes a unique identifier and finally issues a certificate for a data owner;
and step 3: carrying out data encapsulation and uplink on the classified and encrypted picture videos, specifically comprising the following steps:
performing data encapsulation and uplink on the classified and encrypted picture videos by using a block chain technology, wherein the data encapsulation and uplink method comprises the following steps:
step 3-1: adding a digital watermark encryption stamp of ownership to the picture video;
step 3-2: fuzzification processing is carried out on the picture video, and the encryption of the picture video is completed;
and 4, step 4: judging whether a transaction instruction input by a user is obtained, if so, executing a step 5, and if not, repeatedly executing a step 4;
and 5: inquiring the block information to confirm the right of the picture or the video of the current transaction, and paying by a token to obtain a decrypted hash value, specifically:
the power transmission line operation and maintenance platform provides an interface for a data demander, and the data demander inquires required data information through the interface;
firstly, reading a fuzzified picture video corresponding to required data, then inquiring transaction information of the required data in a block, wherein the transaction information comprises unique data representation, an encrypted hash value of the last transaction, a payment address, a receiving address and a transaction type, then obtaining the fuzzified picture video with an encrypted stamp, and finally paying in a token manner and obtaining a decrypted hash value;
the transaction type comprises ownership purchase and disconnection, and a receiving address of the previous transaction has data ownership;
step 6: if the decrypted hash value obtained by the buyer is matched with the hash value encrypted by the seller and the seller has ownership of the picture or the video, performing transaction, writing transaction information into a block for packaging, otherwise, directly ending the current transaction, and returning to the step 4;
the step 6 specifically comprises the following steps:
if the decrypted hash value obtained by the buyer is matched with the encrypted hash value of the seller and the seller has ownership of the picture video, performing transaction, writing transaction information into a block for packaging, obtaining a token generated in the transaction by an asset owner in the last transaction, and enabling the asset ownership to a new buyer;
and if the decryption hash value obtained by the buyer does not match the encrypted hash value of the seller, or the seller does not have ownership of the picture video, directly ending the transaction.
When the transaction is carried out, if a plurality of node competitions are met, the node user with the highest credit value in the nodes with high competitive advantage is selected to carry out the transaction. A credit mechanism is introduced into the data transaction process to ensure the reliability of the data transaction.
The method for acquiring the credit value comprises the following steps:
the credit value is specifically a credit accumulation value of a node, the credit accumulation value is initialized to 50 for the node which is accessed for the first time in a percentile counting mode, all the nodes can vote and evaluate the uploaded picture video, and the evaluation score is embodied as an additional value of the data asset and is also embodied as the credit accumulation value of the owner of the picture video. The node divides the voting of the picture and the video into a vote approval mode and a vote disapproval mode, and the abnormal node in the agent node can be eliminated quickly by introducing a voting mechanism into the data transaction process, so that the safety of the system is improved, and the optimization of the selection condition is combined.
The node competition advantage is judged by the node state, and the method specifically comprises the following steps:
the node states comprise an N state node, a G state node, an E state node and a V state node, and respectively correspond to the NORMAL state, the GOOD state, the EXCEPTION state and the VICIOUS state of the nodes;
the newly entered node is distributed to be in an N state by default, when the number of times of effective blocks generated by the node is larger than a preset threshold value, the node in the N state is upgraded to be in a G state, and the node in the G state has competition advantages in node competition;
when the node generates an invalid block, the state is degraded to an E state, and the E state node has competition disadvantage in node competition;
when the number of invalid blocks generated by the nodes exceeds a preset threshold value, the high nodes are adjusted to be in a V state, and the nodes in the V state are forbidden to participate in node election within a period of time and cannot participate in the transaction of the picture video use right.
The whole transaction process can be monitored through the inspection center platform.
The present embodiment also relates to a computer readable medium storing any of the above asset data asset transaction methods.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A data asset transaction method for power transmission line inspection data is characterized by comprising the following steps:
step 1: acquiring power transmission line inspection data uploaded by a user side, namely inspection picture video information;
step 2: classifying and encrypting the picture video information obtained in the step 1, and making a unique identifier;
and step 3: performing data packaging and chain loading on the classified and encrypted picture videos;
and 4, step 4: judging whether a transaction instruction input by a user is obtained, if so, executing a step 5, and if not, repeatedly executing a step 4;
and 5: inquiring the block information to confirm the picture or video right of the current transaction and paying in a token mode to obtain a decrypted hash value;
step 6: and if the decrypted hash value obtained by the buyer is matched with the encrypted hash value of the seller and the seller has ownership of the picture or the video, performing transaction, writing transaction information into the block for packaging, otherwise, directly ending the current transaction, and returning to the step 4.
2. The data asset transaction method for the transmission line inspection data according to claim 1, wherein the step 1 specifically comprises:
the power transmission line operation and maintenance platform acquires picture video information submitted by a user side, wherein the picture video information comprises picture video attribute information, routing inspection event information, picture video photographer information, geographical position information and equipment ownership information.
3. The data asset transaction method for the transmission line inspection data according to claim 1, wherein the step 2 specifically comprises:
and the power transmission line operation and maintenance platform performs classified encryption and data desensitization on the obtained picture video information, classifies the data into a shared type and an internal type, makes a unique identifier, and finally issues a certificate for a data owner.
4. The data asset transaction method of the transmission line inspection data according to claim 1, wherein the step 3 specifically comprises:
performing data encapsulation and uplink on the classified and encrypted picture videos by using a block chain technology, wherein the data encapsulation and uplink method comprises the following steps:
step 3-1: adding a digital watermark encryption stamp of ownership to the picture video;
step 3-2: and performing fuzzification processing on the picture video to finish the encryption of the picture video.
5. The data asset transaction method of the transmission line inspection data according to claim 1, wherein the step 5 specifically comprises:
the power transmission line operation and maintenance platform provides an interface for a data demander, and the data demander inquires required data information through the interface;
firstly, reading the fuzzified picture video corresponding to the required data, then inquiring the transaction information of the required data in the block, wherein the transaction information comprises unique data representation, encrypted hash value of the last transaction, a payment address, a receiving address and a transaction type, then obtaining the fuzzified picture video with an encrypted stamp, and finally paying and obtaining the decrypted hash value in a token mode.
6. The data asset transaction method of the transmission line inspection data according to claim 1, wherein the step 6 specifically comprises:
if the decrypted hash value obtained by the buyer is matched with the encrypted hash value of the seller and the seller has ownership of the picture video, performing transaction, writing transaction information into a block for packaging, obtaining a token generated in the transaction by an asset owner in the last transaction, and enabling the asset ownership to a new buyer;
and if the decryption hash value obtained by the buyer does not match the encrypted hash value of the seller, or the seller does not have ownership of the picture video, directly ending the transaction.
7. The data asset transaction method of transmission line inspection data according to claim 6, wherein the step 6 further comprises:
and if the competition of a plurality of nodes is met, selecting the node user with the highest credit value in the nodes with high competition advantage to trade.
8. The data asset transaction method of the transmission line inspection data according to claim 7, wherein the credit value obtaining method comprises the following steps:
the credit value is specifically a credit accumulation value of a node, the credit accumulation value is initialized to 50 for the node which is accessed for the first time in a percentile counting mode, all the nodes can vote and evaluate the uploaded picture video, and the evaluation score is embodied as an additional value of the data asset and is also embodied as the credit accumulation value of the owner of the picture video.
9. The data asset transaction method for the power transmission line inspection data according to claim 8, wherein the node competitive advantage is judged through a node state, specifically:
the node states comprise an N state node, a G state node, an E state node and a V state node, and respectively correspond to the NORMAL state, the GOOD state, the EXCEPTION state and the VICIOUS state of the nodes;
the newly entered node is distributed to be in an N state by default, when the number of times of effective blocks generated by the node is larger than a preset threshold value, the node in the N state is upgraded to be in a G state, and the node in the G state has competition advantages in node competition;
when the node generates an invalid block, the state is degraded to an E state, and the E state node has competition disadvantage in node competition;
when the number of invalid blocks generated by the nodes exceeds a preset threshold value, the high nodes are adjusted to be in a V state, and the nodes in the V state are forbidden to participate in node election within a period of time and cannot participate in the transaction of the picture video use right.
10. A computer readable medium storing a data asset transaction method for transmission line inspection data according to any one of claims 1 to 9.
CN202110329182.7A 2021-03-27 2021-03-27 Data asset transaction method for power transmission line inspection data and computer readable medium Pending CN113010716A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110329182.7A CN113010716A (en) 2021-03-27 2021-03-27 Data asset transaction method for power transmission line inspection data and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110329182.7A CN113010716A (en) 2021-03-27 2021-03-27 Data asset transaction method for power transmission line inspection data and computer readable medium

Publications (1)

Publication Number Publication Date
CN113010716A true CN113010716A (en) 2021-06-22

Family

ID=76408137

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110329182.7A Pending CN113010716A (en) 2021-03-27 2021-03-27 Data asset transaction method for power transmission line inspection data and computer readable medium

Country Status (1)

Country Link
CN (1) CN113010716A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116484437A (en) * 2023-06-20 2023-07-25 矩阵纵横设计股份有限公司 Asset information management method and device and computer equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106815728A (en) * 2017-01-03 2017-06-09 北京供销科技有限公司 A kind of big data based on block chain technology really weighs method and system
US20180096347A1 (en) * 2016-09-30 2018-04-05 Cable Television Laboratories, Inc Systems and methods for securely tracking consumable goods using a distributed ledger
CN110046999A (en) * 2019-02-28 2019-07-23 阿里巴巴集团控股有限公司 Block chain method of commerce and device
CN111340590A (en) * 2020-02-25 2020-06-26 成都即速网络科技有限公司 Collaborative operation method based on electronic commerce and distributed resale platform thereof
CN111355810A (en) * 2020-03-17 2020-06-30 重庆邮电大学 Improved PBFT consensus method based on credit and voting mechanism
CN111538784A (en) * 2020-04-21 2020-08-14 全球能源互联网研究院有限公司 Block chain-based digital asset transaction method and device and storage medium
CN112085551A (en) * 2019-06-14 2020-12-15 华为技术有限公司 Transaction method based on block chain and related equipment
CN112116475A (en) * 2020-09-22 2020-12-22 中国科学院沈阳计算技术研究所有限公司 Block chain-based distributed data transaction method and system
CN112348717A (en) * 2020-11-25 2021-02-09 山东师范大学 Knowledge uplink and acquisition method and system based on block chain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180096347A1 (en) * 2016-09-30 2018-04-05 Cable Television Laboratories, Inc Systems and methods for securely tracking consumable goods using a distributed ledger
CN106815728A (en) * 2017-01-03 2017-06-09 北京供销科技有限公司 A kind of big data based on block chain technology really weighs method and system
CN110046999A (en) * 2019-02-28 2019-07-23 阿里巴巴集团控股有限公司 Block chain method of commerce and device
CN112085551A (en) * 2019-06-14 2020-12-15 华为技术有限公司 Transaction method based on block chain and related equipment
CN111340590A (en) * 2020-02-25 2020-06-26 成都即速网络科技有限公司 Collaborative operation method based on electronic commerce and distributed resale platform thereof
CN111355810A (en) * 2020-03-17 2020-06-30 重庆邮电大学 Improved PBFT consensus method based on credit and voting mechanism
CN111538784A (en) * 2020-04-21 2020-08-14 全球能源互联网研究院有限公司 Block chain-based digital asset transaction method and device and storage medium
CN112116475A (en) * 2020-09-22 2020-12-22 中国科学院沈阳计算技术研究所有限公司 Block chain-based distributed data transaction method and system
CN112348717A (en) * 2020-11-25 2021-02-09 山东师范大学 Knowledge uplink and acquisition method and system based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116484437A (en) * 2023-06-20 2023-07-25 矩阵纵横设计股份有限公司 Asset information management method and device and computer equipment
CN116484437B (en) * 2023-06-20 2024-03-29 矩阵纵横设计股份有限公司 Asset information management method and device and computer equipment

Similar Documents

Publication Publication Date Title
US20230044059A1 (en) Systems and methods for digital asset security ecosystems
CN108197891B (en) Electronic signing device and method based on block chain
CN110766406B (en) Resource transfer method, resource transfer device, storage medium and electronic equipment
CN111008709A (en) Federal learning and data risk assessment method, device and system
CN108985772A (en) A kind of verification method, device, equipment and the storage medium of block chain
CN114780868B (en) Method and system for generating virtual avatar by user tag of metauniverse
CN103177201A (en) Content security in a social network
US11244032B1 (en) System and method for the creation and the exchange of a copyright for each AI-generated multimedia via a blockchain
CN104349135A (en) Surveillance server, method of processing data of surveillance server, and surveillance system
CN110321671A (en) Transaction system, method, apparatus and the electronic equipment of picture based on block chain
JP2005512250A5 (en)
Lidkea et al. Convolutional neural network framework for encrypted image classification in cloud-based ITS
CN112613877A (en) Intelligent contract triggering method and device applied to block chain network and related equipment
CN111400745A (en) Picture management method and device and electronic equipment
CN113010716A (en) Data asset transaction method for power transmission line inspection data and computer readable medium
US20210097894A1 (en) Method and system for selectively encrypting dataset
CN116502187B (en) Digital copyright protection system and method based on block chain
KR102365589B1 (en) Method and apparatus for detecting abuse based on log information in closed-circuit television integrated management system
CN115114667A (en) Privacy information processing and classifying method and device for security chip
CN116670702A (en) Information management method and information management program
CN115114642A (en) Financing lease verification method, device and equipment based on under-chain trusted computing
CN109218320B (en) Website link security verification method and device, computer equipment and storage medium
CN116611093B (en) Method and equipment for authorizing use of database resources
US20220366417A1 (en) Method and apparatus for providing non-face-to-face used goods transaction service
Tahir et al. Privacy Preserved Video Summarization of Road Traffic Events for IoT Smart Cities. Cryptography 2023, 7, 7

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210622

RJ01 Rejection of invention patent application after publication