CN113609531A - Block chain based information interaction method, device, equipment, medium and product - Google Patents
Block chain based information interaction method, device, equipment, medium and product Download PDFInfo
- Publication number
- CN113609531A CN113609531A CN202110917871.XA CN202110917871A CN113609531A CN 113609531 A CN113609531 A CN 113609531A CN 202110917871 A CN202110917871 A CN 202110917871A CN 113609531 A CN113609531 A CN 113609531A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- storage unit
- blockchain network
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000003993 interaction Effects 0.000 title claims abstract description 84
- 238000000034 method Methods 0.000 title claims abstract description 77
- 238000012986 modification Methods 0.000 claims description 27
- 230000004048 modification Effects 0.000 claims description 27
- 238000004590 computer program Methods 0.000 claims description 21
- 238000012795 verification Methods 0.000 claims description 12
- 230000007246 mechanism Effects 0.000 claims description 9
- 230000006870 function Effects 0.000 description 18
- 238000010586 diagram Methods 0.000 description 16
- 238000004891 communication Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 11
- 230000015654 memory Effects 0.000 description 10
- 238000012545 processing Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 238000010276 construction Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000007792 addition Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000000717 retained effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000000586 desensitisation Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The disclosure provides an information interaction method based on a block chain, which can be applied to the technical field of the block chain. The information interaction method comprises the following steps: according to the access request of the user, accessing the user into a block chain network matched with the access request in a plurality of block chain networks; when a user accesses a first block chain network, a first operation authority is granted to the user, so that the user can inquire and modify information stored in a first storage unit; when the user accesses the second block chain network, a second operation authority is granted to the user, so that the user can inquire the information stored in the second storage unit; and carrying out authority identification on the node of the user, and granting a third operation authority to the user according to the identification result, so that the user can modify the information which is stored in the second storage unit and is matched with the node of the user. The disclosure also provides an information interaction device, an apparatus, a storage medium and a program product.
Description
Technical Field
The present disclosure relates to the field of blockchains, and in particular, to a method, an apparatus, a device, a storage medium, and a program product for information interaction based on blockchains.
Background
The demand interaction system is an important tool for communication between the client and the enterprise. Through the demand interaction system, the demands put forward by the customers can be transmitted to the enterprise, and the enterprise can feed back according to the demands put forward by the customers, so that interaction is realized.
However, in order to implement functions such as certificate storage and security verification, some specific links need to be set in the current demand interaction system, which results in information exchange and redundant opinion feedback processes among members of each part, and the information transmission efficiency is low.
Disclosure of Invention
In view of the foregoing, the present disclosure provides a method, an apparatus, a device, a storage medium, and a program product for blockchain-based information interaction that improve information transfer efficiency.
According to a first aspect of the present disclosure, an information interaction method based on a block chain is provided, which is applied to an information interaction apparatus, wherein the information interaction apparatus includes: the information storage center comprises a first storage unit and a second storage unit, the first storage unit is used for storing information written by nodes in the first blockchain network, and the second storage unit is used for storing information written by nodes in the second blockchain network; the information interaction method comprises the following steps:
accessing the user to a block chain network matched with the access request in the plurality of block chain networks according to the access request of the user;
when the user accesses the first blockchain network, the information interaction method further comprises the following steps:
granting a first operation authority to a user, wherein the first operation authority is configured to enable the user to inquire and modify the information stored in the first storage unit;
when the user accesses the second blockchain network, the information interaction method further comprises the following steps:
granting a second operation authority to the user, wherein the second operation authority is configured to enable the user to inquire the information stored in the second storage unit; and the number of the first and second groups,
and carrying out authority identification on the node of the user, and granting a third operation authority to the user according to an identification result, wherein the third operation authority is configured to enable the user to modify the information which is stored in the second storage unit and is matched with the node of the user.
According to the embodiment of the present disclosure, when the user accesses the second blockchain network, the information interaction method further includes:
acquiring a write request of a user, wherein the write request comprises information written by the user and first identification information, and the first identification information is used for identifying the identity of a node sending the write request;
storing the first identification information and information written by a user to the second storage unit to obtain first information;
the step of carrying out authority identification on the node of the user and granting a third operation authority to the user according to the identification result comprises the following steps:
acquiring a modification request of a user and first information corresponding to the modification request, which is stored in a second storage unit, wherein the modification request comprises second identification information, and the second identification information is used for identifying the identity of a node sending the modification request;
and when the second identification information is matched with the first identification information of the first information corresponding to the modification request, granting the third operation permission to the user.
According to the embodiment of the present disclosure, when the user accesses the second blockchain network, the information interaction method further includes:
verifying the identity of the node of the user before the step of granting the user a second operation right;
and when the identity of the node of the user passes the verification, the user is granted the second operation authority.
According to the embodiment of the present disclosure, when the user accesses the second blockchain network, the information interaction method further includes:
acquiring a registration request of a user;
generating a private key corresponding to a node of a user as first identification information of the node; and the number of the first and second groups,
generating a public key matched with the private key as third identification information;
the step of verifying the identity of the user's node comprises:
and when the first identification information is matched with the third identification information, judging that the identity of the node of the user passes the verification.
According to an embodiment of the present disclosure, the first blockchain network is a public chain network, and the second blockchain network is a alliance chain network.
According to an embodiment of the present disclosure, the consensus mechanism employed by the first blockchain network includes: a stock certificate or a workload certificate; the consensus mechanism employed by the second blockchain network comprises: a practical byzantine fault-tolerant algorithm.
A second aspect of the present disclosure provides an information interaction apparatus, wherein the information interaction apparatus includes: the information storage center comprises a first storage unit and a second storage unit, the first storage unit is used for storing information written by nodes in the first blockchain network, and the second storage unit is used for storing information written by nodes in the second blockchain network;
each of the plurality of blockchain networks comprises:
the access module is used for accessing the user into the block chain network to which the access module belongs when the access request of the user is matched with the block chain network to which the access module belongs;
the first blockchain network comprises: the first authority authentication module is used for granting a first operation authority to a user when the user accesses the first block chain network, wherein the first operation authority is configured to enable the user to inquire and modify information stored in the first storage unit;
the second blockchain network comprises: a second authority authentication module for, when the user accesses the second block chain network,
granting a second operation authority to the user, wherein the second operation authority is configured to enable the user to inquire the information stored in the second storage unit; and carrying out authority identification on the node of the user, and granting a third operation authority to the user according to an identification result, wherein the third operation authority is configured to enable the user to modify the information which is stored in the second storage unit and is matched with the node of the user.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the above-described information interaction method.
The fourth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions, which, when executed by a processor, cause the processor to perform the above-mentioned information interaction method.
The fifth aspect of the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the information interaction method described above.
One or more of the above-described embodiments may provide the following advantages or benefits:
through the characteristics of tamper resistance, traceability and the like of the block chain, redundant links set for realizing functions of certificate storage, safety verification and the like in interaction of all members can be omitted, and the information transmission efficiency among all members is improved. Meanwhile, in the second block chain network, each node can modify the information matched with the node after identity authentication is carried out, so that certain information stored in the second storage unit is prevented from being interfered by other nodes, and the reliability of the information stored in the second storage unit is enhanced.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following description of embodiments of the disclosure, which proceeds with reference to the accompanying drawings, in which:
FIG. 1 schematically illustrates an application scenario diagram of an information interaction method, apparatus, device, medium, and program product according to embodiments of the disclosure;
FIG. 2 schematically shows a schematic diagram of an information interaction device according to an embodiment of the present disclosure;
FIG. 3 schematically shows one of the flow diagrams of an information interaction method according to an embodiment of the present disclosure;
FIG. 4 schematically illustrates a second flow chart of a method of information interaction according to an embodiment of the present disclosure;
FIG. 5 schematically illustrates a flow chart for a user registering in accordance with an embodiment of the disclosure;
FIG. 6 schematically shows a flow diagram of verifying the identity of a node of a user according to an embodiment of the present disclosure;
FIG. 7 schematically shows a flow chart for writing information according to an embodiment of the disclosure;
FIG. 8a is a block diagram schematically illustrating the structure of an information interaction device according to an embodiment of the present disclosure;
fig. 8b schematically shows a block diagram of a second blockchain network according to an embodiment of the present disclosure;
fig. 9 schematically shows a block diagram of an electronic device adapted to implement the information interaction method according to an embodiment of the present disclosure.
Detailed Description
To facilitate understanding of the aspects of the embodiments of the present application, a brief introduction of related concepts is first given as follows:
first, the blockchain technique.
The blockchain technique, also called distributed ledger technique, is an emerging technique for a plurality of computing devices to jointly participate in "accounting" (i.e. recording transaction data), and to jointly maintain a complete distributed database. The blockchain technology has been widely used in many fields due to its characteristics of decentralization (i.e., no central node), transparency of disclosure, participation of each computing device in database recording, and rapid data synchronization among computing devices.
Currently, the blockchain can be divided into: public chains and federation chains. Public chain refers to a blockchain that is readable by any device around the world, or that is a blockchain in which any device can participate in a consensus verification process for a transaction. A federation chain, also called a community block chain (consortium block chains), refers to a federation formed by participating members of a specified block chain, and information about business transactions between the members is recorded in the block chain, which defines the size and right of use.
Second, blockchain nodes.
The blockchain in the embodiments of the present disclosure includes a plurality of blockchain nodes (hereinafter, may be simply referred to as nodes). The node is a device having a communication function and a storage function, such as a device storing block chain data. Each node may receive information and may generate information. Communication and data synchronization is maintained between different nodes by maintaining a common blockchain. Specifically, in the blockchain system, any node may generate new blockchain data according to data related to a transaction sent by a client, and distribute the new blockchain data to other nodes in a broadcast manner, and the other nodes may verify the blockchain data. When all nodes in the blockchain system agree, new blockchain data can be added to the blockchain.
Alternatively, the node in the embodiments of the present disclosure may be understood as a processing unit. In one implementation, a node may be a physical device, such as a server or a computer. In another implementation, the node may be a virtual computer; the virtual machine is a general term for a running environment virtualized by software in all types of virtualization devices, and the concept includes a virtual machine and a container. In other implementations, a node in embodiments of the present disclosure may be a process or a thread; the thread is the minimum unit which can be operated and scheduled by the operating system, is contained in the process and is the actual operation unit in the process; a process is a running activity of a program in a computer on a certain data set, and is a basic unit for resource allocation and scheduling of a system.
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
The embodiment of the disclosure provides an information interaction method based on a block chain, which is applied to an information interaction device, wherein the information interaction device comprises: a plurality of blockchain networks and an information storage center. The information storage center comprises a first storage unit and a second storage unit, the first storage unit is used for storing information written by nodes in the first blockchain network, and the second storage unit is used for storing information written by nodes in the second blockchain network.
The information interaction method provided by the embodiment of the disclosure comprises the following steps: according to the access request of the user, accessing the user into a block chain network matched with the access request in a plurality of block chain networks; when the user accesses the first blockchain network, the information interaction method further comprises the following steps: granting a first operation authority to a user, wherein the first operation authority is configured to enable the user to inquire and modify the information stored in the first storage unit; when the user accesses the second blockchain network, the information interaction method further comprises the following steps: a second operation authority is granted to the user, and the second operation authority is configured to enable the user to inquire the information stored in the second storage unit; and carrying out authority identification on the node of the user, and granting a third operation authority to the user according to an identification result, wherein the third operation authority is configured to enable the user to modify the information which is stored in the second storage unit and is matched with the node of the user.
By adopting the information interaction method of the embodiment of the disclosure, through the characteristics of tamper resistance, traceability and the like of the block chain, redundant links set for realizing functions of certificate storage, safety verification and the like in interaction of each member can be omitted, and the information transmission efficiency among the members is improved. Meanwhile, in the second block chain network, each node can modify the information matched with the node after identity authentication is carried out, so that certain information stored in the second storage unit is prevented from being interfered by other nodes, and the reliability of the information stored in the second storage unit is enhanced.
Fig. 1 schematically shows an application scenario diagram of an information interaction method, apparatus, device, medium and program product according to an embodiment of the present disclosure, and as shown in fig. 1, an application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that, the information interaction method based on the blockchain provided by the embodiment of the present disclosure may be generally performed by the server 105. Accordingly, an information interaction device based on a block chain provided by the embodiment of the present disclosure may be generally disposed in the server 105. The information interaction method based on the blockchain provided by the embodiment of the present disclosure may also be executed by a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Correspondingly, the information interaction device based on the block chain provided by the embodiment of the disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
A block chain based information interaction method according to the disclosed embodiment will be described in detail below with reference to fig. 2 and 3 based on the scenario described in fig. 1.
Fig. 2 schematically shows a schematic diagram of an information interaction device according to an embodiment of the present disclosure, and as shown in fig. 2, the information interaction device includes: a plurality of blockchain networks a and an information storage center B. Wherein the plurality of blockchain networks a includes a first blockchain network a1 and a second blockchain network a2, and the information storage center B includes a first storage unit for storing information written by nodes in the first blockchain network a1 and a second storage unit for storing information written by nodes in the second blockchain network a 2.
Fig. 3 schematically shows one of the flow charts of the information interaction method according to the embodiment of the present disclosure. As shown in fig. 2 and fig. 3, an information interaction based on a block chain of this embodiment includes steps S210 to S240.
In step S210, according to the access request of the user, the user is accessed to a blockchain network matched with the access request in the plurality of blockchain networks. In this step, first, an access request of a user is obtained, and then, the user is accessed to the first block chain network a1 according to the access request of the user; alternatively, the user is accessed to the second blockchain network a2 according to the user's access request.
In the embodiment of the present disclosure, the access request may include a blockchain network that the user wants to access, and a blockchain network that matches the access request in the multiple blockchain networks may refer to a blockchain network that receives the access request in the multiple blockchain networks. Illustratively, when the user wants to access the first blockchain network a1, an access request is sent to the first blockchain network a1, and the user is accessed to the first blockchain network a1 after the access request is obtained by the first blockchain network a 1.
When the user accesses the first blockchain network a1, the first blockchain network a1 may perform step S220. In step S220, a first operation right is granted to the user, and the first operation right is configured to enable the user to query and modify the information stored in the first storage unit.
In some embodiments, the members participating in the first blockchain network a1 and the members participating in the second blockchain network a2 may be determined according to practical applications, and the information interaction method of the embodiments of the present disclosure is described below by taking the example that the members participating in the blockchain network include a unit a and a unit b.
In the disclosed embodiment, each department gate in the second unit interacts through a first blockchain network a 1. The authority of querying and modifying each node in the first blockchain network a1 may be the same, so that departments in the second unit may correspond to the nodes in the first blockchain network a1 one by one, so that each department may query and modify the information stored in the first storage unit, and according to the consensus mechanism of the blockchains, each department may be recorded and stored in the first storage unit when querying and modifying the information stored in the first storage unit, so as to achieve full data backup of all or part of the nodes in the first blockchain network a1, so that each item of editing of any information may be traced back. Meanwhile, when each node is queried and modified, the validity of each node needs to be verified by some or all nodes in the first blockchain, for example, a blockchain network used as proof of mass (Pow) consensus is adopted, and existing data can be possibly tampered by an attack with at least 51% of the total effort, so that the content in the first storage unit can be prevented from being tampered.
When the user accesses the second blockchain network a2, the second blockchain network a2 performs steps S230 and S240.
In step S230, a second operation right is granted to the user, and the second operation right is configured to enable the user to query the information stored in the second storage unit.
In step S240, the node of the user is subjected to authority identification, and a third operation authority is granted to the user according to the identification result, where the third operation authority is configured to enable the user to modify the information, which is stored in the second storage unit and matches with the node of the user, of the user.
In the disclosed embodiment, each department in b unit interacts with a unit a through a second blockchain network a2 in addition to participating in the first blockchain network a 1. The inquiry authority of each node in the second blockchain network a2 is the same, so that the b unit and the a unit can be in one-to-one correspondence with the node of the second blockchain network a2, and all information stored in the second storage unit can be seen by both the b unit and the a unit. The nodes in the second blockchain network a2 can only modify the content matching with them, so as to prevent some information stored in the second storage unit from interfering with other nodes, thereby improving the reliability of the information stored in the second storage unit. Each node in the second blockchain network a2 can only modify the information written by itself, so that the information written by the b unit (or the a unit) to the a unit (or the b unit) can only be viewed and cannot be modified, and at this time, the feedback of the information written by the b unit (or the a unit) to the a unit (or the b unit) can be implemented by writing new content. It should be noted that, in addition to the one-to-one correspondence between the b unit and the node of the first blockchain network a2, each department of the b unit and the node of the second blockchain network a2 may also be one-to-one correspondence, which may be determined specifically according to actual needs, and is not limited herein.
In the following, based on the scenario described in fig. 1, by taking an example that each door in the second unit interacts through the first blockchain network a1, and the second unit and the first unit interact through the second blockchain network a2, a detailed description will be given to an information interaction method based on a blockchain in the disclosed embodiment through fig. 2 and fig. 4 to 7.
In some embodiments, the consensus mechanisms employed by the multiple blockchain networks may include workload proofs (pows), stock rights proofs (PoS), delegation rights and interests proofs (DPoS), and pragmatine fault tolerance (PBFT), among others.
Optionally, the first blockchain network a1 is a public chain network and the second blockchain network a2 is a federation chain network.
Optionally, the consensus mechanism adopted by the first blockchain network a1 includes: the consensus mechanism adopted by the second blockchain network a2 for equity certification or workload certification includes: a practical byzantine fault-tolerant algorithm.
Fig. 4 schematically shows a second flowchart of an information interaction method according to an embodiment of the present disclosure, and as shown in fig. 4, the information interaction method according to the embodiment of the present disclosure includes steps S300 to S360.
In step S300, an access request of a user is acquired.
When the first blockchain network a1 receives an access request of a user, step S310 is performed.
In step S310, the first blockchain network a1 accesses the user to the first blockchain network a1 according to the access request of the user.
In the embodiment of the present disclosure, when the user sends the access request, the user may also send a corresponding operation request, for example, a write request, a modification request, and the like, and when the blockchain network obtains the operation request, the blockchain network executes a corresponding operation.
When the user accesses the first blockchain network a1 and issues a query/modification request to the first blockchain network a1, the query/modification request of the user is acquired, and step S320 is performed.
In step S320, the first blockchain network a1 grants a first operation right to the user to enable the user to view and modify the information stored in the first storage unit.
In some embodiments, the information stored in the first storage unit may be determined according to actual needs, and is not limited herein. For example, the information stored in the first storage unit may include related information currently in a project under construction, and for example, the related information may include project requirements proposed by a unit a and feedback information of the project requirements of various departments in a unit b.
Illustratively, the first unit proposes a project requirement, the project requirement is stored in the first storage unit through the first blockchain network a1, in the first blockchain network a1, each department in the second unit feeds back the project requirement proposed by the first unit, and stores the feedback information in the first storage unit. Optionally, the first blockchain network a1 may classify the feedback information stored in the first storage unit according to the stage of the project, for example, the stage of the project may include a requirement acquisition stage, an analysis stage, a development stage, a verification stage, and the like. The first blockchain network a1 may perform operations such as extracting keywords, semantic recognition, and the like on the feedback information to be stored to determine the type of the feedback information to be stored, and then after allocating corresponding tags to the feedback information to be stored, store the feedback information to be stored in the first storage unit, so that each department in the second unit can view and modify the feedback information at any time.
In the embodiment of the present disclosure, the first blockchain network a1 may further integrate the related information in the first storage unit, and the integrated information may be stored in the second storage unit through the second blockchain network a 2. Wherein the integration of the related information in the first storage unit can be performed by, for example, semantic recognition, classification, or other ways that can occur to those skilled in the art. In the example of modifying the function module three times in total in the research and development stage and the verification stage in the foregoing, the first blockchain network a1 may perform semantic recognition on the related information of the three-time modification process, extract deletion, modification, addition and other operations for each function of the function module, combine and desensitize the deletion, modification, addition and other operations for the same function as one type, and only retain the final result. In this way, the unit a in the second blockchain network a2 can visually see the feedback result, and meanwhile, the leakage of sensitive information inside the unit b in the first storage unit can be avoided.
When the second blockchain network a2 receives the access request of the user, step S330 is performed.
In step S330, the second blockchain network a2 accesses the user to the second blockchain network a2 according to the user' S access request.
When the user accesses the second blockchain network a2 and issues a query request to the second blockchain network a2, the query request of the user is acquired and step S340 is performed.
In step S340, the identity of the user' S node is verified. When the identity of the node of the user is verified, step S350 is performed. When the identity of the user's node is not verified, the query request is denied.
In some embodiments, the identity of the user's node may be verified through an asymmetric encryption algorithm or in other ways that will occur to those of skill in the art. The following describes a process of verifying the identity of a node of a user in the embodiment of the present disclosure by taking an asymmetric encryption algorithm as an example.
In some embodiments, the user registers when accessing the second blockchain network a2 for the first time. Fig. 5 schematically shows a flowchart of registration by a user according to an embodiment of the present disclosure, and as shown in fig. 5, the registration process includes steps S410 to S420.
In step S410, a registration request of a user is acquired.
In step S420, generating a private key corresponding to a node of a user as first identification information of the node; and generating a public key matched with the private key as third identification information.
In the disclosed embodiment, the public key and the private key may be generated according to the secret SM2 algorithm or other asymmetric encryption algorithms that will occur to those skilled in the art. The generated public key is retained by the second blockchain network a2 and the generated private key is retained by the user's node.
Fig. 6 schematically shows a flowchart of verifying the identity of a node of a user according to an embodiment of the present disclosure, and as shown in connection with fig. 4 and 6, step S340 includes step S341 and step S342.
In step S341, first identification information of the node of the user is acquired.
In step S342, when the first identification information matches the third identification information, it is determined that the identity of the node of the user is verified, and step S350 is performed.
In step S350, a second operation right is granted to the user to enable the user to query the information stored in the second storage unit.
In the embodiment of the present disclosure, the information stored in the second storage unit may be determined according to actual needs, and exemplarily, the information stored in the second storage unit may include key information in a project currently under construction, for example, the key information may include information obtained by integrating a project requirement proposed by a first unit and feedback information of each department in a second unit on the project requirement. The process of integrating the feedback information has been described in detail in the foregoing, and thus is not described herein again.
In some embodiments, the second storage unit may store information of completed items in addition to the under-construction items described above. For example, when a project under construction is completed, the project can be classified as a completed project, and information associated with the project in the second storage unit is integrated, such as desensitization, or redundant data is deleted, so that the project is shared between the second unit and the first unit as a history case.
Fig. 7 schematically shows a flowchart for writing information according to an embodiment of the present disclosure, and as shown in fig. 7, in some specific embodiments, when the user accesses the second blockchain network a2, the information interaction method further includes steps S510 to S530.
In step S510, a write request of a user is obtained, where the write request includes information written by the user and first identification information, and the first identification information is used to identify an identity of a node that sends the write request.
In the embodiment of the present disclosure, the first identification information may be the private key generated in step S420, so after step S510, the identity of the node of the user may also be verified, that is, step S520 is performed.
In step S520, determining whether the first identification information matches with the third identification information, determining that the identity of the node of the user passes the verification when the first identification information matches with the third identification information, and performing step S530; and when the first identification information does not match the third identification information, rejecting the write request.
In step S530, the first identification information and the information written by the user are stored in the second storage unit to obtain the first information.
In the embodiment of the present disclosure, the information written by the user may be signed by the first identification information (that is, the private key), and the signed information is stored in the second storage unit, so as to obtain the first information.
In the embodiment of the present disclosure, the public-private key generated by the asymmetric encryption algorithm can not only authenticate the node, but also verify the validity of the information stored in the second storage unit by the node, thereby determining whether the information is tampered in the transmission process. For example, the data to be transmitted is hashed, for example, a Secure Hash Algorithm (SHA) may be used for operation. After receiving the transmitted data, the data receiving end needs to determine whether the data is the data sent by the data sending end and whether the data is tampered in the middle. Therefore, the received data is decrypted by the own public key (the data encrypted by one key in the key pair can be decrypted by using the other key) to obtain the digest of the data, then the digest value of the received data is calculated by using the same hash algorithm as that of the data sending end, and then the digest value is compared with the decrypted digest, and if the two are completely consistent, the text is not tampered.
As shown in fig. 4, in the embodiment of the present disclosure, when the user accesses the second blockchain network a2 and issues a modification request to the second blockchain network a2 to modify information stored in the second storage unit, step S360 is performed.
In step S360, the node of the user is subjected to authority identification, and a third operation authority is granted to the user according to the identification result, where the third operation authority is configured to enable the user to modify the information, which is stored in the second storage unit and matches with the node of the user, of the user.
In the present embodiment, step S360 includes step S361 and step S362.
In step S361, a modification request of the user is acquired, and first information (hereinafter referred to as first information C) corresponding to the modification request stored in the second storage unit is acquired, the modification request including second identification information for identifying an identity of a node that sent the modification request.
In the embodiment of the present disclosure, the second identification information may be the private key generated in step S420 in the foregoing. In this way, the second blockchain network a2 matches the second identification information with the third identification information (i.e., the public key), so as to determine the identity of the node sending the modification request.
In step S362, when the second identification information matches the first identification information of the first information C corresponding to the modification request, the user is granted a third operation right.
In this embodiment of the present disclosure, the information stored in the second storage unit can only be modified by the node written with the information, and then, the second blockchain network a2 may determine the identity of the node sending the modification request by using the third identification information and the second identification information, determine the identity of the node written with the first information C by using the third identification information and the first identification information of the first information C, and grant the user a third operation right when the identities of the two nodes are identical, so that the user can modify the first information C.
As shown in fig. 2, in some specific embodiments, the plurality of blockchain networks a may further include a third blockchain network A3, and the information storage center B further includes a third storage unit, where the third storage unit is configured to store information written by the third blockchain network A3.
In the embodiment of the present disclosure, the method steps that can be implemented by the third blockchain network A3 may be the same as the method steps that can be implemented by the second blockchain network a2, and therefore, the description thereof is omitted here. For example, the second unit and the same industry may interact through the third blockchain network a3, and the content stored in the third storage unit may be content shared in the industry, such as the information of completed items stored in the second storage unit described above.
Optionally, the third blockchain network a3 is a federation chain network.
Optionally, the consensus mechanism adopted by the third blockchain network a3 includes: a practical byzantine fault-tolerant algorithm.
Based on the information interaction method, the disclosure also provides an information interaction device based on the block chain. This device will be described in detail below in connection with fig. 8 a.
Fig. 8a schematically shows a block diagram of an information interaction apparatus according to an embodiment of the present disclosure, and as shown in fig. 8a, an information interaction apparatus 800 of this embodiment includes a plurality of blockchain networks including a first blockchain network a1 and a second blockchain network a2, and an information storage center B including a first storage unit for storing information written by nodes in the first blockchain network a1 and a second storage unit for storing information written by nodes in the second blockchain network a 2.
Each of the plurality of blockchain networks includes an access module 810, the first blockchain network a1 further includes a first privilege authentication module 820, and the second blockchain network a2 further includes a second privilege authentication module 830.
The access module 810 is configured to access the user to the blockchain network to which the access module 810 belongs when the access request of the user matches with the blockchain network to which the access module 810 belongs. In an embodiment, the access module 810 may be configured to perform the step S210 described above, which is not described herein again.
The first authority authentication module 820 is configured to grant a user a first operation authority when the user accesses the first block chain network a1, where the first operation authority is configured to enable the user to query and modify information stored in the first storage unit. In an embodiment, the first authority authentication module 820 may be configured to perform the step S220 described above, and is not described herein again.
The second authority authentication module 830 is configured to grant a second operation authority to the user when the user accesses the second block chain network a2, where the second operation authority is configured to enable the user to query information stored in the second storage unit; and carrying out authority identification on the node of the user, and granting a third operation authority to the user according to an identification result, wherein the third operation authority is configured to enable the user to modify the information which is stored in the second storage unit and is matched with the node of the user. In an embodiment, the second authority authentication module 830 may be configured to perform the steps S230 and S240 described above, which are not described herein again.
According to the information interaction device disclosed by the embodiment of the disclosure, through the characteristics of tamper resistance, traceability and the like of the block chain, redundant links set for realizing functions of certificate storage, safety verification and the like in interaction of each member can be omitted, and the information transmission efficiency among the members is improved. Meanwhile, in the second blockchain network a2, each node needs to perform identity authentication before modifying the information matched with the node, so that interference of some information stored in the second storage unit by other nodes is prevented, and reliability of the information stored in the second storage unit is enhanced.
According to the embodiment of the present disclosure, any plurality of the access module 810, the first authority authentication module 820 and the second authority authentication module 830 may be combined and implemented in one module, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the access module 810, the first right authentication module 820 and the second right authentication module 830 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or in any one of three implementations of software, hardware and firmware, or in a suitable combination of any of them. Alternatively, at least one of the access module 810, the first rights authentication module 820 and the second rights authentication module 830 may be at least partially implemented as a computer program module, which when executed, may perform a corresponding function.
Fig. 8b schematically shows a structural block diagram of the second blockchain network a2 according to an embodiment of the present disclosure, and as shown in fig. 8b, each functional module of the second blockchain network a2 of the embodiment of the present disclosure may be divided into a functional module C1 for granting and identifying the identity and right of the user and a functional module C2 for implementing each operation, for example, the functional module C1 may include: access module 810, second rights authentication module 830, identity authentication module 840, and registration module 850, function modules C2 may include write module 860, query module 870, storage module 880, and modification module 890. The specific functions of each module are described in detail in the foregoing, and therefore will not be described herein again. The structure of the first blockchain network a1 can be obtained by referring to the second blockchain network a2, and therefore, the description thereof is not repeated herein.
In some embodiments, the first unit may include a plurality of departments, and the plurality of departments respectively access the second blockchain network a2 through a plurality of nodes. For example, the first unit may include a department a and a department b, where the department a and the department b access the second block chain network a2 through two nodes, respectively, the department a may store original demand information into the second storage unit, the department b may query the original demand information but cannot modify the original demand information, and the department b may optimize on the basis of the original demand information to obtain optimized demand information, and store the optimized demand information into the second storage unit. In this way, the original demand information and the optimized demand information are simultaneously stored in the second storage unit, so that the readability of the demand information is improved while the integrity of the information is ensured.
In some embodiments, the second organization may include a plurality of departments, and the plurality of departments respectively access the second blockchain network a2 through a plurality of nodes. For example, the second unit may include a department c and a department d, which access the second blockchain network a2 through two nodes, respectively. The department c can inquire the original demand information and the optimized demand information stored in the second storage unit but cannot modify the original demand information and the optimized demand information, and the department c can perform mining and other work according to the original demand information and the optimized demand information stored in the second storage unit to obtain final demand information and store the final demand information into the second storage unit. And the department d can perform development and other work by taking the final demand information as a reference and simultaneously referring to the original demand information and the optimized demand information. And the department a and the department b can inquire the contents stored by the department c and the department d and feed back according to the contents stored by the department c and the department d at any time.
In conclusion, the information interaction device of the embodiment of the disclosure greatly enhances the interactivity between the first unit and the second unit.
Fig. 9 schematically shows a block diagram of an electronic device adapted to implement the information interaction method according to an embodiment of the present disclosure.
As shown in fig. 9, an electronic apparatus 900 according to an embodiment of the present disclosure includes a processor 901 which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage portion 908 into a Random Access Memory (RAM) 903. Processor 901 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 901 may also include on-board memory for caching purposes. The processor 901 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 903, various programs and data necessary for the operation of the electronic apparatus 900 are stored. The processor 901, the ROM 902, and the RAM 903 are connected to each other through a bus 904. The processor 901 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 902 and/or the RAM 903. Note that the program may also be stored in one or more memories other than the ROM 902 and the RAM 903. The processor 901 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer readable storage medium carries one or more programs which, when executed, implement the information interaction method provided according to the embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 902 and/or the RAM 903 described above and/or one or more memories other than the ROM 902 and the RAM 903.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method illustrated in the flow chart. When the computer program product runs in a computer system, the program code is used for causing the computer system to realize the information interaction method provided by the embodiment of the disclosure.
The computer program performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure when executed by the processor 901. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed in the form of a signal on a network medium, and downloaded and installed through the communication section 909 and/or installed from the removable medium 911. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 909, and/or installed from the removable medium 911. The computer program, when executed by the processor 901, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.
Claims (10)
1. An information interaction method based on a block chain is applied to an information interaction device, and the information interaction device comprises: the information storage center comprises a first storage unit and a second storage unit, the first storage unit is used for storing information written by nodes in the first blockchain network, and the second storage unit is used for storing information written by nodes in the second blockchain network; the information interaction method comprises the following steps:
accessing the user to a block chain network matched with the access request in the plurality of block chain networks according to the access request of the user;
when the user accesses the first blockchain network, the information interaction method further comprises the following steps:
granting a first operation authority to a user, wherein the first operation authority is configured to enable the user to inquire and modify the information stored in the first storage unit;
when the user accesses the second blockchain network, the information interaction method further comprises the following steps:
granting a second operation authority to the user, wherein the second operation authority is configured to enable the user to inquire the information stored in the second storage unit; and the number of the first and second groups,
and carrying out authority identification on the node of the user, and granting a third operation authority to the user according to an identification result, wherein the third operation authority is configured to enable the user to modify the information which is stored in the second storage unit and is matched with the node of the user.
2. The information interaction method of claim 1, wherein when the user accesses the second blockchain network, the information interaction method further comprises:
acquiring a write request of a user, wherein the write request comprises information written by the user and first identification information, and the first identification information is used for identifying the identity of a node sending the write request;
storing the first identification information and information written by a user to the second storage unit to obtain first information;
the step of carrying out authority identification on the node of the user and granting a third operation authority to the user according to the identification result comprises the following steps:
acquiring a modification request of a user and first information corresponding to the modification request, which is stored in a second storage unit, wherein the modification request comprises second identification information, and the second identification information is used for identifying the identity of a node sending the modification request;
and when the second identification information is matched with the first identification information of the first information corresponding to the modification request, granting the third operation permission to the user.
3. The information interaction method of claim 1, wherein when the user accesses the second blockchain network, the information interaction method further comprises:
verifying the identity of the node of the user before the step of granting the user a second operation right;
and when the identity of the node of the user passes the verification, the user is granted the second operation authority.
4. The information interaction method of claim 3, wherein when the user accesses the second blockchain network, the information interaction method further comprises:
acquiring a registration request of a user;
generating a private key corresponding to a node of a user as first identification information of the node; and the number of the first and second groups,
generating a public key matched with the private key as third identification information;
the step of verifying the identity of the user's node comprises:
and when the first identification information is matched with the third identification information, judging that the identity of the node of the user passes the verification.
5. The information interaction method according to any one of claims 1 to 4, wherein the first blockchain network is a public chain network, and the second blockchain network is a alliance chain network.
6. The information interaction method according to any one of claims 1 to 4, wherein the consensus mechanism adopted by the first blockchain network comprises: a stock certificate or a workload certificate; the consensus mechanism employed by the second blockchain network comprises: a practical byzantine fault-tolerant algorithm.
7. An information interaction device based on a block chain, the information interaction device comprising: the information storage center comprises a first storage unit and a second storage unit, the first storage unit is used for storing information written by nodes in the first blockchain network, and the second storage unit is used for storing information written by nodes in the second blockchain network;
each of the plurality of blockchain networks comprises:
the access module is used for accessing the user into the block chain network to which the access module belongs when the access request of the user is matched with the block chain network to which the access module belongs;
the first blockchain network comprises: the first authority authentication module is used for granting a first operation authority to a user when the user accesses the first block chain network, wherein the first operation authority is configured to enable the user to inquire and modify information stored in the first storage unit;
the second blockchain network comprises: a second authority authentication module for, when the user accesses the second block chain network,
granting a second operation authority to the user, wherein the second operation authority is configured to enable the user to inquire the information stored in the second storage unit; and carrying out authority identification on the node of the user, and granting a third operation authority to the user according to an identification result, wherein the third operation authority is configured to enable the user to modify the information which is stored in the second storage unit and is matched with the node of the user.
8. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the information interaction method of any of claims 1-6.
9. A computer-readable storage medium having stored thereon executable instructions, wherein the instructions, when executed by a processor, cause the processor to perform the method of information interaction according to any one of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program realizes the information interaction method according to any one of claims 1 to 6 when executed by a processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110917871.XA CN113609531B (en) | 2021-08-11 | 2021-08-11 | Information interaction method, device, equipment, medium and product based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110917871.XA CN113609531B (en) | 2021-08-11 | 2021-08-11 | Information interaction method, device, equipment, medium and product based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113609531A true CN113609531A (en) | 2021-11-05 |
CN113609531B CN113609531B (en) | 2024-02-23 |
Family
ID=78340219
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110917871.XA Active CN113609531B (en) | 2021-08-11 | 2021-08-11 | Information interaction method, device, equipment, medium and product based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113609531B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115022053A (en) * | 2022-06-08 | 2022-09-06 | 京东科技控股股份有限公司 | Method, device and system for accessing block chain network |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110597836A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Information query request response method and device based on block chain network |
CN110888938A (en) * | 2019-09-02 | 2020-03-17 | 腾讯科技(深圳)有限公司 | Student identity information processing method and device based on block chain network |
-
2021
- 2021-08-11 CN CN202110917871.XA patent/CN113609531B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110888938A (en) * | 2019-09-02 | 2020-03-17 | 腾讯科技(深圳)有限公司 | Student identity information processing method and device based on block chain network |
CN110597836A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Information query request response method and device based on block chain network |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115022053A (en) * | 2022-06-08 | 2022-09-06 | 京东科技控股股份有限公司 | Method, device and system for accessing block chain network |
Also Published As
Publication number | Publication date |
---|---|
CN113609531B (en) | 2024-02-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113711536B (en) | Extracting data from a blockchain network | |
US11257073B2 (en) | Systems, methods, and apparatuses for implementing machine learning models for smart contracts using distributed ledger technologies in a cloud based computing environment | |
US20210217001A1 (en) | Decentralized tokenization technologies | |
Ahmadi et al. | Capabilities and advantages of cloud computing in the implementation of electronic health record | |
US10057253B2 (en) | Cloaked data system | |
US20200136831A1 (en) | Api and domain specific language for 1 to many, state-based, granular, terms and conditions acceptance | |
US20230014599A1 (en) | Data processing method and apparatus for blockchain system | |
US10951396B2 (en) | Tamper-proof management of audit logs | |
US10699023B1 (en) | Encryption profiles for encrypting user-submitted data | |
US11431503B2 (en) | Self-sovereign data access via bot-chain | |
WO2021208762A1 (en) | Data storage and query | |
CN111291394B (en) | False information management method, false information management device and storage medium | |
Barati et al. | Privacy‐aware cloud ecosystems: Architecture and performance | |
CN113609531B (en) | Information interaction method, device, equipment, medium and product based on block chain | |
CN113095806A (en) | Work order processing method and device, electronic equipment and computer readable storage medium | |
US20230208911A1 (en) | Visibility of digital assets at channel level | |
WO2022135032A1 (en) | Method and apparatus for managing detection information | |
Abramson et al. | Evaluating trust assurance in Indy-based identity networks using public ledger data | |
US20230153457A1 (en) | Privacy data management in distributed computing systems | |
Daniels | Identity Management Practices and Concerns in Enterprise Cloud Infrastructures | |
US20240086549A1 (en) | Systems and methods for user characteristic determination through cryptographic tokenized data | |
Gangawane et al. | Big data security issues and challenges in cloud computing | |
Xia et al. | Taming Distrust in the Decentralized Internet with PIXIU | |
CN114697114A (en) | Data processing method, device, electronic equipment and medium | |
CN118194355A (en) | Distributed file system access method, apparatus, device, medium and program product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |