CN114528582A - Data processing method, device and equipment based on block chain and computer storage medium - Google Patents

Data processing method, device and equipment based on block chain and computer storage medium Download PDF

Info

Publication number
CN114528582A
CN114528582A CN202011323730.7A CN202011323730A CN114528582A CN 114528582 A CN114528582 A CN 114528582A CN 202011323730 A CN202011323730 A CN 202011323730A CN 114528582 A CN114528582 A CN 114528582A
Authority
CN
China
Prior art keywords
data
target access
node
information
access node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011323730.7A
Other languages
Chinese (zh)
Inventor
徐萌
杨猛
张帆
李迁
陶涛
徐海勇
张芷毓
胡家琪
周蓓蓉
李耕宇
胡睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University
China Mobile Communications Group Co Ltd
China Mobile Information Technology Co Ltd
Original Assignee
Nanjing University
China Mobile Communications Group Co Ltd
China Mobile Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University, China Mobile Communications Group Co Ltd, China Mobile Information Technology Co Ltd filed Critical Nanjing University
Priority to CN202011323730.7A priority Critical patent/CN114528582A/en
Publication of CN114528582A publication Critical patent/CN114528582A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a data processing method, a data processing device, data processing equipment and a computer storage medium based on a block chain, relates to the field of data processing, and aims to realize accurate tracing of data on the block chain. The method comprises the following steps: the first target access node sends a data transmission request to the data node, after the target access node is authenticated, the first target access node and the data node are allowed to carry out data transmission, and an access record of the first target access node is generated, wherein the first target access node is any one of the multiple access nodes; determining the spatial stamp information of the transmitted data according to the access records of a plurality of second target access nodes, wherein the second target access nodes are the access nodes which finish data transmission in the first target access nodes; and tracing the source of the plurality of data based on the spatial stamp information.

Description

Data processing method, device and equipment based on block chain and computer storage medium
Technical Field
The present invention relates to the field of blockchains, and in particular, to a method, an apparatus, a device, and a computer storage medium for processing data based on a blockchain.
Background
In the big data age, the data transaction industry develops at a high speed, but also faces more problems. Because data is a reproducible and falsifiable transaction product and the industry lacks a uniform standard, a series of problems of unlimited resale, constantly reduced market value, unclear ownership, poor data reliability and the like exist in data transaction, and the traceability of the data is urgent.
The block chain has the characteristics of trustiness, decentralization, no tampering, information disclosure and the like, and becomes a preferred technology for constructing the traceability system. The traceability system based on the block chain inevitably promotes the development of the data transaction industry greatly, so that traceability becomes more valuable in the data product transaction process. However, with the development of the blockchain technology, a large amount of data information is stored in the blockchain, so that the efficiency of storage and query is low, and it is difficult to perform traceability on the data information in the blockchain.
In summary, the block chain in the prior art is difficult to perform tracing on the data information on the block chain, and accuracy of the traced data information cannot be ensured.
Disclosure of Invention
The embodiment of the invention provides a data processing method, a data processing device, data processing equipment and a computer storage medium based on a block chain, which can realize accurate tracing of data information on the block chain.
In a first aspect, an embodiment of the present invention provides a data processing method based on a block chain, where the method includes:
the first target access node sends a data transmission request to the data node, after the target access node is authenticated, the first target access node and the data node are allowed to carry out data transmission, and an access record of the first target access node is generated, wherein the first target access node is any one of the multiple access nodes;
determining the spatial stamp information of the transmitted data according to the access records of a plurality of second target access nodes, wherein the second target access nodes are the access nodes which finish data transmission in the first target access nodes;
and tracing the source of the plurality of data based on the spatial stamp information.
In a second aspect, an embodiment of the present invention provides a data processing apparatus based on a block chain, where the apparatus includes:
the generation module is used for sending a data transmission request to the data node through the first target access node, allowing the first target access node to perform data transmission with the data node after the target access node is authenticated, and generating an access record of the first target access node, wherein the first target access node is any one of the plurality of access nodes;
the determining module is used for determining the spatial stamp information of the transmitted data according to the access records of the second target access nodes, wherein the second target access nodes are the access nodes which finish data transmission in the first target access nodes;
and the source tracing module is used for tracing the source of the data information transmitted on the block chain based on the spatial stamp information.
In a third aspect, an embodiment of the present invention provides a data processing device based on a block chain, where the device includes:
a processor, and a memory storing computer program instructions; the processor reads and executes the computer program instructions to implement the method for processing data based on the blockchain according to the first aspect of the embodiment of the present invention.
In a fourth aspect, an embodiment of the present invention provides a computer storage medium, where computer program instructions are stored on the computer storage medium, and when the computer program instructions are executed by a processor, the method for processing data based on a blockchain as provided in the first aspect of the embodiment of the present invention is implemented.
According to the data processing method, the device and the equipment based on the block chain and the computer storage medium, when the access node sends a data transmission request to the data node, the security of data transmission between the data node and the access node is ensured based on the authentication mechanism for checking the identity information of the access node corresponding to the access node; generating an access record of the access node by combining the authentication result of the identity authentication; meanwhile, according to the access records of a plurality of access nodes which finish data transmission, determining the spatial stamp information of a plurality of transmitted data; and tracing the source of the data information based on the spatial stamp information. Compared with the prior art, the method and the device have the advantages that the verification is performed from two aspects of space dimension and time dimension, the problem of counterfeiting or identity transfer by other access nodes is effectively avoided, meanwhile, the possibility that the data information is illegally spread or leaked in the transmission process is reduced, and accurate tracing of the data information is realized.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments of the present invention will be briefly described below, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a data processing method based on a block chain according to an embodiment of the present invention;
FIG. 2 is a flow chart of a data processing system based on block chains according to an embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a structure of a private chain block according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an alliance chain block according to an embodiment of the present invention;
FIG. 5 is a structural diagram of a granular visualization of a spatial stamp according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a block chain external database according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a data processing apparatus based on a block chain according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a data processing apparatus based on a block chain according to an embodiment of the present invention.
Detailed Description
Features and exemplary embodiments of various aspects of the present invention will be described in detail below, and in order to make objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present invention by illustrating examples of the present invention.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
In the big data age, the data transaction industry develops at a high speed, but also faces more problems. Because the data product is a reproducible and falsifiable transaction product and the industry lacks a uniform standard, a series of problems of unlimited resale, constantly reduced market value, undefined ownership, poor data reliability and the like exist in data product transaction, and the traceability of the data product is urgent.
The block chain has the characteristics of trustiness, decentralization, no tampering, information disclosure and the like, and naturally becomes a preferred technology for constructing the traceability system. The traceability system based on the block chain inevitably promotes the development of the data transaction industry greatly, so that traceability becomes more valuable in the data product transaction process.
The existing block chain traceability system comprises the following steps:
(1) the Walton chain is a traceability system combining RFID technology and block chain technology, and can prevent the information of the traceability system from being tampered and prevent the tags from being copied through the RFID. The tracing function is realized through the parent chain subchain. Different intelligent contracts can be developed on the sub-chains to meet the requirements of different application scenes, and the mother chain is mainly used for managing the sub-chains.
(2) The Announcement chain (Eximchain), which is a federation chain system built on a hybrid public, licensed blockchain. An intelligent contract ecosystem which is branched from the ether houses and supports information privacy is provided, so that enterprises create personalized supply chain financial products for upstream and downstream supply chains. Consensus protocols employ square Voting, Quadratic Voning (QVEC) to achieve time-limited security. Intelligent contracts are utilized to help buyers, sellers and fund providers optimize the supply chain system from supply chain finance to procurement process management.
(3) An anti-counterfeiting Traceability System (TSPPB) Using a double-block chain comprises a Public chain and a Private chain, the Private chain stores data of each link of a product by utilizing the characteristics of high efficiency, large-capacity storage and high credibility of the Public chain, and the Public chain stores label information of each product so as to ensure the authenticity, reliability and non-falsification of the obtained Traceability information, solve the problems of link generation of product label copying, abusing and product quality problems and positioning difficulty of related responsible persons in the traditional product Traceability System, and simultaneously ensure high efficiency and keep low-cost operation.
(4) An Ant block chain Traceability Service system (TaaS) tracks and records a tangible commodity circulation chain by using a block chain and an internet of things technology, and registers commodity quality information, logistics information, quality inspection information and other data about commodity characteristics on the block chain in an unthinkable manner. And (3) flexibly configuring brand merchants, commodities, batches, traceability links, traceability information and the like from the dimensionality of the basic commodities, so that traceability management is realized.
(5) A lightweight bitcoin transaction tracing mechanism is a tracing mechanism aiming at bitcoin transactions and can trace a propagation path of transaction information in a network layer, so that an anonymous bitcoin address in a transaction is associated with an IP address of a transaction initiating node. By designing the neighbor node identification method based on active sniffing, the traceability mechanism supports lightweight monitoring and has better practicability compared with the existing traceability technology.
(6) The chain only (VeChain) provides the whole process information tracing of products in different fields such as agriculture, electronic certificate archives, automobile industry, new retail, logistics transportation and the like, and the basic method mainly stores the process information on a block chain and provides sharing of participants and end users. The Jingdong Zhi Zhen chain also provides BaaS service, and the solution in the tracing field comprises the following steps: according to a uniform coding mechanism, a unique identity is given to the minimum package of each commodity, and the on-line authenticity verification of consumers is realized. The commodity quality information can be traced in the whole process by combining the information of commodity production, processing, packaging, delivery and the like with the information of warehousing and ex-warehouse, order, logistics and the like of the Jingdong warehouse.
However, the traceability system based on the block chain product mainly focuses on the transaction traceability of the physical product, lacks a traceability mechanism of the data product, and has the following defects when the existing traceability mechanism is directly applied to the traceability of the data product:
(1) storage and query are inefficient. Although the traceability system based on the block chain has wide application prospect and value by ensuring the authenticity and reliability of products, ensuring the transparent disclosure of each production link, implementing responsibility pursuit and other functions, a large amount of information and frequent queries are stored on the block chain, which meets great challenges in the aspect of query efficiency. In particular, for data products, it is difficult to store all data on a blockchain to implement querying and tracing.
(2) An accurate traceability mechanism for data product transactions is not sufficient. The existing tracing system mainly aims at tracing physical products, such as milk powder, agricultural products, industrial products, archive information and the like, and related information is easy to acquire and record in each link of transaction and circulation. However, in the transaction process of data products, once data is acquired, the data can be copied and used by different personnel for many times, so that the challenges are brought to data security and property protection, and accurate tracing is difficult to develop when the data is illegally spread or leaked.
In order to overcome the defects in the prior art, embodiments of the present invention provide a data processing method, an apparatus, a device, and a computer storage medium based on a block chain, so as to reduce the possibility that data information is illegally spread or leaked in a transmission process, and implement accurate tracing of data information.
First, a data processing method based on a block chain according to an embodiment of the present invention is described below.
Fig. 1 is a flowchart illustrating a data processing method based on a blockchain according to an embodiment of the present invention. As shown in fig. 1, the method may include the steps of:
s101, a first target access node sends a data transmission request to a data node, after the target access node is authenticated, the first target access node and the data node are allowed to perform data transmission, and an access record of the first target access node is generated, wherein the first target access node is any one of a plurality of access nodes.
In some embodiments, the blockchain includes at least a private chain and a federation chain;
the plurality of access nodes comprises at least one first access node and at least one second access node;
the private chain consists of a data node and at least one first access node;
the federation chain is composed of the data node and at least one second access node.
Optionally, the first access node may be configured to provide data to the data node and/or download data of the data node, and the second access node may be configured to provide data to the data node and/or download data of the data node, which is not limited in the present invention.
In some embodiments, the issuing, by the first target access node, a data transmission request to the data node, allowing the first target access node to perform data transmission with the data node after the target access node is authenticated, and generating an access record of the first target access node may include:
the first target access node sends a data transmission request to the data node and performs identity authentication on the first target access node;
the identity authentication comprises the steps of detecting key information, geographical position information and an IP address of a first target access node, if the key information, the geographical position information and the IP address are correct, allowing the first target access node and a data node to carry out data transmission, and otherwise rejecting a data transmission request;
and generating an access record of the first target access node according to the authentication result of the identity authentication.
In some embodiments, when the first target access node is a second access node on the federation chain, the node authentication for the first target access node before the identity authentication may further include:
checking the access time limit of the first target access node, when the data transmission request is determined to be in the access time limit, carrying out identity authentication on the first target access node, and if the access time limit is exceeded, refusing the access, wherein the access time limit is determined according to an intelligent contract established between the first target access node and the data node.
Optionally, the key information authentication on the first target access node may specifically be performed in the following manner:
the method comprises the steps that a system is initialized, a security parameter K is input into an access node, and therefore a key generation center PKG system discloses a parameter Param and a master private key s of a PKG, and meanwhile the PKG system stores the master private key s;
extracting the key, after the access node finishes registering in the block chain system, the PKG generates a private key d according to the ID of the access nodeIDWhile using the private key dIDTo public key (P)IDID) signature generation S (P)ID) Public key and signature (P)ID,S(PID) Placed in a blockchain and disclosed.
When the access node is a node on the federation chain, the key information authentication may further include:
managing session key, generating new session private key sd by the system according to the system public parameter param when updating the session private keyIDAnd session public key sPIDGeneration of S (sP) by signing the public session key with the private session keyID) Session public key and its signature (S (P)ID),S(sPID) Stored in a blockchain and disclosed;
the session is realized, when the node A needs to share data with the node B, the latest session public key sP of the node B on the block chain is inquiredIDBAnd signature S (sP)ID)BWith simultaneous sPIDBVerification of signature S (sP)ID)BTo ensure the correctness of the session public key, node A can obtain the session key SPEAKA=(sPIDB)sdIDASimilarly, the node B may obtain the session key SPEAKB=(sPIDA)sdIDBAnd SPEAKA=SPEAKB
Optionally, the IP address authentication of the first target access node may specifically be performed in the following manner:
when the access node is registered for the first time, the system allocates the identity ID of the access node, binds the IP address, records the IP address on a block chain and adds the IP address to a white list;
and when the access node logs in for authentication, checking whether the access node is in a white list, namely simultaneously authenticating the identity ID, the private key and the bound IP address of the access node, if the matching is correct, successfully authenticating, and generating identity authentication information, otherwise, failing to authenticate, and adding the authentication information into a black list if the failure exceeds the preset times.
In some embodiments, generating an access record of the first target access node according to the authentication result of the identity authentication may include:
under the condition that any one of the key information, the geographic position information and the IP address fails to be authenticated, generating an access record for denying access;
under the condition that the key information, the geographic position information and the IP address are authenticated, generating an access record allowing access;
the access record at least comprises the following at least one item of information of the access node: key information, geographical location information, IP address, transmission time information.
Optionally, the data transmission between the access node and the data node is based on an intelligent contract, the access deadline of the access node is determined through the intelligent contract, and meanwhile, the access record is generated based on the intelligent contract, and the construction and execution of the intelligent contract may include:
the access node submits a contract construction application to an intelligent contract server, a contract is generated and issued to a block chain by the server to take effect, and a block chain intelligent contract between the access node and the data node is formed;
the intelligent contract is executed, before each access, the intelligent contract carries out identity authentication on the access node, namely whether the key information, the geographic position information and the IP address of the access node are correct or not is checked, if so, the intelligent contract allows the access node to access the data node, otherwise, the access is denied, and meanwhile, the access record is stored in the block chain;
and after the intelligent contract is expired, the intelligent contract server generates a contract record and issues the contract record to the block chain, and the contract execution is stopped.
Optionally, when the access node is a second access node in the federation chain, after the intelligent contract is formed, before the access node submits a contract construction application to the intelligent contract server, the method may further include:
the data node provides the own bank account number MA to the intelligent contract server, and the access node pays a certain fee to the intelligent contract server through the own bank account number MB.
Optionally, when the access node is a second access node in the federation chain, after the intelligent contract is executed, before performing identity authentication on the access node, the method may further include:
and checking the access time limit of the access node, performing identity authentication on the first target access node when the data transmission request is determined to be within the access time limit, and refusing the access if the data transmission request exceeds the access time limit, wherein the access time limit is determined by the intelligent contract.
The whole process of executing the intelligent contract is supervised by all participants, and all the participants can inquire the execution condition of the intelligent contract through the block chain.
Identity authentication is a key technology in a blockchain system, node identities determine their corresponding permissions, privacy of users and roles in the real world, and authentication of node identities is usually accomplished using an identity-based public key encryption system. Therefore, the key needs to be strictly managed, and once the key is lost, synchronization cannot be realized in the whole block chain, which brings much trouble to the identity authentication and trust problem of each node in the block chain. In the block chain of the data product, corresponding to the identity authority of the corresponding level due to the security level degree of different data, the public and private keys are bound with the node identity, and the key is updated and distributed by using the intelligent contract, so that the security of node authentication is improved.
And S102, determining the spatial stamp information of the transmitted data according to the access records of the second target access nodes, wherein the second target access nodes are the access nodes which finish data transmission in the first target access nodes.
In some embodiments, determining spatial stamp information for the transmitted plurality of data from the access records of the plurality of second target access nodes may include:
according to the access records of the second target access nodes, performing identity authentication on the second target access nodes;
under the condition that the identity authentication is passed, determining the geographic position information of the second target access nodes and the transmission time information of the data through the access records of the second target access nodes;
and determining the spatial stamp information of the transmitted data according to the geographical position information of the second target access nodes and the transmission time information of the data.
In some embodiments, determining spatial stamp information for the plurality of data based on the geographic location information for the plurality of second target access nodes and the transmission time information for the plurality of data may include:
according to the geographic position information of the second target access nodes, performing multi-granularity expression on the geographic positions respectively, and determining a plurality of spatial models with different spatial granularities;
according to the transmission time information of a plurality of data, respectively carrying out multi-granularity expression on a plurality of transmission times, and determining a plurality of discrete moments with different time granularities;
based on the geoscience information system, spatial stamp information of a plurality of data is determined according to a plurality of spatial models with different spatial granularities and a plurality of discrete moments with different time granularities.
In some embodiments, determining spatial stamp information for a plurality of data based on a plurality of spatial models of different spatial granularities and a plurality of discrete time instances of different time granularities may include:
converting a plurality of transmitted data to a map with the same space-time granularity for analysis according to a plurality of space models with different space granularities and a plurality of discrete moments with different time granularities, and determining the space stamp information of the data; alternatively, the first and second electrodes may be,
and analyzing the transmitted data on the maps with different space-time granularities according to the space models with different space granularities and the discrete moments with different time granularities to determine the space stamp information of the data.
In some embodiments, the characteristics of transparency, non-falsification and the like of the blockchain are utilized, the concept of the spatial stamp is added on the basis of data transmission on the blockchain, identity control from two aspects of time dimension and space dimension is realized, and the occurrence of various problems such as identity impersonation and identity transfer is reduced.
The data nodes acquire the spatial stamps of all the nodes in the block chain, perform multi-granularity expression on the empty positions of the entities of both data transmission parties at different times (namely, the positions are divided according to different fineness, for example, the positions can be divided according to roads, communities and cities), and perform nuclear density visualization operation through a Geographic Information System (GIS) to perform data analysis.
In the time dimension, different time periods or instants are converted into a series of discrete time points of different time granularity. A three-level space of global-relative-object with different space granularities is constructed in the space dimension, and the granularity is refined to a space module for accurate positioning and tracing.
According to the discrete time point and the spatial model, analysis under different space-time granularities can be carried out, and spatial position information under different space-time granularities can be converted into the same space-time granularity for analysis, which is not limited by the invention.
The data tracing mode of limiting the data source matching with the space stamp through the IP address effectively reduces the possibility that the data is used by an unauthorized third party. Once the data is confirmed, the use right of the data is guaranteed, and the situation that the user illegally transfers the use right of the data to a third party for use, so that the data safety cannot be guaranteed is avoided.
S103, tracing the source of the plurality of data based on the spatial stamp information.
According to the data processing method, the device, the equipment and the computer storage medium based on the block chain, when the access node sends a data transmission request to the data node, the security of data transmission between the data node and the access node is ensured based on a dual authentication mechanism for checking the access time limit in the intelligent contract corresponding to the access node and the identity information of the access node; generating an access record of the access node by combining the authentication result of the double authentication; meanwhile, according to the access records of a plurality of access nodes which finish data transmission, determining the spatial stamp information of a plurality of data transmissions on the same time-space granularity; and tracing the source of the data information based on the spatial stamp information. Compared with the prior art, the method and the device have the advantages that the verification is performed from two aspects of space dimension and time dimension, the problem of counterfeiting or identity transfer by other access nodes is effectively avoided, meanwhile, the possibility that the data information is illegally spread or leaked in the transmission process is reduced, and accurate tracing of the data information is realized.
For convenience of understanding, the data processing method based on the block chain according to the embodiment of the present invention is described in detail below with reference to the accompanying drawings and by using specific embodiments.
As shown in fig. 2, a company a, which is any one of at least one branch company, provides data to the a company, and at least one user downloads data from the a company. As shown in fig. 3, a private chain is formed between at least one branch company and company a under company a flag, and as shown in fig. 4, a federation chain is formed between at least one user and company a. The block chain-based data processing method provided by the embodiment of the invention is explained in detail in two aspects of data transmission and data tracing.
Embodiment one, data transmission based on block chain
Optionally, a data provider in the private chain provides data for company a to generate a data product; the data users in the alliance chain download data from company A to realize data transaction and use, the generation and use of the data products are based on the construction of the intelligent contract, wherein the execution of the intelligent contract can comprise the following steps:
step A1, establishing intelligent contract
and a company or a user submits a contract construction application to an intelligent contract server, a contract is generated and issued to the blockchain by the server to be effective, and the blockchain intelligent contract with the company A is formed.
When the node is a user, step a1 may further include:
the company A provides the own bank account MA to the intelligent contract server;
the user pays a certain fee to the intelligent contract server through the own bank account MB.
Step A2, based on intelligent contract usage data
And the intelligent contract is executed, the intelligent contract carries out identity verification on the company a or the user before each access, namely, whether the key information, the geographic position information and the IP address of the company a or the user are correct or not is checked, if so, the intelligent contract allows the company a or the user to access the company A database, otherwise, the access is denied, and meanwhile, the access record is stored in the blockchain.
When the node is a user, after the intelligent contract starts to execute and before the access node is authenticated, step a2 may further include:
and checking the access time limit of the user, authenticating the identity of the user when the data transmission request is determined to be within the access time limit, and rejecting the access if the data transmission request exceeds the access time limit, wherein the access time limit is determined by the intelligent contract.
Step A3, the intelligent contract periodically checks
And after the intelligent contract is expired, the intelligent contract server generates a contract record and issues the contract record to the block chain, and the contract execution is stopped.
The whole process of executing the intelligent contract is supervised by all participants, and all the participants can inquire the execution condition of the intelligent contract through the block chain.
In the execution period of the intelligent contract, as a data provider, the company a performs identity verification by using a real-time update mode of the public and private keys while uploading data, so that the stability and the safety in the data uploading process are guaranteed. After the data is approved, the digital watermark is added to become a data product and the data product is uploaded to a database of company A.
As a data user, the user also performs identity verification in a company key updating mode while downloading data, so that the stability and the safety in the data downloading process are guaranteed. The user applies for joining the alliance chain, after the application is submitted, qualification examination is carried out, the application becomes a member of the alliance chain after the qualification examination is passed, a common user can access the database of the block chain once, and a VIP user can access and download the block chain within one year at any times. When the user registers, the user ID, the IP address and the spatial stamp information are recorded in the block chain in real time.
Users in the alliance chain can share data products in the database, public and private keys are updated in real time in the sharing process to guarantee the security of account keys, session keys are added to guarantee the security in the data transmission process, after sharing is successful, spatial stamp information, sharing records, right-confirming certificates and the like of the users and the parties are recorded on the alliance chain, and data tracing is guaranteed in the future.
Optionally, the uploading of the data from company a to company a may include the following steps:
and step B1, after the company a is authenticated, taking the authentication information as a public key based on an identity encryption algorithm (IBE), generating a private key corresponding to the public key through a private key generation center (PKG), issuing the public key in the network, and issuing the public key which is verified to be valid in the latest block of the block chain after a specific period.
And step B2, when updating the key, the uploading device generates an updated public-private key pair by using the existing secure cryptographic algorithm, and issues the latest public key in the block chain, and the validity of the public key update is ensured by the signature algorithm.
And step B3, acquiring the latest public key corresponding to company a from the blockchain, and transmitting data to company A.
Through the steps, the key on the private chain is updated in a specific period, so that a hacker is prevented from stealing the key, fake data is uploaded, and the authenticity and reliability of the data are guaranteed.
Optionally, the user downloading data from company a may include the following steps:
and step C1, after the user is authenticated, taking the authentication information as a public key, generating a private key corresponding to the public key through a private key generation center (PKG) based on an identity encryption algorithm (IBE), issuing the public key in the network, and issuing the public key verified to be valid in the latest block of the block chain after a specific period.
And step C2, when updating the key, the downloading device generates an updated public-private key pair by using the existing secure cryptographic algorithm, and issues the latest public key in the block chain, and the validity of the public key update is ensured by the signature algorithm.
And step C3, acquiring the latest public key corresponding to the user from the block chain, and downloading data from company A.
And step C4, the downloading device generates an updated session public and private key pair by using the existing secure cryptographic algorithm, and issues the latest session key in the blockchain, when negotiating the session key, that is, when the user obtains data from company A, company A queries the latest session public key and public key of the member through the blockchain, calculates the session key, and allows the user to share data with other users.
Through the steps, the key on the alliance chain is updated in a specific period, the security of the user downloading data is ensured, the asynchronous updating, inquiring and negotiation of the session key among different users are realized, and the encryption is carried out on the data transaction to ensure the security and the rapidness in the transmission process.
Optionally, the generating, updating and managing of the key and the session key may include the following steps:
step D1, system initialization. The user enters a security parameter K whereby the key generation center PKG system discloses the parameters Param and the master private key s of the PKG, while the PKG system maintains the master private key s.
Step D2, key extraction. After the user finishes the registration in the system, the PKG generates a user private key d according to the user ID when the user requests the company A to transmit dataIDWhile using the private key dIDTo public key (P)IDID) signature generation S (P)ID) Public key and signature (P)ID,S(PID) Placed in the blockchain, disclosed externally.
Step D3, session key management. When the session key is updated, the system generates a new session private key sd according to the system public parameter paramIDAnd session public key sPIDGeneration of S (sP) by signing the public session key with the private session keyID) Session public key and its signature (S (P)ID),S(sPID) Stored in a blockchain, open to the outside.
Step D4, session realization. After the user passes the data transmission request of company A, when the user transmits data with company A, the user inquires the latest session public key sP of B on the block chainIDBAnd signature S (sP)ID)BWith simultaneous sPIDBVerification of signature S (sP)ID)BTo ensure the correctness of the session public key, user a can obtain the session key SPEAKA=(sPIDB)sdIDASimilarly, user B can obtain SPEAK as the session keyB=(sPIDA)sdIDBAnd SPEAKA=SPEAKB
Optionally, the step B1 and the step C1 perform identity authentication on the user or the company a, and acquiring the identity authentication information may include the following steps:
at step E1, when the user or company a registers for the first time, the system will assign the ID of the user or company a, and bind the IP address and the geographical location information, and record them on the blockchain.
And E2, when the user or the company a logs in for authentication, simultaneously authenticating the identity ID and the private key of the user or the company a, the bound IP address and the geographic position information, if the matching is correct, the authentication is successful, and identity authentication information is generated, otherwise, the authentication fails.
Embodiment two, data tracing based on block chain
By utilizing the characteristics of transparency, non-falsification and the like of the block chain, the concept of the spatial stamp is added on the basis of data transmission on the block chain, so that the identity control from two aspects of time dimension and space dimension is realized, and the occurrence of various problems such as identity impersonation, identity transfer and the like is reduced.
Company A obtains the spatial stamp of each node in the block chain, performs multi-granularity expression on the empty positions of the entities of both data transmission parties at different times (namely, the positions are divided according to different fineness, for example, the positions can be divided according to roads, communities and cities), and performs nuclear density visualization operation through a geographic information system GIS to perform data analysis. Wherein each node includes all affiliates and users.
In the time dimension, different time periods or instants are converted into a series of discrete time points of different time granularity. A three-level space of global-relative-object with different space granularities is constructed in the space dimension, and the granularity is refined to a space module for accurate positioning and tracing.
The IP addresses of all nodes are authenticated, analysis under different space-time granularities can be carried out, and the analysis can be carried out by converting space position information under different space-time granularities into the same space-time granularity.
Optionally, tracing the source of the data on the blockchain may include the following steps:
and F1, calling an external database to acquire the spatial stamp information of each node.
Step F2, importing the spatial stamp information of each node into Excel, and converting into csv data.
And F3, importing the csv data into the GIS, and establishing a geographic coordinate system so that the geographic information with longitude and latitude can be positioned in space based on the established geographic coordinate system.
Step F4, a certain geographical coordinate system is specified.
And F5, performing projection conversion on the geographic information of the nodes with the longitude and latitude, and unifying the geographic information into the designated geographic coordinate system.
And F6, carrying out precision positioning analysis on the space stamp information on the map through nuclear density analysis.
Step F7, merging the layers, where the effect display is shown in fig. 5, which traces the source of the spatial positions of both data transmission parties and displays the source on a map.
It should be noted that there are two ways for querying data in a blockchain, one is an external database, and the other is an internal index. The two modes are different in thousands of years, but in consideration of frequent storage and query operations of the tracing system, on the basis of an original block chain, the scheme modifies a storage query layer, keeps a basic architecture unchanged, provides an interface to be connected with an external database, mainly stores data in the external database, and stores metadata on blocks, such as the position of data storage and the like. Typically, a macro chain database (bigchain db) system is used, which gives queries to a back-end database for execution, and a blockchain is only used to prevent tampering, ensure the security of data, and improve the storage and query efficiency.
As shown in fig. 6, the external database is used as the bottom layer of the blockchain in the embodiment of the present invention, which is a query designed at the outer layer of the blockchain, synchronizes the blockchain data to the external database, and designs the query layer by using the functional interface provided by the external database. It designs a block chain data monitoring system, copies the data on the chain to the distributed document storage database (MongoDB), and then uses MongoDB to execute the analysis query operation. MongoDB is an open-source cross-platform NoSQL database, supports flexible modes, and can be easily configured to realize flexibility. The method does not need to modify the original block chain system, and the query layer is directly realized on the block chain system.
In fig. 6, the block chain external database structure includes 3 main parts: a data monitoring and parsing module, an external database, and an Application Program Interface (API). The data monitoring and analyzing module: the data from the block chain (key/value of the block chain bottom database levelDB) is synchronized in real time; an external database: the design belongs to the exclusive database of the system, and in the operation stage of the block chain system, the data monitoring and analyzing module monitors the block data through the API provided by the block chain and guides the block data into the external database. The query is mainly realized by means of a query interface provided by an external database, and the data monitoring module reads data through an API provided by an Ethermen. The main advantage of the research on the design of the query processing module in the blockchain system still lies in that the external database is used as a medium, and the query efficiency and the rich query function are exchanged in a simple implementation mode.
The following describes in detail a data processing apparatus based on a block chain according to an embodiment of the present invention with reference to fig. 7.
Fig. 7 is a schematic structural diagram illustrating a data processing apparatus based on a blockchain according to an embodiment of the present invention. As shown in fig. 7, the block chain-based data processing apparatus 700 includes:
a generating module 701, configured to send a data transmission request to a data node through a first target access node, allow the first target access node to perform data transmission with the data node after the target access node is authenticated, and generate an access record of the first target access node, where the first target access node is any one of multiple access nodes;
a determining module 702, configured to determine, according to access records of multiple second target access nodes, space stamp information of multiple transmitted data, where the second target access node is an access node that completes data transmission in the first target access node;
the tracing module 703 is configured to trace a source of the multiple data based on the spatial stamp information.
In some embodiments, the generating module 701 may include:
the request unit is used for sending a data transmission request to the data node through the first target access node and carrying out identity authentication on the first target access node;
the first authentication unit is used for performing identity authentication on the first target access node, wherein the identity authentication comprises detecting key information, geographical position information and an IP address of the first target access node, if the key information, the geographical position information and the IP address are correct, the first target access node and the data node are allowed to perform data transmission, and otherwise, the data transmission request is rejected;
and the generating unit is used for generating an access record of the first target access node according to the identity authentication result.
In some embodiments, the generating unit may include:
the first generation subunit is used for generating an access record of the access refusal under the condition that any one of the key information, the geographic position information and the IP address fails to be authenticated;
the second generation subunit is used for generating an access record allowing access under the condition that the key information, the geographic position information and the IP address are authenticated;
the access record at least comprises the following at least one item of information of the access node: key information, geographical location information, IP address, transmission time information.
In some embodiments, the determining module 702 may include:
the second authentication unit is used for performing identity authentication on the plurality of second target access nodes according to the access records of the plurality of second target access nodes;
the first determining unit is used for determining the geographic position information of the second target access nodes and the transmission time information of the data through the access records of the second target access nodes under the condition that the identity authentication is passed;
and the second determining unit is used for determining the spatial stamp information of the transmitted data according to the geographical position information of the second target access nodes and the transmission time information of the data.
In some embodiments, the second determination unit may include:
the first determining subunit is configured to perform multi-granularity expression on the multiple geographic locations respectively according to the geographic location information of the multiple second target access nodes, and determine multiple spatial models with different spatial granularities;
the second determining subunit is configured to perform multi-granularity expression on the multiple transmission times respectively according to the transmission time information of the multiple data, and determine multiple discrete moments with different time granularities;
and the third determining subunit is used for determining the spatial stamp information of the plurality of data according to the spatial models with a plurality of different spatial granularities and the discrete moments with a plurality of different time granularities on the basis of the geoscience information system.
In some embodiments, the third determining subunit is specifically operable to:
converting a plurality of transmitted data to a map with the same space-time granularity for analysis according to a plurality of space models with different space granularities and a plurality of discrete moments with different time granularities, and determining the space stamp information of the data; alternatively, the first and second electrodes may be,
and analyzing the transmitted data on the maps with different space-time granularities according to the space models with different space granularities and the discrete moments with different time granularities to determine the space stamp information of the data.
In some embodiments, the blockchain includes at least a private chain and a federation chain;
the plurality of access nodes comprises at least one first access node and at least one second access node;
the private chain consists of a data node and at least one first access node;
the federation chain is composed of the data node and at least one second access node.
Other details of the data processing apparatus based on the block chain according to the embodiment of the present invention are similar to those of the data processing method based on the block chain according to the embodiment of the present invention described above with reference to fig. 1 to 6, and are not repeated herein.
Fig. 8 is a schematic diagram illustrating a hardware structure of data processing based on a blockchain according to an embodiment of the present invention.
The data processing method and apparatus based on the blockchain provided by the embodiments of the present invention described in conjunction with fig. 1 to 7 may be implemented by a data processing device based on the blockchain. Fig. 8 is a schematic diagram illustrating a hardware structure 800 of a data processing apparatus based on a blockchain according to an embodiment of the present invention.
The blockchain based data processing device may comprise a processor 801 and a memory 802 in which computer program instructions are stored.
Specifically, the processor 801 may include a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement the embodiments of the present invention.
Memory 802 may include mass storage for data or instructions. By way of example, and not limitation, memory 802 may include a Hard Disk Drive (HDD), a floppy Disk Drive, flash memory, an optical Disk, a magneto-optical Disk, a tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. In one example, memory 302 can include removable or non-removable (or fixed) media, or memory 802 is non-volatile solid-state memory. The memory 802 may be internal or external to the integrated gateway disaster recovery device.
In one example, the Memory 802 may be a Read Only Memory (ROM). In one example, the ROM may be mask programmed ROM, programmable ROM (prom), erasable prom (eprom), electrically erasable prom (eeprom), electrically rewritable ROM (earom), or flash memory, or a combination of two or more of these.
The processor 801 reads and executes the computer program instructions stored in the memory 802 to implement the methods/steps S101 to S103 in the embodiment shown in fig. 1, and achieve the corresponding technical effects achieved by the embodiment shown in fig. 1 executing the methods/steps thereof, which are not described herein again for brevity.
In one example, the blockchain-based data processing device may also include a communication interface 803 and a bus 810. As shown in fig. 8, the processor 801, the memory 802, and the communication interface 803 are connected via a bus 810 to complete communication therebetween.
The communication interface 803 is mainly used for implementing communication between modules, apparatuses, units and/or devices in the embodiments of the present invention.
Bus 810 includes hardware, software, or both to couple the components of the online data traffic billing device to each other. By way of example, and not limitation, a Bus may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (Front Side Bus, FSB), a Hyper Transport (HT) interconnect, an Industry Standard Architecture (ISA) Bus, an infiniband interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a Micro Channel Architecture (MCA) Bus, a Peripheral Component Interconnect (PCI) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, a video electronics standards association local (VLB) Bus, or other suitable Bus or a combination of two or more of these. Bus 810 may include one or more buses, where appropriate. Although specific buses have been described and shown in the embodiments of the invention, any suitable buses or interconnects are contemplated by the invention.
The data processing equipment based on the block chain provided by the embodiment of the invention controls the identity of the nodes on the block chain from two aspects of time dimension and space dimension by adding the method of the spatial stamp information on the basis of data transmission on the block chain, thereby effectively avoiding the problem of counterfeiting or identity transfer by other nodes, simultaneously reducing the possibility that the data information is illegally spread or leaked in the transmission process, and realizing accurate tracing of the data information.
In addition, in combination with the data processing method based on the block chain in the foregoing embodiments, embodiments of the present invention may provide a computer storage medium to implement. The computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement any of the above-described embodiments of a blockchain-based data processing method.
It is to be understood that the invention is not limited to the specific arrangements and instrumentality described above and shown in the drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present invention are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications and additions or change the order between the steps after comprehending the spirit of the present invention.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic Circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the invention are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this patent describe some methods or systems based on a series of steps or devices. However, the present invention is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Aspects of the present disclosure are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware for performing the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As described above, only the specific embodiments of the present invention are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present invention, and these modifications or substitutions should be covered within the scope of the present invention.

Claims (12)

1. A method for processing data based on a blockchain, the blockchain comprising a data node and a plurality of access nodes, the method comprising:
a first target access node sends a data transmission request to the data node, after the target access node is authenticated, the first target access node and the data node are allowed to perform data transmission, and an access record of the first target access node is generated, wherein the first target access node is any one of the plurality of access nodes;
determining the spatial stamp information of the transmitted data according to the access records of a plurality of second target access nodes, wherein the second target access nodes are the access nodes which finish data transmission in the first target access nodes;
and tracing the plurality of data based on the spatial stamp information.
2. The method of claim 1, wherein the first target access node issues a data transmission request to the data node, and after the target access node is authenticated, the first target access node is allowed to perform data transmission with the data node, and generate an access record of the first target access node, and the method comprises:
the first target access node sends a data transmission request to the data node and performs identity authentication on the first target access node;
the identity authentication comprises the steps of detecting key information, geographical position information and an IP address of the first target access node, if the key information, the geographical position information and the IP address are correct, allowing the first target access node and the data node to carry out data transmission, and if not, rejecting the data transmission request;
and generating an access record of the first target access node according to the authentication result of the identity authentication.
3. The method of claim 2, wherein generating the access record of the first target access node according to the authentication result of the identity authentication comprises:
under the condition that any one of the key information, the geographic position information and the IP address fails to be authenticated, generating an access record for denying access;
under the condition that the key information, the geographic position information and the IP address are authenticated, generating an access record allowing access;
the access record at least comprises the following information of the access node: key information, geographical location information, IP address, transmission time information.
4. The method of claim 1, wherein determining spatial stamp information for the transmitted plurality of data based on access records of the plurality of second target access nodes and the data node comprises:
according to the access records of the second target access nodes, performing identity authentication on the second target access nodes;
determining geographic position information of the second target access nodes and transmission time information of the data through access records of the second target access nodes under the condition that the identity authentication is passed;
and determining the spatial stamp information of the transmitted data according to the geographical position information of the second target access nodes and the transmission time information of the data.
5. The method of claim 4, wherein the determining spatial stamp information for the plurality of data according to the geographic location information of the plurality of second target access nodes and the transmission time information of the plurality of data comprises:
according to the geographic position information of the second target access nodes, performing multi-granularity expression on the geographic positions respectively, and determining a plurality of spatial models with different spatial granularities;
according to the transmission time information of the data, performing multi-granularity expression on the transmission time respectively, and determining discrete moments of different time granularities;
and determining the spatial stamp information of the plurality of data according to the plurality of spatial models with different spatial granularities and the plurality of discrete moments with different time granularities based on a geoscience information system.
6. The method of claim 5, wherein determining spatial stamp information for the plurality of data based on the spatial models of the plurality of different spatial granularities and the discrete time instances of the plurality of different time granularities comprises:
converting a plurality of transmitted data to a map with the same space-time granularity for analysis according to the space models with different space granularities and the discrete moments with different time granularities, and determining the space stamp information of the data; alternatively, the first and second electrodes may be,
and analyzing the transmitted data on maps with different space-time granularities according to the space models with different space granularities and the discrete moments with different time granularities, and determining the space stamp information of the data.
7. The method of claim 1,
the block chain at least comprises a private chain and a alliance chain;
the plurality of access nodes comprises at least one first access node and at least one second access node;
the private chain is composed of the data node and the at least one first access node;
the federation chain is comprised of the data node and the at least one second access node.
8. A blockchain-based data processing apparatus, the blockchain including a data node and a plurality of access nodes, the apparatus comprising:
a generating module, configured to send a data transmission request to the data node through a first target access node, allow the first target access node to perform data transmission with the data node after the target access node is authenticated, and generate an access record of the first target access node, where the first target access node is any one of the multiple access nodes;
the determining module is used for determining the spatial stamp information of the transmitted data according to the access records of a plurality of second target access nodes, wherein the second target access nodes are the access nodes which finish data transmission in the first target access nodes;
and the source tracing module is used for tracing the plurality of data based on the spatial stamp information.
9. The apparatus of claim 8, wherein the generating module comprises:
a request unit, configured to send a data transmission request to the data node by the first target access node, and perform identity authentication on the first target access node;
the first authentication unit is used for detecting the key information, the geographical position information and the IP address of the first target access node in the identity authentication, if the key information, the geographical position information and the IP address are correct, the first target access node and the data node are allowed to carry out data transmission, and if the key information, the geographical position information and the IP address are not correct, the data transmission request is rejected;
and the generating unit is used for generating an access record of the first target access node according to the identity authentication result.
10. The apparatus of claim 8, wherein the determining module comprises:
the second authentication unit is used for performing identity authentication on the second target access node according to the access record of the second target access node;
a first determining unit, configured to determine, through the access records of the plurality of second target access nodes, geographic location information of the plurality of second target access nodes and transmission time information of the plurality of data if the identity authentication is passed;
a second determining unit, configured to determine spatial stamp information of the transmitted plurality of data according to the geographical location information of the plurality of second target access nodes and the transmission time information of the plurality of data.
11. A blockchain-based data processing apparatus, the apparatus comprising: a processor, and a memory storing computer program instructions; the processor reads and executes the computer program instructions to implement the blockchain-based data processing method according to any one of claims 1 to 7.
12. A computer storage medium having stored thereon computer program instructions which, when executed by a processor, implement the blockchain-based data processing method according to any one of claims 1 to 7.
CN202011323730.7A 2020-11-23 2020-11-23 Data processing method, device and equipment based on block chain and computer storage medium Pending CN114528582A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011323730.7A CN114528582A (en) 2020-11-23 2020-11-23 Data processing method, device and equipment based on block chain and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011323730.7A CN114528582A (en) 2020-11-23 2020-11-23 Data processing method, device and equipment based on block chain and computer storage medium

Publications (1)

Publication Number Publication Date
CN114528582A true CN114528582A (en) 2022-05-24

Family

ID=81618530

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011323730.7A Pending CN114528582A (en) 2020-11-23 2020-11-23 Data processing method, device and equipment based on block chain and computer storage medium

Country Status (1)

Country Link
CN (1) CN114528582A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116226938A (en) * 2023-05-10 2023-06-06 飞天诚信科技股份有限公司 Method and system for managing transaction through intelligent contract

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116226938A (en) * 2023-05-10 2023-06-06 飞天诚信科技股份有限公司 Method and system for managing transaction through intelligent contract
CN116226938B (en) * 2023-05-10 2023-08-08 飞天诚信科技股份有限公司 Method and system for managing transaction through intelligent contract

Similar Documents

Publication Publication Date Title
US20230119636A1 (en) Blockchain methods, nodes, systems and products
Kumar et al. Secure smart contracts for cloud‐based manufacturing using Ethereum blockchain
US11496312B2 (en) Collecting surveys with secure identities via a blockchain
Pasdar et al. Connect api with blockchain: A survey on blockchain oracle implementation
CN111931238B (en) Block chain-based data asset transfer method, device and equipment
CN113012008B (en) Identity management method, device and equipment based on trusted hardware
CN110535648B (en) Electronic certificate generation and verification and key control method, device, system and medium
CN111989707B (en) Managing user rights for blockchain-based customs clearance services
US20200097950A1 (en) Privileged entity consensus for digital asset creation
CN111868725B (en) Processing import customs clearance data based on blockchain
CN111936995A (en) Distributed storage of customs clearance data
Khan et al. Blockchain and edge computing–based architecture for participatory smart city applications
CN113256297B (en) Data processing method, device and equipment based on block chain and readable storage medium
CN111989663A (en) Intelligent contract pool based on block chain
CN111414434B (en) Block chain-based data transaction management network, transaction device and storage medium
CN112632629A (en) Voting management method, device, medium and electronic equipment based on block chain
AU2011378112A1 (en) Online payment
US20220036323A1 (en) Electronic wallet allowing virtual currency expiration date
CN112700251A (en) Identity confirmation method, device and system in financial scene
CN113302610A (en) Trusted platform based on block chain
CN114884674A (en) Block chain-based user data transfer method, device and equipment
CN110941840A (en) Data processing method, system and terminal
CN110766403A (en) Data processing device and method based on block chain and storage medium
CN114528582A (en) Data processing method, device and equipment based on block chain and computer storage medium
CN112862589A (en) Identity verification method, device and system in financial scene

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination