CN115242529A - Data security sharing system - Google Patents

Data security sharing system Download PDF

Info

Publication number
CN115242529A
CN115242529A CN202210888403.9A CN202210888403A CN115242529A CN 115242529 A CN115242529 A CN 115242529A CN 202210888403 A CN202210888403 A CN 202210888403A CN 115242529 A CN115242529 A CN 115242529A
Authority
CN
China
Prior art keywords
data
sharing
security
shared
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210888403.9A
Other languages
Chinese (zh)
Other versions
CN115242529B (en
Inventor
沈文
郭骞
何阳
于鹏飞
高先周
杨如侠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Smart Grid Research Institute Co ltd
Original Assignee
State Grid Smart Grid Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Smart Grid Research Institute Co ltd filed Critical State Grid Smart Grid Research Institute Co ltd
Priority to CN202210888403.9A priority Critical patent/CN115242529B/en
Publication of CN115242529A publication Critical patent/CN115242529A/en
Application granted granted Critical
Publication of CN115242529B publication Critical patent/CN115242529B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data security sharing system, which comprises: the electric power marketing business system acquires shared data according to the received data sharing request, identifies the shared data and generates a data security identifier of the shared data, carries out compliance verification on the sub-attribute of the data security identifier, and encapsulates the data security identifier passing the compliance verification and the corresponding shared data to generate a shared data file for outputting. By implementing the method, the data security identification technology is adopted to carry out security labeling and identification on the data to generate the data security identification of the shared data, and the compliance verification of the data before external sharing is realized by adopting a data sharing authority control means, so that the security of data sharing is ensured.

Description

Data security sharing system
Technical Field
The invention relates to the technical field of data security, in particular to a data security sharing system.
Background
At present, the challenges of data security are severe and complex, and the task is extremely difficult: one is that the data element supply problem stands out. The phenomena of information system barriers and data islands are severe, so that the difficulty of data sharing and opening between governments and enterprises and between enterprises is high, and the data supply of the element market cannot be effectively implemented. Second, the data element circulation barrier is important. The exertion of data value is a process of making data "move up", however, as the data right-confirming problem is not solved yet, a great obstacle still exists in the aspect of data circulation. Thirdly, the problems of data security and privacy protection are severe. Marketing specialty relates to massive business data and private information of electricity customers, is easy to suffer from network attack, and as the attack means are gradually hidden, the difficulty of security prevention is continuously increased.
In the prior art, firstly, a block chain is combined with public key cryptography, so that user information can be safely and controllably accessed, secondly, the block chain is combined with a database, so that data can be prevented from being leaked and falsified, thirdly, a data security identifier is statically provided from the perspective of database storage, and identification operation is efficiently processed by adopting distributed storage. However, the above technical solutions still have the problems of default unconditional data sharing request and lack of digital combination standard verification of data sharing services.
Disclosure of Invention
In view of this, an embodiment of the present invention provides a data security sharing system to solve the problem that the prior art lacks a digital combination rule check of a data sharing service.
In a first aspect, an embodiment of the present invention provides a data security sharing system, where the system includes: the electric power marketing business system acquires shared data according to the received data sharing request, identifies the shared data and generates a data security identifier of the shared data, carries out compliance verification on the sub-attribute of the data security identifier, and encapsulates the data security identifier passing the compliance verification and the corresponding shared data to generate a shared data file for outputting.
Through the embodiment, the data is safely marked and identified by adopting a data safety identification technology to generate the data safety identification of the shared data, the compliance verification of the data before external sharing is realized by adopting a data sharing authority control means, and the safety of data sharing is ensured.
With reference to the first aspect, in a first embodiment of the first aspect, the system further comprises: the system comprises an external system and a block chain, wherein the external system sends a data sharing request to a power marketing business system; the block chain stores the data security identification which passes the compliance verification based on the intelligent contract; the external system receives a shared data file output by the power marketing service system and sends a data verification request to the block chain; and the block chain carries out data verification according to the data verification request, sends a data verification result to an external system and confirms whether the data security identification in the data verification request belongs to the shared data file.
Through the embodiment, the block chain technology is adopted to link and store the data security identification which passes the compliance verification to record and verify the data, the block chain performs broadcast transaction on the data by virtue of the consensus algorithm, and the block chain has the advantages of distributed account book which is difficult to tamper and forge, can be used for solving the problem of insufficient security of the data security identification, prevents the data security identification from being tampered in the external sharing process, and therefore guarantees the security and integrity of the data sharing process.
With reference to the first embodiment of the first aspect, in a second embodiment of the first aspect, the external system is further configured to decompose the shared data file, obtain a data security identifier in the shared data file, invoke an intelligent contract in the blockchain according to the data security identifier, and send a data verification request to the blockchain.
Through the embodiment, the external system sends the data verification request for the data security identifier in the shared data file to the blockchain, so that the data security identifier is confirmed not to be tampered in the external data sharing process, and the security and the integrity of the data sharing process are guaranteed.
With reference to the first embodiment of the first aspect, in a third embodiment of the first aspect, when the external system receives a data verification result that the data security identifier in the data verification request does not belong to the shared data file, the external system sends the data sharing request to the electricity marketing service system again.
Through the embodiment, if the external system confirms that the data security identifier in the shared data file is tampered, the shared data cannot be safely transmitted, and the data sharing request can be sent to the power marketing service system again so as to carry out data sharing again.
With reference to the first aspect, in a fourth embodiment of the first aspect, the sub-attributes of the data security identity include: basic properties and extended properties, wherein the basic properties comprise: data type and security level; the extended attributes include: sharing task names, data sharing protection modes and integrity verification.
Through the embodiment, the data security identifier is an information carrier with data security attributes, is a formatted package of attributes related to object data security, describes the security attributes of data, and can provide credible data attribute information support for external sharing security control of the data.
With reference to the fourth embodiment of the first aspect, in a fifth embodiment of the first aspect, the data type includes: marketing specialty data and other specialty data; the security levels include: commercial secret data, important data and general data; the data sharing protection mode comprises the following steps: desensitization, watermarking, desensitization watermarking and no protection.
Through the embodiment, the data security identifier records information such as data source, attribute, data security level, data security protection means, data integrity abstract and the like in the external sharing process of data, and the data security attribute information carried by the data security identifier is safe and credible and can be used as an important information basis for external sharing security control of the data.
With reference to the fifth embodiment of the first aspect, in a sixth embodiment of the first aspect, performing compliance checking on the sub-attribute of the data security identifier includes: if the data type of the data safety identification is other professional data, the shared task is terminated without passing compliance verification; if the data type of the data security identifier is not other professional data, judging whether the security level of the data security identifier is the quotient secret data or not; if the security level of the data security identifier is the quotient secret data, the sharing task is terminated without passing compliance verification; if the security level of the data security identifier is not the cryptographic data, judging whether the security level of the data security identifier is the common data or not; if the security level of the data security identifier is general data, allowing the data to be shared through compliance verification; if the security level of the data security identifier is not the common data, judging whether the data sharing protection mode of the data security identifier is unprotected; if the data sharing protection mode of the data safety identification is non-protection, allowing the data to be shared through compliance verification; and if the data sharing protection mode of the data safety identification is not unprotected, the data sharing task is terminated without passing compliance verification.
According to the embodiment, before the data is shared externally, the compliance of the data sharing externally is judged according to the basic attribute and the extended attribute of the data security identifier, the external transmission of the data with the data type being other professional data, the security level being the cryptographic data or the security level being the important data and the data sharing protection mode not being unprotected is forbidden, and therefore the digital control of the data sharing external security audit service is achieved.
With reference to the first embodiment of the first aspect, in a seventh embodiment of the first aspect, the data security identification that passes the compliance check is stored in plaintext form in the blockchain.
Through the embodiment, the data security identification is stored in the block chain in a plaintext form, so that the data in the block chain is public, transparent and queryable.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a system architecture diagram of a data security sharing system according to an embodiment of the present invention;
FIG. 2 is a system architecture diagram of a data security sharing system according to another embodiment of the present invention;
FIG. 3 is a flow chart of compliance checking before data is shared out, according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An embodiment of the present invention provides a data security sharing system, as shown in fig. 1, the system includes: and the power marketing business system acquires shared data according to the received data sharing request, identifies the shared data, generates a data security identifier of the shared data, performs compliance verification on the sub-attribute of the data security identifier, and encapsulates the data security identifier passing the compliance verification and the corresponding shared data to generate a shared data file for outputting.
Specifically, as shown in fig. 2, the power marketing service system includes: the system comprises a database, a data sharing module, a data security identifier generating module and a data compliance module. The method comprises the steps that a database receives a data sharing request sent by an external system, a data sharing module extracts shared data from the database according to the data sharing request, a data safety identification generating module extracts shared data characteristics, meanwhile, data safety identifications with data attributes as characteristics are generated according to data sharing tasks, data safety identifications are read by data close-scale blocks, information characteristics of the data sharing tasks are correlated, compliance verification is conducted on sub-attributes of the data safety identifications, whether the data sharing tasks are compliant or not is judged, if the data safety identifications pass the compliance verification, a data compliance module sends a sharing confirmation instruction to the data sharing module and the data safety identification generating module, and the data sharing module sends a sharing data file generated after the data safety identifications passing the compliance verification and the corresponding shared data are packaged to the external system according to the sharing confirmation instruction.
Through the embodiment, the data is safely marked and identified by adopting a data safety identification technology to generate the data safety identification of the shared data, the compliance verification of the data before external sharing is realized by adopting a data sharing authority control means, and the safety of data sharing is ensured.
In one embodiment, the system further comprises: the system comprises an external system and a block chain, wherein the external system sends a data sharing request to a power marketing business system; the block chain stores the data security identification which passes the compliance verification based on the intelligent contract; the external system receives a shared data file output by the power marketing service system and sends a data verification request to the block chain; and the block chain carries out data verification according to the data verification request, sends a data verification result to an external system and confirms whether the data security identification in the data verification request belongs to the shared data file.
Specifically, referring to fig. 2, an external system sends a data sharing request to a database in the electricity marketing business system; when the data security identifier generation module receives a sharing confirmation instruction sent by the data scaling block, calling an intelligent contract deployed in the block chain, and storing the data security identifier which passes the compliance verification into the block chain based on the intelligent contract; when an external system receives a shared data file sent by a data sharing module, sending a data verification request to a block chain, and applying for verifying whether a data security identifier in the data verification request belongs to the shared data file; and the block chain performs data verification according to the data verification request and sends a data verification result to an external system.
Through the embodiment, the block chain technology is adopted to carry out chain storage and record on the data security identifier which passes the compliance verification and carry out the data verification, the block chain carries out broadcast transaction on the data by virtue of a consensus algorithm, and the block chain has the advantages of being difficult to tamper and forge and has the distributed account book, can be used for solving the problem that the data security identifier is insufficient in security, prevents the data security identifier from being tampered in the external sharing process, and therefore guarantees the security and the integrity of the data sharing process.
In an embodiment, the external system is further configured to decompose the shared data file to obtain a data security identifier in the shared data file, and call an intelligent contract in the block chain according to the data security identifier to send a data verification request to the block chain.
Specifically, as shown in connection with fig. 2, the external system includes a data compliance sharing module, and the blockchain includes a plurality of blockchain nodes. When the data compliance sharing module receives a shared data file sent by the data sharing module, the shared data file is decomposed, the data security identification is split, a data verification request is sent to the block chain link point by calling an intelligent contract deployed in the block chain, and whether the data security identification in the data verification request belongs to the shared data file or not is applied.
Through the embodiment, the external system sends the data verification request for the data security identifier in the shared data file to the blockchain, so that the data security identifier is confirmed not to be tampered in the external data sharing process, and the security and the integrity of the data sharing process are guaranteed.
In one embodiment, when the external system receives a data verification result that the data security identifier in the data verification request does not belong to the shared data file, the external system sends the data sharing request to the power marketing service system again.
Specifically, referring to fig. 2, when the result of the data verification performed by the block link point is that the data security identifier in the data verification request does not belong to the shared data file, the data verification result is sent to the data compliance sharing module, and the external system sends a new data sharing request to the power marketing service system again.
Through the embodiment, if the external system confirms that the data security identifier in the shared data file is tampered, the shared data cannot be safely transmitted, and the data sharing request can be sent to the power marketing service system again so as to carry out data sharing again.
In one embodiment, the sub-attributes of the data security identifier include: basic properties and extended properties, wherein the basic properties comprise: data type and security level; the extended attributes include: sharing task names, data sharing protection modes and integrity verification.
Specifically, the basic attribute of the data security identifier refers to the definition of shared data, which is unrelated to the data sharing task, and includes: data type and security level; the extended attribute of the data security identifier is a data attribute created according to the data sharing task, and comprises the following steps: the method comprises the steps of sharing task names, data sharing protection modes and integrity verification, wherein the sharing task names refer to unique names of data sharing tasks established according to the approval process of the externally shared data of the power marketing.
Through the embodiment, the data security identifier is an information carrier with data security attributes, is a formatted package of attributes related to object data security, describes the security attributes of data, and can provide credible data attribute information support for external sharing security control of the data.
In one embodiment, the data types include: marketing professional data and other professional data; the security levels include: commercial secret data, important data and general data; the data sharing protection mode comprises the following steps: desensitization, watermarking, desensitization watermarking and no protection.
Through the embodiment, the data security identifier records information such as data source, attribute, data security level, data security protection means, data integrity abstract and the like in the external sharing process of data, and the data security attribute information carried by the data security identifier is safe and credible and can be used as an important information basis for external sharing security control of the data.
In one embodiment, performing compliance checking on the sub-attributes of the data security identifier includes: if the data type of the data safety identification is other professional data, the shared task is terminated without passing compliance verification; if the data type of the data security identifier is not other professional data, judging whether the security level of the data security identifier is the quotient secret data or not; if the security level of the data security identifier is the cryptographic data, the shared task is terminated without passing compliance verification; if the security level of the data security identifier is not the cryptographic data, judging whether the security level of the data security identifier is the common data or not; if the security level of the data security identifier is general data, allowing the data to be shared through compliance verification; if the security level of the data security identifier is not the common data, judging whether the data sharing protection mode of the data security identifier is unprotected; if the data sharing protection mode of the data safety identification is non-protection, allowing the data to be shared through compliance verification; if the data sharing protection mode of the data security identification is not unprotected, the data security identification does not pass the compliance verification, and the sharing task is terminated.
Specifically, as shown in fig. 2 and 3, the data scaling block reads the data security identifier, associates the information characteristics of the data sharing task, performs compliance verification before data sharing on the data security identifier, verifies whether the basic attribute and the extended attribute of the data security identifier are consistent with the external sharing security policy of the power marketing professional data, allows the data sharing through the compliance verification, and terminates the data sharing task without passing through the compliance verification.
According to the embodiment, before the data is shared externally, the compliance of the data sharing externally is judged according to the basic attribute and the extended attribute of the data security identifier, the external transmission of the data with the data type being other professional data, the security level being confidential data or the security level being important data and the data sharing protection mode not being unprotected is forbidden, and therefore digital control of the data sharing security audit service externally is achieved.
In one embodiment, the data security identification that passes the compliance check is stored in the block chain in clear text.
Specifically, as shown in fig. 2, when the data security identifier generation module receives a sharing confirmation instruction sent by the data scaling block, the intelligent contract deployed in the blockchain is called, and the data security identifier that passes the compliance check is stored in the blockchain node in a plaintext form based on the intelligent contract.
Through the embodiment, the data security identification is stored in the block chain in a plaintext form, so that the data in the block chain is public, transparent and queryable.
Another embodiment of the present invention provides a data security sharing system, as shown in fig. 2, the system includes: electric power marketing business system, external system and block chain, wherein, electric power marketing business system includes: the system comprises a database, a data sharing module, a data security identifier generating module and a data compliance module; the external system comprises a data compliance sharing module; the blockchain includes a plurality of blockchain nodes.
Specifically, sending a data sharing request to a database in the power marketing business system by an external system; the data sharing module extracts shared data from a database according to the data sharing request; the data security identification generation module identifies shared data, extracts the characteristics of the shared data, and generates a data security identification which takes data attributes as characteristics according to the data sharing task; the data compliance block reads the data security identification, associates the information characteristics of the data sharing task, performs compliance verification on the sub-attribute of the data security identification, judges whether the data sharing task is compliant or not, and if the data security identification passes the compliance verification, the data compliance module sends a sharing confirmation instruction to the data sharing module and the data security identification generation module; the data security identifier generation module calls an intelligent contract deployed in the block chain according to the confirmed sharing instruction, and stores the data security identifier which passes the compliance verification into the block chain based on the intelligent contract; the data sharing module encapsulates the data security identification passing the compliance verification and the corresponding shared data according to the sharing confirmation instruction and then sends the generated shared data file to a data compliance sharing module in an external system; the data compliance sharing module decomposes a shared data file, decomposes a data security identifier, sends a data verification request to a block chain link point by calling an intelligent contract deployed in a block chain, and applies for verifying whether the data security identifier in the data verification request belongs to the shared data file; the block link node performs data verification according to the data verification request and sends a data verification result to the data compliance sharing module; and if the data verification result is that the data security identifier in the data verification request belongs to the shared data file, confirming that the shared data completes security transmission, and if the data verification result is that the data security identifier in the data verification request does not belong to the shared data file, sending a new data sharing request to the database again by the external system.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications derived therefrom are intended to be within the scope of the invention.

Claims (8)

1. A system for secure sharing of data, comprising: the electric power marketing business system acquires shared data according to a received data sharing request, identifies the shared data, generates a data security identifier of the shared data, carries out compliance verification on the sub-attribute of the data security identifier, and encapsulates the data security identifier passing the compliance verification and the corresponding shared data to generate a shared data file for outputting.
2. The system of claim 1, further comprising: an external system and a block chain, wherein,
the external system sends the data sharing request to the power marketing business system;
the block chain stores the data security identification which passes the compliance verification based on an intelligent contract;
the external system receives the shared data file output by the power marketing service system and sends a data verification request to the block chain;
and the block chain performs data verification according to the data verification request, sends a data verification result to the external system and confirms whether the data security identification in the data verification request belongs to the shared data file.
3. The system of claim 2, wherein the external system is further configured to decompose the shared data file to obtain a data security identifier in the shared data file, invoke an intelligent contract in the blockchain according to the data security identifier, and send a data verification request to the blockchain.
4. The system of claim 2, wherein when the external system receives a data verification result that the data security identifier in the data verification request does not belong to the shared data file, the external system sends a data sharing request to the electricity marketing service system again.
5. The system of claim 1, wherein the sub-attributes of the data security identifier comprise: a base attribute and an extended attribute, wherein,
the basic attributes include: data type and security level;
the extended attributes include: sharing task names, data sharing protection modes and integrity verification.
6. The system of claim 5, wherein the data types comprise: marketing professional data and other professional data;
the security levels include: commercial secret data, important data and general data;
the data sharing protection mode comprises the following steps: desensitization, watermarking, desensitization watermarking and no protection.
7. The system according to claim 6, wherein the performing compliance checking on the sub-attribute of the data security identifier comprises:
if the data type of the data safety identification is other professional data, stopping the sharing task without passing the compliance verification;
if the data type of the data safety identification is not other professional data, judging whether the safety level of the data safety identification is secret data;
if the security level of the data security identifier is the quotient secret data, the sharing task is terminated without passing the compliance verification;
if the security level of the data security identifier is not the cryptographic data, judging whether the security level of the data security identifier is the common data;
if the security level of the data security identification is general data, allowing the data to be shared through the compliance verification;
if the security level of the data security identifier is not general data, judging whether the data sharing protection mode of the data security identifier is unprotected;
if the data sharing protection mode of the data safety identification is non-protection, allowing the data to be shared through the compliance verification;
and if the data sharing protection mode of the data safety identification is not unprotected, stopping the sharing task without passing the compliance verification.
8. The system according to claim 2, wherein the compliance-verified data security identifier is stored in plaintext form in the blockchain.
CN202210888403.9A 2022-07-26 2022-07-26 Data security sharing system Active CN115242529B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210888403.9A CN115242529B (en) 2022-07-26 2022-07-26 Data security sharing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210888403.9A CN115242529B (en) 2022-07-26 2022-07-26 Data security sharing system

Publications (2)

Publication Number Publication Date
CN115242529A true CN115242529A (en) 2022-10-25
CN115242529B CN115242529B (en) 2023-07-25

Family

ID=83675968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210888403.9A Active CN115242529B (en) 2022-07-26 2022-07-26 Data security sharing system

Country Status (1)

Country Link
CN (1) CN115242529B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111224786A (en) * 2019-12-30 2020-06-02 山东爱城市网信息技术有限公司 Block chain-based data security sharing method, device and medium
CN111935190A (en) * 2020-10-12 2020-11-13 杭州海康威视数字技术股份有限公司 Internet of vehicles terminal data sharing method and device, electronic equipment and storage medium
CN112235298A (en) * 2020-10-14 2021-01-15 国网电子商务有限公司 Data security classification dynamic access control method based on zero trust model
CN112364377A (en) * 2020-11-11 2021-02-12 国网山东省电力公司电力科学研究院 Data classification and classification safety protection system suitable for power industry
CN113256418A (en) * 2021-05-20 2021-08-13 中国计量大学 Automobile part production line production data sharing system based on block chain
CN113591119A (en) * 2021-08-09 2021-11-02 国家工业信息安全发展研究中心 Cross-domain identification analysis node data privacy protection and safety sharing method and system
CN113626860A (en) * 2021-07-29 2021-11-09 上海和数软件有限公司 Electric power data privacy protection method based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111224786A (en) * 2019-12-30 2020-06-02 山东爱城市网信息技术有限公司 Block chain-based data security sharing method, device and medium
CN111935190A (en) * 2020-10-12 2020-11-13 杭州海康威视数字技术股份有限公司 Internet of vehicles terminal data sharing method and device, electronic equipment and storage medium
CN112235298A (en) * 2020-10-14 2021-01-15 国网电子商务有限公司 Data security classification dynamic access control method based on zero trust model
CN112364377A (en) * 2020-11-11 2021-02-12 国网山东省电力公司电力科学研究院 Data classification and classification safety protection system suitable for power industry
CN113256418A (en) * 2021-05-20 2021-08-13 中国计量大学 Automobile part production line production data sharing system based on block chain
CN113626860A (en) * 2021-07-29 2021-11-09 上海和数软件有限公司 Electric power data privacy protection method based on block chain
CN113591119A (en) * 2021-08-09 2021-11-02 国家工业信息安全发展研究中心 Cross-domain identification analysis node data privacy protection and safety sharing method and system

Also Published As

Publication number Publication date
CN115242529B (en) 2023-07-25

Similar Documents

Publication Publication Date Title
Trèek An integral framework for information systems security management
CN108681853A (en) Logistics information transmission method, system and device based on block chain
US20030046115A1 (en) Insurance method, insurance system, transaction monitoring method, transaction monitoring system, and program
CN112801663B (en) Blockchain certification method, device, system, equipment and medium
JP2009238254A (en) System and method for electronic transmission, storage and retrieval of authenticated document
CN108768618B (en) IP soft core authorization method, device and medium based on block chain
CN114567470B (en) SDK-based multi-system key splitting verification system and method
CN110866261A (en) Data processing method and device based on block chain and storage medium
CN115442047A (en) Electronic signature method and system for business management file
CN114254269B (en) System and method for determining rights of biological digital assets based on block chain technology
CN114092039A (en) Configurable process approval method and system based on block chain
CN112685776A (en) Privacy data credibility verification method based on block chain and privacy security calculation
CN113315745A (en) Data processing method, device, equipment and medium
CN110222809B (en) Information combination and encryption method of two-dimensional code and two-dimensional code encryption machine
CN114499875A (en) Service data processing method and device, computer equipment and storage medium
CN115242529A (en) Data security sharing system
CN113411321B (en) Block chain-based electricity consumption data acquisition method and system
CN114444130A (en) Electronic certificate mutual trust and mutual authentication platform based on block chain
CN113360575A (en) Method, device, equipment and storage medium for supervising transaction data in alliance chain
CN111460492A (en) Data privacy management system based on block chain and implementation method thereof
CN113360931B (en) System and method for safeguarding judicial electronic delivery information based on block chain
CN116827653B (en) Data encryption and authorization management method based on Hyperledger Fabric alliance chain
CN112069469B (en) Method and device for processing work data based on block chain
CN113315749B (en) User data uplink, user data using method, anonymous system and storage medium
US20230237200A1 (en) Digital witness systems and methods for authenticating and confirming the integrity of a digital artifact

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant