CN115114603A - Base station equipment data management method and device and electronic equipment - Google Patents

Base station equipment data management method and device and electronic equipment Download PDF

Info

Publication number
CN115114603A
CN115114603A CN202110284692.7A CN202110284692A CN115114603A CN 115114603 A CN115114603 A CN 115114603A CN 202110284692 A CN202110284692 A CN 202110284692A CN 115114603 A CN115114603 A CN 115114603A
Authority
CN
China
Prior art keywords
data
stored
information
preset
data storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110284692.7A
Other languages
Chinese (zh)
Other versions
CN115114603B (en
Inventor
王希
张阳
徐健
苏翰
瞿俊
林瀚宇
邱晨晖
黄晞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Fujian Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Fujian Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Fujian Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202110284692.7A priority Critical patent/CN115114603B/en
Publication of CN115114603A publication Critical patent/CN115114603A/en
Application granted granted Critical
Publication of CN115114603B publication Critical patent/CN115114603B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application provides a method and a device for managing data of base station equipment and electronic equipment, which are applied to a block chain node and comprise the following steps: the method comprises the steps of obtaining data validity detection rule information, deploying a first intelligent contract corresponding to the data validity detection rule information to a block chain network where block chain link points are located, wherein the first intelligent contract is used for detecting the validity of data information digital certificate identity information, then receiving a data storage request issued by a data storage person, triggering the first intelligent contract to detect the validity of target data to be stored under the condition that the digital certificate identity information of the data storage person passes verification, obtaining a detection result, storing the target data at a preset position in a block chain under the condition that the detection result meets a first preset condition, and broadcasting verification information corresponding to the target data. Through the embodiment of the application, the effectiveness and the safety of the stored data are effectively improved, and the traceability of data storage is effectively improved.

Description

Base station equipment data management method and device and electronic equipment
Technical Field
The present application relates to the field of mobile communications technologies, and in particular, to a method and an apparatus for managing data of a base station device, and an electronic device.
Background
At present, in the process of network optimization, data such as installation, maintenance, and adjustment of devices, models and operating states of the devices need to be stored, so as to analyze the stored data in the following process and optimize and adjust the network according to the analysis result, and therefore, authenticity, accuracy, non-tamper property, and the like of the stored data need to be ensured.
For the storage process of the data, the data is generally classified and stored in a database or an electronic document mode, however, in the process of storing the data in the above mode, there are problems that data or data attributes are lost (such as information of an acquirer) and the data is tampered.
Disclosure of Invention
The embodiment of the application aims to provide a base station equipment data management method, a base station equipment data management device and electronic equipment, and aims to solve the technical problems that data security cannot be guaranteed, validity of stored data is low, the stored data is easy to lose, and traceability of the stored data is poor in a data storage process.
In order to solve the above technical problem, the embodiments of the present application are implemented as follows:
in a first aspect, an embodiment of the present application provides a base station device data management method, which is applied to a block chain node, and includes:
acquiring data validity detection rule information, and deploying a first intelligent contract corresponding to the data validity detection rule information in a block chain network where block chain link points are located, wherein the first intelligent contract is used for detecting the validity of the data information;
receiving a data storage request issued by a data storage person, wherein the data storage request carries digital certificate identity information of the data storage person and target data to be stored;
under the condition that the identity information of the digital certificate of the data storage person passes verification, triggering a first intelligent contract to detect the validity of target data to be stored to obtain a detection result;
and under the condition that the detection result meets a first preset condition, storing the target data to be stored at a preset position in the block chain, and broadcasting the verification information corresponding to the target data to be stored.
Optionally, the method further includes:
acquiring preset rule information corresponding to an excitation mechanism and a punishment mechanism, and deploying a second intelligent contract corresponding to the preset rule information in a block chain network where block chain link points are located, wherein the second intelligent contract is used for carrying out point deduction operation or point increment operation on a preset point account of a data storage person;
and triggering a second intelligent contract based on the detection result, and carrying out point deduction operation or point addition operation on a preset point account of the data storage person based on the second intelligent contract.
Optionally, the block chain where the block link point is located is composed of a plurality of channel blocks, the channel blocks are isolated from one another, the channel blocks are divided according to a preset channel division rule, and data stored in the channel blocks are accessed by a data requester having an access channel block authority;
under the condition that the detection result meets a first preset condition, storing target data to be stored at a preset position in a block chain, and broadcasting check information corresponding to the target data to be stored, wherein the method comprises the following steps:
determining a target channel block corresponding to the target data based on a preset channel division rule under the condition that the detection result meets a first preset condition;
and storing the target data to the target channel block, and broadcasting the verification information corresponding to the target data in the target channel block.
Optionally, the method further includes:
receiving data request information sent by a data requester, wherein the data request information carries digital certificate identity information of the data requester and verification information of data to be requested;
and under the condition that the digital certificate identity information of the data requester passes verification and the data requester has the right to access the channel block corresponding to the verification information, granting the data requester the right to acquire the data to be requested corresponding to the verification information so that the data requester acquires the data to be requested.
Optionally, when the digital certificate identity information of the data storage passes verification, triggering a first intelligent contract to detect validity of target data to be stored, and obtaining a detection result, where the detection result includes:
and under the condition that the identity information of the digital certificate of the data storage person passes verification, triggering a first intelligent contract to detect the validity of the target data by adopting a preset data detection model to obtain a detection result, wherein the preset data detection model is deployed in the first intelligent contract.
Optionally, the target data includes image data, where the image data includes image data related to the base station device, and when the digital certificate identity information of the data storage is verified, the first intelligent contract is triggered to detect validity of the target data by using a preset data detection model to obtain a detection result, where the detection result includes:
and under the condition that the identity information of the digital certificate of the data storage person passes verification, triggering a first intelligent contract to identify whether the model of the base station equipment contained in the image data is matched with the model of the preset uploading base station equipment or not by adopting a preset data detection model, or detecting the uniqueness of the image data to obtain a detection result.
Optionally, the preset data detection model is a data detection model constructed by using a Cascade R-CNN algorithm.
In a second aspect, an embodiment of the present application provides a base station device data management apparatus, which is applied to a block chain node, and includes:
the first processing module is used for acquiring data validity detection rule information and deploying a first intelligent contract corresponding to the data validity detection rule information to a block chain network where block chain nodes are located, wherein the first intelligent contract is used for detecting the validity of the data information;
the first receiving module is used for receiving a data storage request issued by a data storage person, wherein the data storage request carries digital certificate identity information of the data storage person and target data to be stored;
the triggering module is used for triggering the first intelligent contract to detect the validity of the target data to be stored under the condition that the digital certificate identity information of the data storage person passes verification so as to obtain a detection result;
and the second processing module is used for storing the target data to be stored at a preset position in the block chain and broadcasting the verification information corresponding to the target data to be stored under the condition that the detection result meets the first preset condition.
In a third aspect, an embodiment of the present application provides an electronic device, including: the system comprises a processor, a communication interface, a memory and a communication bus; the processor, the communication interface and the memory complete mutual communication through a bus; a memory for storing a computer program; a processor for executing the program stored in the memory to implement the steps of the data management method of the base station apparatus according to the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the steps of the base station device data management method according to the first aspect are implemented.
In the method, the device and the electronic device for managing the data of the base station equipment in the embodiment of the application, by acquiring the data validity detection rule information, deploying the first intelligent contract corresponding to the data validity detection rule information in the block chain network where the block chain link point is located, wherein the first intelligent contract is used for detecting the validity of the data information, then receiving the data storage request issued by the data storage user, wherein the data storage request carries the digital certificate identity information of the data storage user and the target data to be stored, and triggering the first intelligent contract to detect the validity of the target data to be stored under the condition that the digital certificate identity information of the data storage user passes verification to obtain the detection result, and then storing the target data to be stored at the preset position in the block chain under the condition that the detection result meets the first preset condition, and broadcasting the verification information corresponding to the target data to be stored. By the embodiment of the application, the safety of the stored data and the traceability of data storage can be effectively ensured by utilizing the anti-tampering and traceability characteristics of the block chain, in addition, the validity of the data stored by the data storage person can be detected by utilizing the first intelligent contract arranged in the block chain, and the validity of the data stored in the block chain is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a first flowchart illustrating a data management method for a base station device according to an embodiment of the present application;
fig. 2 is a second flowchart of a data management method for a base station device according to an embodiment of the present application;
fig. 3 is a third flowchart illustrating a data management method for a base station device according to an embodiment of the present application;
fig. 4 is a fourth flowchart illustrating a data management method for a base station device according to an embodiment of the present application;
fig. 5 is a fifth flowchart illustrating a data management method for a base station device according to an embodiment of the present application;
fig. 6 is a schematic diagram illustrating a module composition of a base station device data management apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The embodiment of the application provides a base station equipment data management method and device and electronic equipment.
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As shown in fig. 1, an execution subject of the method may be a server, where the server may be an independent server or a server cluster composed of multiple servers, and the server may be a server capable of performing data management on the base station device. The method can effectively ensure the safety of the stored data and the traceability of the data storage by utilizing the anti-tampering and traceability characteristics of the block chain, and in addition, the validity of the data stored by the data storage person can be detected by utilizing the first intelligent contract deployed in the block chain, thereby further improving the validity of the data stored in the block chain. The method is applied to the block chain node, and specifically comprises the following steps:
in step S102, data validity detection rule information is acquired, and a first intelligent contract corresponding to the data validity detection rule information is deployed in a block chain network where block chain nodes are located, where the first intelligent contract is used to detect validity of the data information.
The data validity detection rule information may be image validity detection rule information, video validity detection rule information, audio validity detection rule information, or the like, and the embodiment of the present specification does not specifically limit the type information of the data validity detection rule information. As an example, the image validity detection rule information may include: whether the image type stored by the data storage person is in accordance with the image type required to be stored is detected, for example, according to the fact that the image which needs to be uploaded by the data storage person A is an image of an AAU device is specified, if the image to be stored which is uploaded by the current data storage person A is detected to be the image of the AAU device, the data stored by the data storage person A is indicated to be in accordance with the image validity detection rule. If the image to be stored uploaded by the current data memory A is detected to be the image of the BBU equipment, the data stored by the data memory A is indicated to be not in accordance with the image validity detection rule. Alternatively, the image validity detection rule information may further include: the size of the image to be stored uploaded by the data storage person and whether the definition of the image is consistent with the size and the definition of the image required to be stored are detected. The first intelligent contract may be a piece of code (contract) that the data depositor triggers when issuing a data storage request to the blockchain. The content of the first intelligent contract may include an action triggered according to the data validity detection rule information.
In step S104, a data storage request issued by the data storage owner is received, where the data storage request carries digital certificate identity information of the data storage owner and target data to be stored.
The data storage may be a user who needs to store data into the blockchain network.
In implementation, the terminal device of the data storage user may be pre-installed with a corresponding application program, when a user needs to store data into the blockchain, a data storage instruction may be triggered, the application program may acquire the digital certificate identity information of the data storage user and data information to be stored, and may generate a data storage request through the acquired information, and then may send the data storage request to the blockchain network where the blockchain is located through the application program.
In step S106, under the condition that the digital certificate identity information of the data storage is verified, the first intelligent contract is triggered to detect the validity of the target data to be stored, so as to obtain a detection result.
Wherein, the detection result may include: a detection result by validity detection and a detection result by non-validity detection.
In implementation, through the processing in step S104, after receiving the data storage request issued by the data storage user, the identity information of the data storage user may be first matched with the identity information of the user authorized to access the network where the blockchain is located and stored in advance in the blockchain, and if the identity information of the data storage user is matched with the identity information of the user authorized to access the network where the blockchain is located and stored in advance in the user identity information authorized to access the network where the blockchain is located, it is determined that the identity information of the data storage user passes the verification, and further, the first intelligent contract pre-arranged in the blockchain may be triggered to perform validity detection on the target data to be stored and issued by the data storage user, so as to obtain a detection result.
In step S108, when the detection result satisfies the first preset condition, the target data to be stored is stored at a predetermined position in the block chain, and the check information corresponding to the target data to be stored is broadcast.
The first preset condition may be that the detection result passes validity detection. The predetermined position may be a blockchain storage position corresponding to a data type of the data to be stored, or may also be a blockchain storage position corresponding to a data storage owner of the data to be stored, or may also be a channel block corresponding to an access right possessed by the data storage owner of the data to be stored, and the predetermined position is not particularly limited in this specification. The verification information may be summary information corresponding to the target data to be stored.
In some optional implementation manners, through the processing in the step S106, a first intelligent contract is triggered to detect validity of target data to be stored, so as to obtain a detection result, and when the obtained detection result is that the data to be stored passes data validity detection, right information corresponding to the data storage person identity information may be searched according to user right information and digital certificate identity information of the data storage person, which are pre-stored in a block chain, and then the target data to be stored is stored in a channel block corresponding to the data storage person right information, and verification information corresponding to the target data to be stored is broadcast in the channel block.
As can be seen from the above technical solutions provided by the embodiments of the present application, in the embodiments of the present application, data validity detection rule information is obtained, a first intelligent contract corresponding to the data validity detection rule information is deployed in a block chain network where a block chain node is located, the first intelligent contract is used for detecting validity of the data information, then a data storage request issued by a data storage user is received, where the data storage request carries digital certificate identity information of the data storage user and target data to be stored, and in a case that the digital certificate identity information of the data storage user passes verification, the first intelligent contract is triggered to detect validity of the target data to be stored to obtain a detection result, and then, in a case that the detection result satisfies a first preset condition, the target data to be stored is stored at a predetermined position in a block chain, and broadcasting the verification information corresponding to the target data to be stored. By the embodiment of the application, the safety of the stored data and the traceability of data storage can be effectively ensured by utilizing the anti-tampering and traceability characteristics of the block chain, in addition, the validity of the data stored by the data storage person can be detected by utilizing the first intelligent contract arranged in the block chain, and the validity of the data stored in the block chain is further improved.
Further, as shown in fig. 2, the method may further include the following processing procedures from step S110 to step S112, and specifically, refer to the following specific processing procedures from step S110 to step S112.
In step S110, preset rule information corresponding to the incentive mechanism and the penalty mechanism is obtained, and a second intelligent contract corresponding to the preset rule information is deployed in the block chain network where the block link point is located, where the second intelligent contract is used to perform a credit deduction operation or a credit addition operation on a preset credit account of the data storage.
The incentive mechanism may be an incentive mechanism established for providing more effective data for the incentive user to store, for example, in a case that the blockchain detects that the data issued by the data storage meets the data effectiveness condition, a bonus point may be provided for the data storage, and the like. Alternatively, in the case that the blockchain detects that the number of the valid data issued by the data storage is greater than the preset number, a credit reward and the like can be provided for the data storage. Correspondingly, the penalty mechanism may also be a penalty mechanism established for motivating the user to provide more effective data for storage, for example, in the case that the blockchain detects that the data issued by the data storage does not satisfy the data effectiveness condition, a penalty of deducting points may be given to the data storage, so as to urge the data provider to provide effective data information for storage. The second intelligent contract may be a piece of code (contract) that the data depositor triggers if the provided digital certificate identity information is verified. The content of the second intelligent contract may include an action triggered based on the detection result of the data validity detection. The preset point account may be a point account which is stored in the block chain in advance and corresponds to the identity information of the user.
In step S112, based on the detection result, a second intelligent contract is triggered, and a point deduction operation or a point increment operation is performed on a preset point account of the data storage person based on the second intelligent contract.
In implementation, through the processing in step S112, after a second intelligent contract corresponding to preset rule information is deployed in the blockchain network where the blockchain node is located, when the first intelligent contract is triggered to detect the validity of the target data and a detection result is obtained, if the detection result indicates that the data to be stored is data that does not pass the validity detection, the second intelligent contract is triggered, and an integral deduction operation is performed on a preset integral account of the data storage user based on the second intelligent contract. And if the detection result indicates that the data to be stored is the data passing the validity detection, triggering the second intelligent contract, and performing point increment operation on a preset point account of the data storage person based on the second intelligent contract.
Furthermore, in order to further guarantee the security of data storage in the block chain, the block chain may be divided into a plurality of channel blocks, the data stored in each channel block may only be accessed by an accessor having a right to access the channel block, and the data stored in the channel block may not be accessed by an accessor not having the right to access the channel block, so that the security of the data stored in the block chain may be effectively guaranteed.
Specifically, the block chain in which the block link point is located may be formed by a plurality of channel blocks, the channel blocks are separated from each other, the channel blocks are divided according to a preset channel division rule, each channel block is a physical block chain, and is stored and transmitted in a manner separated from data of other channel blocks, and data stored in the channel block can only be accessed by a data requester having an authority to access the channel block.
The preset channel division rule may be that the block chain is divided according to a data type of data stored in the block chain, or the preset channel division rule may be that the block chain is divided according to a data access permission level corresponding to a data visitor, or the preset channel division rule may be that the block chain is divided according to a device type corresponding to data to be stored, or the preset channel division rule may be that the block chain is divided based on an access requirement of a data requester. The preset channel division rule is not specifically limited in the embodiments of the present specification.
Each channel block corresponds to an account book, and the account book is shared by all nodes on the corresponding channel block, so that any node on the channel block can quickly inquire the related information of the data stored in the channel block. When submitting a transaction of newly added data information to the block chain, the data provider (such as a base station device image provider) firstly verifies the identity on a node, the identity is verified after passing, then the data transaction information is verified, the data can be stored in a corresponding channel block and the account book is updated after passing the data transaction information verification, or the data information to be stored can be encrypted firstly after passing the data transaction information verification, then the encrypted data information is stored in the corresponding channel block and the account book is updated, and finally the transaction is recognized to other nodes in the channel block.
Further, as shown in fig. 3, the processing method of step S108 may be various, and an alternative processing method is provided below, which may specifically refer to the specific processing procedures of step S1082 to step S1084.
In step S1082, if the detection result satisfies the first preset condition, the target channel block corresponding to the target data is determined based on a preset channel partition rule.
As an example, if the preset channel division rule is a rule for dividing the block chain according to the data type of the data stored in the block chain, after the processing in step S106 is performed, the first intelligent contract is triggered to detect the validity of the target data, and a detection result is obtained, and when the detection result is data information that the target data is valid, a channel block corresponding to the data type may be searched based on the data type of the data to be stored, and the searched channel block corresponding to the data type may be determined as the target channel block.
In step S1084, the target data is stored in the target channel block, and the verification information corresponding to the target data is broadcasted in the target channel block.
In implementation, after the target channel block corresponding to the target data is determined through the processing in step S1082, the data information to be stored may be stored in the target channel block, and the verification information corresponding to the target data is determined according to the target data, where the verification information may be index information of the data to be stored, and then the verification information corresponding to the target data is broadcasted in the target channel block.
Further, as shown in fig. 4, the method may further include the following processing procedure from step S114 to step S116, and specifically, refer to the following specific processing procedure from step S114 to step S116.
In step S114, data request information sent by a data requester is received, where the data request information carries digital certificate identity information of the data requester and verification information of data to be requested.
The digital certificate identity information may use a digital certificate CA as a certificate for identity authentication. The digital certificate CA contains identity information and public key information of the certificate owner, and a digital signature. The digital certificate CA can be used for authenticating the identities of two communication parties and guaranteeing the safety of the communication process.
In step S116, if the digital certificate identity information of the data requestor passes the verification and the data requestor has the right to access the channel block corresponding to the verification information, the data requestor is granted the right to acquire the data to be requested corresponding to the verification information, so that the data requestor acquires the data to be requested.
Further, as shown in fig. 5, the processing method of step S106 may be various, and an alternative processing method is provided below, which may be specifically referred to the specific processing procedure of step S1062 below.
In step S1062, when the digital certificate identity information of the data storage is verified, the first intelligent contract is triggered to detect the validity of the target data by using a preset data detection model, so as to obtain a detection result.
The target data may include image data, and the image data may include image data related to a base station device, such as image data of an AAU device, image data of a BBU device, and the like, which is not specifically limited in this embodiment of the present specification. The preset data detection model can be a data detection model constructed by using a Cascade R-CNN algorithm.
The processing method of step S1062 may be various, and an alternative processing method is provided below, which may be specifically referred to as the following specific processing procedure of step N2.
In step N2, when the digital certificate identity information of the data storage is verified, the first intelligent contract is triggered to identify whether the model of the base station device included in the image data matches the model of the preset upload base station device by using a preset data detection model, or the uniqueness of the image data is detected to obtain a detection result.
The triggering of the first intelligent contract to detect the uniqueness of the image data by using the preset data detection model may include: the data index is calculated according to the shooting time of the image data, the size of the image data and the like, or the hash value of the image data is calculated according to the shooting time of the image data, the size of the image data and the like, then the data index or the hash value of the image data is matched with the data index or the hash value of the image data which is stored by the data storage person in history, if the data index or the hash value of the image data is not matched with the data index or the hash value of the image data, the image data is determined to be unique, and therefore the problem that the data storage person uploads the image data shot before is effectively solved.
In some optional implementation manners, a preset data detection model corresponding to the device type may be constructed in advance according to the device type, and then the validity of the image data corresponding to the device type is detected by using the preset data detection model. For example, the base station device may include, for example, an AAU device, a BBU device, an RRU device, and the like, and correspondingly, the preset data detection model corresponding to the device may be an AAU image data detection model, a BBU image data detection model, an RRU image data detection model, and the like, so that when a block chain receives a data storage request issued by a data storage user, the identity of the data storage user may be determined based on digital certificate identity information of the data storage user carried in the data storage request, and then a service field to which the data storage user belongs may be determined according to the identity of the data storage user, and then a device type corresponding to data that the data storage user needs to store may be determined. And then, validity detection can be carried out on the data issued by the data storage person based on the preset data detection model which is constructed in advance. The method for detecting the validity of the data stored by the data storage person by adopting the preset data detection model corresponding to the equipment type can further improve the accuracy of image recognition.
In some optional implementation manners, the preset data detection model is built on a PyTorch deep learning framework, and first, effective image data (such as picture data of base station equipment) collected manually is preprocessed, then, the preprocessed image data is converted into a COCO format data set, then, an initial framework of the preset data detection model based on a Cascade R-CNN algorithm can be built through a python toolbox, a trained preset data detection model is obtained by initializing, iteratively training and testing the initial framework, and finally, validity verification of the validity of the image data uploaded to the block link point can be performed by calling the trained preset data detection model.
As can be seen from the technical solutions provided in the embodiments of the present application, by obtaining data validity detection rule information, deploying a first intelligent contract corresponding to the data validity detection rule information in a block chain network where block chain nodes are located, where the first intelligent contract is used to detect validity of data information, and then receiving a data storage request issued by a data storage owner, where the data storage request carries digital certificate identity information of the data storage owner and target data to be stored, and in a case that the digital certificate identity information of the data storage owner is verified, triggering the first intelligent contract to detect validity of the target data to be stored to obtain a detection result, and then, in a case that the detection result satisfies a first preset condition, storing the target data to be stored at a predetermined position in a block chain, and broadcasting the verification information corresponding to the target data to be stored. By the aid of the method and the device, safety of stored data and traceability of data storage can be effectively guaranteed by means of anti-tampering and traceability of the block chain, in addition, effectiveness of data stored by a data storage person can be detected by means of the first intelligent contract deployed in the block chain, and effectiveness of the data stored in the block chain is further improved.
Corresponding to the base station device data management method provided in the foregoing embodiment, based on the same technical concept, an embodiment of the present application further provides a base station device data management apparatus, and fig. 6 is a schematic diagram of module composition of the base station device data management apparatus provided in the embodiment of the present application, where the base station device data management apparatus is configured to execute the base station device data management method described in fig. 1 to fig. 5, and as shown in fig. 6, the base station device data management apparatus is applied to a block chain node, and the base station device data management apparatus includes:
the first processing module 601 is configured to acquire data validity detection rule information, and deploy a first intelligent contract corresponding to the data validity detection rule information to a block chain network where a block chain link point is located, where the first intelligent contract is used to detect validity of the data information;
a first receiving module 602, configured to receive a data storage request issued by a data storage owner, where the data storage request carries digital certificate identity information of the data storage owner and target data to be stored;
the triggering module 603 is configured to, when the digital certificate identity information of the data storage passes verification, trigger the first intelligent contract to detect validity of target data to be stored, so as to obtain a detection result;
the second processing module 604 is configured to, when the detection result meets the first preset condition, store the target data to be stored at a predetermined position in the block chain, and broadcast the check information corresponding to the target data to be stored.
Optionally, the apparatus further comprises:
the third processing module is used for acquiring preset rule information corresponding to the excitation mechanism and the penalty mechanism, and deploying a second intelligent contract corresponding to the preset rule information in a block chain network where block chain link points are located, wherein the second intelligent contract is used for carrying out point deduction operation or point increment operation on a preset point account of a data storage person;
and the fourth processing module is used for triggering a second intelligent contract based on the detection result and carrying out integral deduction operation or integral addition operation on a preset integral account of the data storage person based on the second intelligent contract.
Optionally, the block chain where the block link point is located is composed of a plurality of channel blocks, the channel blocks are isolated from each other, the channel blocks are divided according to a preset channel division rule, and data stored in the channel blocks are accessed by a data requester with an access channel block authority;
a second processing module comprising:
the determining unit is used for determining a target channel block corresponding to the target data based on a preset channel division rule under the condition that the detection result meets a first preset condition;
and the processing unit is used for storing the target data to the target channel block and broadcasting the verification information corresponding to the target data in the target channel block.
Optionally, the apparatus further comprises:
the second receiving module is used for receiving data request information sent by a data requester, wherein the data request information carries digital certificate identity information of the data requester and verification information of data to be requested;
and the authority management module is used for granting the data requester the authority to acquire the data to be requested corresponding to the verification information under the condition that the digital certificate identity information of the data requester passes verification and the data requester has the authority to access the channel block corresponding to the verification information, so that the data requester acquires the data to be requested.
Optionally, the triggering module is configured to: and under the condition that the identity information of the digital certificate of the data storage person passes verification, triggering a first intelligent contract to detect the validity of the target data by adopting a preset data detection model to obtain a detection result, wherein the preset data detection model is deployed in the first intelligent contract.
Optionally, the target data includes image data, the image data includes image data related to a base station device, and the triggering module is configured to: and under the condition that the identity information of the digital certificate of the data storage person passes verification, triggering a first intelligent contract to identify whether the model of the base station equipment contained in the image data is matched with the model of the preset uploading base station equipment or not by adopting a preset data detection model, or detecting the uniqueness of the image data to obtain a detection result.
Optionally, the preset data detection model is a data detection model constructed by using a Cascade R-CNN algorithm.
As can be seen from the above technical solutions provided by the embodiments of the present application, in the embodiments of the present application, data validity detection rule information is obtained, a first intelligent contract corresponding to the data validity detection rule information is deployed in a block chain network where a block chain node is located, the first intelligent contract is used for detecting validity of the data information, then a data storage request issued by a data storage user is received, where the data storage request carries digital certificate identity information of the data storage user and target data to be stored, and in a case that the digital certificate identity information of the data storage user passes verification, the first intelligent contract is triggered to detect validity of the target data to be stored to obtain a detection result, and then, in a case that the detection result satisfies a first preset condition, the target data to be stored is stored at a predetermined position in a block chain, and broadcasting the verification information corresponding to the target data to be stored. By the aid of the method and the device, safety of stored data and traceability of data storage can be effectively guaranteed by means of anti-tampering and traceability of the block chain, in addition, effectiveness of data stored by a data storage person can be detected by means of the first intelligent contract deployed in the block chain, and effectiveness of the data stored in the block chain is further improved.
The base station device data management apparatus provided in the embodiment of the present application can implement each process in the embodiment corresponding to the base station device data management method, and is not described here again to avoid repetition.
It should be noted that the base station device data management apparatus provided in the embodiment of the present application and the base station device data management method provided in the embodiment of the present application are based on the same application concept, and therefore specific implementation of the embodiment may refer to implementation of the foregoing base station device data management method, and repeated details are not repeated.
Based on the same technical concept, the embodiment of the present application further provides an electronic device, where the electronic device is configured to execute the method for managing data of a base station device, and fig. 7 is a schematic structural diagram of an electronic device implementing various embodiments of the present application, and as shown in fig. 7, the electronic device may generate a relatively large difference due to different configurations or performances, and may include one or more processors 701 and a memory 702, where the memory 702 may store one or more stored applications or data. Memory 702 may be, among other things, transient storage or persistent storage. The application programs stored in memory 702 may include one or more modules (not shown), each of which may include a series of computer-executable instructions for the electronic device. Still further, the processor 701 may be configured to communicate with the memory 702 to execute a series of computer-executable instructions in the memory 702 on the electronic device. The electronic device may also include one or more power supplies 703, one or more wired or wireless network interfaces 704, one or more input-output interfaces 705, one or more keyboards 706.
Specifically, in this embodiment, the electronic device includes a processor, a communication interface, a memory, and a communication bus; the processor, the communication interface and the memory complete mutual communication through a bus; a memory for storing a computer program; a processor for executing the program stored in the memory, implementing the following method steps:
acquiring data validity detection rule information, and deploying a first intelligent contract corresponding to the data validity detection rule information in a block chain network where block chain link points are located, wherein the first intelligent contract is used for detecting the validity of the data information;
receiving a data storage request issued by a data storage person, wherein the data storage request carries digital certificate identity information of the data storage person and target data to be stored;
under the condition that the identity information of the digital certificate of the data storage person passes verification, triggering a first intelligent contract to detect the validity of target data to be stored to obtain a detection result;
and under the condition that the detection result meets a first preset condition, storing the target data to be stored at a preset position in the block chain, and broadcasting the verification information corresponding to the target data to be stored.
An embodiment of the present application further provides a computer-readable storage medium, in which a computer program is stored, and when the computer program is executed by a processor, the following method steps are implemented:
acquiring data validity detection rule information, and deploying a first intelligent contract corresponding to the data validity detection rule information in a block chain network where block chain link points are located, wherein the first intelligent contract is used for detecting the validity of the data information;
receiving a data storage request issued by a data storage person, wherein the data storage request carries digital certificate identity information of the data storage person and target data to be stored;
under the condition that the identity information of the digital certificate of the data storage person passes verification, triggering a first intelligent contract to detect the validity of target data to be stored to obtain a detection result;
and under the condition that the detection result meets a first preset condition, storing the target data to be stored at a preset position in the block chain, and broadcasting the verification information corresponding to the target data to be stored.
As can be seen from the above technical solutions provided by the embodiments of the present application, in the embodiments of the present application, data validity detection rule information is obtained, a first intelligent contract corresponding to the data validity detection rule information is deployed in a block chain network where a block chain node is located, the first intelligent contract is used for detecting validity of the data information, then a data storage request issued by a data storage user is received, where the data storage request carries digital certificate identity information of the data storage user and target data to be stored, and in a case that the digital certificate identity information of the data storage user passes verification, the first intelligent contract is triggered to detect validity of the target data to be stored to obtain a detection result, and then, in a case that the detection result satisfies a first preset condition, the target data to be stored is stored at a predetermined position in a block chain, and broadcasting the verification information corresponding to the target data to be stored. By the embodiment of the application, the safety of the stored data and the traceability of data storage can be effectively ensured by utilizing the anti-tampering and traceability characteristics of the block chain, in addition, the validity of the data stored by the data storage person can be detected by utilizing the first intelligent contract arranged in the block chain, and the validity of the data stored in the block chain is further improved.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, an electronic device includes one or more processors (CPUs), input/output interfaces, a network interface, and a memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art to which the present application pertains. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A data management method of a base station device is applied to a block chain node, and the method comprises the following steps:
acquiring data validity detection rule information, and deploying a first intelligent contract corresponding to the data validity detection rule information in a block chain network where block chain link points are located, wherein the first intelligent contract is used for detecting the validity of the data information;
receiving a data storage request issued by a data storage person, wherein the data storage request carries digital certificate identity information of the data storage person and target data to be stored;
under the condition that the identity information of the digital certificate of the data storage person passes verification, triggering the first intelligent contract to detect the validity of the target data to be stored to obtain a detection result;
and under the condition that the detection result meets a first preset condition, storing the target data to be stored at a preset position in the block chain, and broadcasting the verification information corresponding to the target data to be stored.
2. The method of claim 1, further comprising:
acquiring preset rule information corresponding to an excitation mechanism and a penalty mechanism, and deploying a second intelligent contract corresponding to the preset rule information in a block chain network where block chain link points are located, wherein the second intelligent contract is used for carrying out point deduction operation or point increment operation on a preset point account of the data storage person;
and triggering the second intelligent contract based on the detection result, and carrying out point deduction operation or point addition operation on a preset point account of the data storage person based on the second intelligent contract.
3. The method according to claim 1, wherein the blockchain in which the blockchain node is located is composed of a plurality of channel blocks, the channel blocks are isolated from each other, the channel blocks are divided according to a preset channel division rule, and data stored in the channel blocks are accessed by a data requester having an authority to access the channel blocks;
under the condition that the detection result meets a first preset condition, storing the target data to be stored at a preset position in the block chain, and broadcasting check information corresponding to the target data to be stored, including:
determining a target channel block corresponding to the target data based on the preset channel division rule under the condition that the detection result meets a first preset condition;
and storing the target data to the target channel block, and broadcasting the verification information corresponding to the target data in the target channel block.
4. The method of claim 3, further comprising:
receiving data request information sent by a data requester, wherein the data request information carries digital certificate identity information of the data requester and verification information of data to be requested;
and under the condition that the digital certificate identity information of the data requester passes verification and the data requester has the authority of accessing the channel block corresponding to the verification information, the data requester is granted the authority of acquiring the data to be requested corresponding to the verification information, so that the data requester acquires the data to be requested.
5. The method according to claim 1, wherein the triggering the first intelligent contract to detect the validity of the target data to be stored when the digital certificate identity information of the data storage person passes verification to obtain a detection result comprises:
and under the condition that the digital certificate identity information of the data storage person passes verification, triggering the first intelligent contract to detect the validity of the target data by adopting a preset data detection model to obtain a detection result, wherein the preset data detection model is deployed in the first intelligent contract.
6. The method according to claim 5, wherein the target data comprises image data, the image data comprises image data related to a base station device, and the triggering of the first smart contract in the case that the digital certificate identity information of the data storage device is verified results in a detection result by detecting validity of the target data by using a preset data detection model comprises:
and under the condition that the digital certificate identity information of the data storage person passes verification, triggering the first intelligent contract to identify whether the model of the base station equipment contained in the image data is matched with the model of preset uploading base station equipment or not by adopting a preset data detection model, or detecting the uniqueness of the image data to obtain a detection result.
7. The method according to claim 5, wherein the preset data detection model is a data detection model constructed by using a Cascade R-CNN algorithm.
8. A base station device data management apparatus, applied to a block chain node, the apparatus comprising:
the first processing module is used for acquiring data validity detection rule information and deploying a first intelligent contract corresponding to the data validity detection rule information to a block chain network where block chain nodes are located, wherein the first intelligent contract is used for detecting the validity of the data information;
the system comprises a first receiving module, a second receiving module and a third receiving module, wherein the first receiving module is used for receiving a data storage request issued by a data storage person, and the data storage request carries digital certificate identity information of the data storage person and target data to be stored;
the triggering module is used for triggering the first intelligent contract to detect the validity of the target data to be stored under the condition that the digital certificate identity information of the data storage person passes verification so as to obtain a detection result;
and the second processing module is used for storing the target data to be stored at a preset position in the block chain and broadcasting the check information corresponding to the target data to be stored under the condition that the detection result meets a first preset condition.
9. An electronic device comprising a processor, a communication interface, a memory, and a communication bus; the processor, the communication interface and the memory complete mutual communication through a bus; the memory is used for storing a computer program; the processor is configured to execute the program stored in the memory to implement the steps of the base station apparatus data management method according to any one of claims 1 to 6.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the base station device data management method steps of any one of claims 1 to 6.
CN202110284692.7A 2021-03-17 2021-03-17 Base station equipment data management method and device and electronic equipment Active CN115114603B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110284692.7A CN115114603B (en) 2021-03-17 2021-03-17 Base station equipment data management method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110284692.7A CN115114603B (en) 2021-03-17 2021-03-17 Base station equipment data management method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN115114603A true CN115114603A (en) 2022-09-27
CN115114603B CN115114603B (en) 2024-06-11

Family

ID=83323333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110284692.7A Active CN115114603B (en) 2021-03-17 2021-03-17 Base station equipment data management method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN115114603B (en)

Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108681943A (en) * 2018-05-18 2018-10-19 百度在线网络技术(北京)有限公司 A kind of data processing method, device, equipment and the storage medium of block chain network
US20180349621A1 (en) * 2017-06-01 2018-12-06 Schvey, Inc. d/b/a/ Axoni Distributed privately subspaced blockchain data structures with secure access restriction management
CN109189727A (en) * 2018-09-14 2019-01-11 江西理工大学 A kind of block chain ciphertext cloud storage sharing method based on property broker re-encryption
CN109522735A (en) * 2018-11-29 2019-03-26 上海中信信息发展股份有限公司 A kind of data permission verification method and device based on intelligent contract
US20190140848A1 (en) * 2017-11-07 2019-05-09 Spinbackup Inc. Decentralized Access Control for Cloud Services
US20190172282A1 (en) * 2017-12-02 2019-06-06 International Business Machines Corporation Blockchain managed storage
CN110555296A (en) * 2019-08-01 2019-12-10 阿里巴巴集团控股有限公司 identity verification method, device and equipment based on block chain
CN110795755A (en) * 2019-12-26 2020-02-14 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain
CN110826111A (en) * 2019-06-26 2020-02-21 腾讯科技(深圳)有限公司 Test supervision method, device, equipment and storage medium
CN111008821A (en) * 2019-11-29 2020-04-14 山东爱城市网信息技术有限公司 Resume record management method, device and medium based on block chain
CN111046346A (en) * 2019-11-21 2020-04-21 山东爱城市网信息技术有限公司 Book copyright protection platform based on block chain, equipment and medium
CN111181946A (en) * 2019-12-24 2020-05-19 浙江大学 Credible traceability system and method based on block chain and Internet of things
US20200233858A1 (en) * 2019-01-22 2020-07-23 International Business Machines Corporation Peer partitioning
CN111460457A (en) * 2020-03-31 2020-07-28 腾讯科技(深圳)有限公司 Real estate property registration supervision method, device, electronic equipment and storage medium
CN111737654A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN111741036A (en) * 2020-08-28 2020-10-02 支付宝(杭州)信息技术有限公司 Trusted data transmission method, device and equipment
CN111832069A (en) * 2020-06-05 2020-10-27 广东科学技术职业学院 Multi-block chain on-chain data storage system and method based on cloud computing
CN111881481A (en) * 2020-08-05 2020-11-03 杭州翔毅科技有限公司 Block chain-based medical data processing method, device, equipment and storage medium
CN111984734A (en) * 2020-09-02 2020-11-24 深圳壹账通智能科技有限公司 Data processing method, device and equipment based on block chain and storage medium
CN112070342A (en) * 2020-07-27 2020-12-11 中国移动通信集团福建有限公司 Micro-service evaluation method and device, electronic equipment and computer-readable storage medium
CN112184222A (en) * 2020-05-29 2021-01-05 支付宝(杭州)信息技术有限公司 Service processing method, device and equipment based on block chain
CN115114630A (en) * 2021-03-17 2022-09-27 中国移动通信集团福建有限公司 Data sharing method and device and electronic equipment

Patent Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180349621A1 (en) * 2017-06-01 2018-12-06 Schvey, Inc. d/b/a/ Axoni Distributed privately subspaced blockchain data structures with secure access restriction management
CN110870254A (en) * 2017-06-01 2020-03-06 斯凯维公司D/B/A阿索尼 Distributed private subspace blockchain data structure with secure access restriction management
US20190140848A1 (en) * 2017-11-07 2019-05-09 Spinbackup Inc. Decentralized Access Control for Cloud Services
US20190172282A1 (en) * 2017-12-02 2019-06-06 International Business Machines Corporation Blockchain managed storage
CN108681943A (en) * 2018-05-18 2018-10-19 百度在线网络技术(北京)有限公司 A kind of data processing method, device, equipment and the storage medium of block chain network
CN109189727A (en) * 2018-09-14 2019-01-11 江西理工大学 A kind of block chain ciphertext cloud storage sharing method based on property broker re-encryption
CN109522735A (en) * 2018-11-29 2019-03-26 上海中信信息发展股份有限公司 A kind of data permission verification method and device based on intelligent contract
US20200233858A1 (en) * 2019-01-22 2020-07-23 International Business Machines Corporation Peer partitioning
CN110826111A (en) * 2019-06-26 2020-02-21 腾讯科技(深圳)有限公司 Test supervision method, device, equipment and storage medium
CN110555296A (en) * 2019-08-01 2019-12-10 阿里巴巴集团控股有限公司 identity verification method, device and equipment based on block chain
CN111046346A (en) * 2019-11-21 2020-04-21 山东爱城市网信息技术有限公司 Book copyright protection platform based on block chain, equipment and medium
CN111008821A (en) * 2019-11-29 2020-04-14 山东爱城市网信息技术有限公司 Resume record management method, device and medium based on block chain
CN111181946A (en) * 2019-12-24 2020-05-19 浙江大学 Credible traceability system and method based on block chain and Internet of things
CN110795755A (en) * 2019-12-26 2020-02-14 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain
CN111460457A (en) * 2020-03-31 2020-07-28 腾讯科技(深圳)有限公司 Real estate property registration supervision method, device, electronic equipment and storage medium
CN112184222A (en) * 2020-05-29 2021-01-05 支付宝(杭州)信息技术有限公司 Service processing method, device and equipment based on block chain
CN111832069A (en) * 2020-06-05 2020-10-27 广东科学技术职业学院 Multi-block chain on-chain data storage system and method based on cloud computing
CN112070342A (en) * 2020-07-27 2020-12-11 中国移动通信集团福建有限公司 Micro-service evaluation method and device, electronic equipment and computer-readable storage medium
CN111881481A (en) * 2020-08-05 2020-11-03 杭州翔毅科技有限公司 Block chain-based medical data processing method, device, equipment and storage medium
CN111737654A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN111741036A (en) * 2020-08-28 2020-10-02 支付宝(杭州)信息技术有限公司 Trusted data transmission method, device and equipment
CN111984734A (en) * 2020-09-02 2020-11-24 深圳壹账通智能科技有限公司 Data processing method, device and equipment based on block chain and storage medium
CN115114630A (en) * 2021-03-17 2022-09-27 中国移动通信集团福建有限公司 Data sharing method and device and electronic equipment

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
JINGJING MA: "Blockchain and Northbound Data Trusted Storage", 《IEEE 3RD INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION AND COMMUNICATION TECHNOLOGY》, 15 November 2020 (2020-11-15) *
吴振铨;梁宇辉;康嘉文;余荣;何昭水;: "基于联盟区块链的智能电网数据安全存储与共享系统", 计算机应用, no. 10, 10 October 2017 (2017-10-10) *
宋俊典: "基于区块链的数据治理协同方法", 《计算机应用》, vol. 38, no. 9, 10 September 2018 (2018-09-10), pages 2500 - 2506 *
徐健;陈志德;龚平;王可可;: "基于区块链网络的医疗记录安全储存访问方案", 计算机应用, no. 05, 21 January 2019 (2019-01-21) *
李瑾;仵松颀;张森林;陆月明;: "基于区块链的分布式电能量数据可信存储机制", 网络与信息安全学报, no. 02, 15 April 2020 (2020-04-15) *
郭叶斌;徐欣;: "基于区块链的加密云存储平台模型研究", 软件导刊, no. 01, 15 January 2020 (2020-01-15) *
郭炫: "基于区块链技术的数据存储管理系统的研究与实现", 《中国优秀硕士学位论文全文数据库(电子期刊)》, 15 May 2020 (2020-05-15) *
鲜宇鑫;廖廷雪;冷雄进;: "区块链应用于视频篡改检测的关键技术分析", 西部皮革, no. 10, 25 May 2020 (2020-05-25) *

Also Published As

Publication number Publication date
CN115114603B (en) 2024-06-11

Similar Documents

Publication Publication Date Title
CN111523890B (en) Block chain-based data processing method, device, storage medium and equipment
CN111126950A (en) Service processing method, device and equipment based on block chain
CN111651734B (en) Installation management method, device, equipment and system for applet
CN113256297B (en) Data processing method, device and equipment based on block chain and readable storage medium
CN108924109B (en) Data transmission method and device and processing equipment
KR20180089670A (en) Method for generating and verifying an digital signature or message authentication code based on a block chain that does not require key management
CN112800404B (en) Cross-link access control method and device
CN112631550A (en) Block chain random number generation method, device, equipment and computer storage medium
CN111815420B (en) Matching method, device and equipment based on trusted asset data
CN110661779B (en) Block chain network-based electronic certificate management method, system, device and medium
CN112134883B (en) Method, device and related product for carrying out rapid authentication on trust relationship between nodes based on trusted computing
CN108540335B (en) Management method and management device for equipment analysis report
CN111680282B (en) Node management method, device, equipment and medium based on block chain network
CN110990864B (en) Report authority management method, device and equipment
CN112948866A (en) Data processing method, device and equipment and readable storage medium
CN114697063A (en) Security authentication method and device, electronic equipment and storage medium
CN107679865B (en) Identity verification method and device based on touch area
CN116452135A (en) Distributed anonymous voting method, device, equipment and medium based on Ethernet
CN115114603B (en) Base station equipment data management method and device and electronic equipment
CN112364307B (en) Software authorization method and related equipment
EP3975015B1 (en) Applet package sending method and device and computer readable medium
CN115099925A (en) Risk assessment method, device and equipment based on block chain
CN116070191A (en) Information processing method and device, storage medium, and program product
CN114969198B (en) Data management method, device and equipment
CN110598374A (en) Block chain-based work registration method, device and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant