CN117407923A - Pipe network data transaction method and device, electronic equipment and storage medium - Google Patents

Pipe network data transaction method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117407923A
CN117407923A CN202311383378.XA CN202311383378A CN117407923A CN 117407923 A CN117407923 A CN 117407923A CN 202311383378 A CN202311383378 A CN 202311383378A CN 117407923 A CN117407923 A CN 117407923A
Authority
CN
China
Prior art keywords
data
transaction
contract
data transaction
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311383378.XA
Other languages
Chinese (zh)
Inventor
任武
李亚平
任勇
宋一纯
杨杰
张新建
张正雄
王珍琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Petroleum And Natural Gas Pipeline Network Group Co ltd Science And Technology Research Institute Branch
China Oil and Gas Pipeline Network Corp
Original Assignee
National Petroleum And Natural Gas Pipeline Network Group Co ltd Science And Technology Research Institute Branch
China Oil and Gas Pipeline Network Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Petroleum And Natural Gas Pipeline Network Group Co ltd Science And Technology Research Institute Branch, China Oil and Gas Pipeline Network Corp filed Critical National Petroleum And Natural Gas Pipeline Network Group Co ltd Science And Technology Research Institute Branch
Priority to CN202311383378.XA priority Critical patent/CN117407923A/en
Publication of CN117407923A publication Critical patent/CN117407923A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Bioethics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Technology Law (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Development Economics (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • Primary Health Care (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a pipe network data transaction method and device, electronic equipment and storage medium, wherein the method comprises the following steps: receiving a data transaction application sent by a requesting party; acquiring an initial contract based on a data transaction application by using a data sharing platform, and encrypting the initial contract through a preset encryption algorithm to obtain a transaction service contract; scheduling corresponding data resources to be transacted based on the transaction service contract; the transaction executive party carries out configuration processing on the data resources to be transacted based on the transaction service contract, and feeds the processed data resources to be transacted back to the requesting party to complete data transaction. The safety of the data using process is guaranteed through the data sharing platform, and various safety risks of enterprises in the oil-gas pipe network are reduced.

Description

Pipe network data transaction method and device, electronic equipment and storage medium
Technical Field
The application relates to the technical field of oil-gas pipe network data safety sharing, in particular to a pipe network data transaction method and device, electronic equipment and storage medium.
Background
Most of the data of departments such as production, maintenance, scheduling and management in the oil and gas pipeline network industry relate to national confidentiality and security, and the data security and confidentiality requirements are high. However, because the data is in a digital form, the data is easy to copy and easy to leak in a network environment, and in the development period of the digital technology which is different in daily life, the data has extremely high potential safety hazards from various links such as data acquisition, storage, transmission, processing, sharing and destruction.
When data circulation is carried out among enterprises in an oil-gas pipe network, the unavoidable need is realized by a data sharing mode, and the traditional data safety sharing has two major core problems, namely, information is exposed and data value is lost in circulation use; secondly, the usage is uncontrollable, and the "responsibilities, rights and rights" of the data usage cannot be clarified. How to avoid the situation of compliance problem, data leakage and the like of data use in the process of cross-department and cross-enterprise data fusion and sharing is a problem to be solved urgently.
Disclosure of Invention
In order to solve the problem of data leakage during data sharing in an oil-gas pipe network, so as to improve the security of data of each enterprise, embodiments of the present application provide a pipe network data transaction method and apparatus, an electronic device, a computer readable storage medium, and a computer program product.
In order to solve the above technical problems, the present application provides a pipe network data transaction method, including:
receiving a data transaction application sent by a requesting party;
acquiring an initial contract based on the data transaction application by using a data sharing platform, and encrypting the initial contract through a preset encryption algorithm to obtain a transaction service contract;
Scheduling corresponding data resources to be transacted based on the transaction service contract;
and the transaction executive party carries out configuration processing on the data resources to be transacted based on the transaction service contract, and feeds the processed data resources to be transacted back to the requesting party to complete data transaction.
The beneficial effects are that:
the transaction service contract between the requesting party and the transaction executing party is formed by utilizing the data sharing platform, so that an electronic service contract mechanism is constructed, and the purpose and the range of data use can be automatically controlled. In addition, the initial contract formed by the data sharing platform is encrypted through the preset encryption algorithm, so that plaintext data related to a requester and a transaction executive party in a transaction service contract are prevented from being acquired in a continuous interval of the contract, the safety of a data use process is ensured, and various safety risks of enterprises in an oil-gas pipe network are reduced.
Based on the technical scheme, the pipe network data transaction method can be improved as follows.
Further, the obtaining a transaction service contract by using the data sharing platform based on the data transaction application includes:
acquiring a contract algorithm sent by an algorithm party by utilizing a data sharing platform, and deploying a contract template based on the contract algorithm;
And obtaining an initial contract aiming at the data transaction application based on the data transaction application and the contract template.
The data sharing platform acquires a contract algorithm which is sent by an arithmetic sender and corresponds to the function realized by the data sharing platform in the application, deploys a contract template based on the algorithm logic of the contract algorithm, constructs an electronic service contract mechanism, and is used for fusing the demand represented by the data transaction application with the contract template after receiving the data transaction application of the requester, so as to obtain an initial contract.
Further, the encrypting the initial contract by a preset encryption algorithm to obtain a transaction service contract includes:
encrypting the initial contract through a multiparty secure encryption algorithm according to a preset calculation rule to obtain an encrypted transaction service contract;
acquiring contract certificate information formed based on the transmission process of the transaction service contract;
and storing the transaction service contract and the contract certification information in a blockchain in a uplink manner.
The adoption of the further scheme has the beneficial effects that the visible information part in the initial contract is distinguished from the use value which can be used for calculation without being seen by applying various cryptography theories and technologies such as multiparty security calculation, so that the data can be used and invisible, the exposure of information in the circulation use process of executing the contract by the transaction service contract is prevented, and the data security is ensured.
Further, the method further comprises:
if the requester is not in the blockchain network, acquiring a communication mode of the requester;
and constructing a target blockchain architecture based on the communication mode, wherein the target blockchain architecture is used for storing the encrypted transaction service contract and the contract certification information.
The adoption of the further scheme has the advantages that after the fact that the requesting party is not in the blockchain network is determined, the target blockchain architecture matched with the communication mode is constructed based on the communication mode applied by the requesting party, contract data are prevented from being abused, authenticity and traceability of data circulation use are guaranteed, the problem that the requesting party does not have a reliable blockchain network or the requesting party does not have operation and maintenance capability of the blockchain network between the data sharing platform and the transaction executive party is solved, and deployment and operation and maintenance costs are reduced by constructing the target blockchain architecture.
Further, after accepting the request for data transaction sent by the requesting party, the method further includes:
utilizing the data sharing platform to audit the data transaction application to obtain an audit result;
and if the auditing result indicates that the data transaction application passes the auditing, the data transaction application is sent to the data sharing platform so as to obtain the transaction service contract.
The adoption of the further scheme has the beneficial effects that the data transaction application is verified and approved before the corresponding transaction action of the data transaction application is executed, so that the safety of each item of data is further ensured, and the condition of malicious request is avoided.
Further, the receiving the data transaction application sent by the requesting party includes:
acquiring main body qualification information of the requester and the transaction executive party by using the data sharing platform;
approval is carried out on the main qualification information to obtain approval results;
and if the approval result represents that the requester and the transaction executive party meet the preset qualification requirement, receiving a data transaction application sent by the requester.
The data sharing platform has the beneficial effects that the data sharing platform realizes large-scale interconnection, intercommunication and fusion and utilization of data by carrying out data communication with various main bodies such as requesters and transaction executors, so that the data circulation cost is greatly reduced, the main body qualification of each main body is approved, the data transaction application is further received after the approval, and the safety of internal and external data of an oil-gas pipe network is ensured.
Further, the method further comprises:
acquiring transaction information formed by executing a data transaction task corresponding to the data transaction application;
and evaluating the data transaction task based on the transaction information and the transaction service contract to obtain an evaluation result, and writing the evaluation result into a blockchain.
After the data transaction is completed, the transaction information and the transaction service contract formed by executing the data transaction corresponding to the data transaction application are audited, so that the authenticity, the correctness, the compliance, the legality, the benefit and the like in the data transaction process are judged, and the management efficiency and the management transparency of the data transaction management are improved.
In a second aspect, the invention provides a pipe network data transaction device, which comprises a receiving unit, a processing unit, a scheduling unit and a transaction unit;
the receiving unit is used for receiving the data transaction application sent by the requesting party;
the processing unit is used for acquiring an initial contract based on the data transaction application by utilizing the data sharing platform, and encrypting the initial contract through a preset encryption algorithm to obtain a transaction service contract;
A scheduling unit, configured to schedule corresponding data resources to be transacted based on the transaction service contract;
and the transaction unit is used for the transaction executive party to perform configuration processing on the data resources to be transacted based on the transaction service contract, and feeds the processed data resources to be transacted back to the requesting party to complete data transaction.
The beneficial effect of the pipe network data transaction device that this application provided is:
the electronic service contract mechanism is constructed through the data sharing platform, so that the purpose and the range of data use can be automatically controlled, and the transaction service contract obtained by the data sharing platform is encrypted, so that the safety of the data use process is ensured, and the safety risks of enterprises in an oil-gas pipe network are reduced.
In a third aspect, the present application further provides an electronic device, including: one or more processors; and the storage device is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the electronic equipment can realize the pipe network data transaction method.
In a fourth aspect, the present application also provides a computer readable storage medium having stored thereon computer readable instructions which, when executed by a processor of a computer, cause the computer to perform the pipe network data transaction method as described above.
In a fifth aspect, the present application also provides a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor executes the computer instructions, so that the computer device performs the pipe network data transaction method provided in the above various alternative embodiments.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application. It is apparent that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art. In the drawings:
FIG. 1 is a schematic illustration of one implementation environment to which the present application relates;
FIG. 2 is a flow chart illustrating a method of pipe network data transaction according to an exemplary embodiment of the present application;
FIG. 3 is a flow chart of the step of acquiring an initial contract based on a data transaction application using a data sharing platform in step S202 of the embodiment of FIG. 2 in one exemplary embodiment;
FIG. 4 is a flowchart of the steps of encrypting an initial contract to obtain a transaction service contract by a preset encryption algorithm in step S202 of the embodiment of FIG. 2 in an exemplary embodiment;
FIG. 5 is a flowchart illustrating steps for applying a calculation rule in an exemplary embodiment;
FIG. 6 is a flowchart of the steps for building a target blockchain architecture if the requestor is not in the blockchain network in the embodiment of FIG. 4 in one exemplary embodiment;
FIG. 7 is a schematic diagram of a target blockchain architecture built based on communication modes in proxy computing mode in an exemplary embodiment;
FIG. 8 is a schematic diagram of a target blockchain architecture built based on communication mode in p2p mode with intermediate supervision in an exemplary embodiment;
FIG. 9 is a schematic diagram of a target blockchain architecture built based on communication modes in p2 p-only mode in an exemplary embodiment;
FIG. 10 is a flowchart of steps subsequent to step S201 in the embodiment shown in FIG. 2 in an exemplary embodiment;
FIG. 11 is a flow chart of step S201 in the embodiment shown in FIG. 2 in an exemplary embodiment;
FIG. 12 is a flowchart of the steps in one exemplary embodiment of obtaining an evaluation result for a data transaction task corresponding to a data transaction application;
FIG. 13 is a schematic diagram of a data sharing platform in an exemplary embodiment of the present application;
FIG. 14 is a flow chart of a method for implementing a data transaction for a corporate network using the data sharing platform shown in FIG. 13 in an exemplary embodiment of the present application;
FIG. 15 is a block diagram of a pipe network data transaction device according to an exemplary embodiment of the present application;
fig. 16 is a schematic diagram of a computer system suitable for use in implementing embodiments of the present application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
The block diagrams depicted in the figures are merely functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
Reference to "a plurality" in this application means two or more than two. "and/or" describes an association relationship of an association object, meaning that there may be three relationships, e.g., a and/or B may represent: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship.
In order to solve the problem of compliance of data use and data leakage in the process of cross-department and cross-enterprise data fusion and sharing of an oil-gas pipe network, embodiments of the present application provide a pipe network data transaction method and device, an electronic device, and a computer readable storage medium, which mainly relate to an oil-gas pipe network data security sharing technology included in a computer technology, and the embodiments will be described in detail below.
Referring first to fig. 1, fig. 1 is a schematic diagram of an implementation environment according to the present application. The implementation environment includes a requestor 101, a data sharing platform 102, and a transaction executor 103, where the requestor 101, the data sharing platform 102, and the transaction executor communicate over a wired or wireless network.
The transaction executive party 103 is used for receiving the data transaction application sent by the requesting party 101, acquiring an initial contract based on the data transaction application by utilizing the data sharing platform 102, and encrypting the initial contract by a preset encryption algorithm to obtain a transaction service contract; then, the transaction executive 103 schedules corresponding data resources to be transacted from the data sharing platform 102 based on transaction service contracts; finally, the transaction executor 103 performs configuration processing on the data resources to be transacted based on the transaction service contract, feeds back the processed data resources to be transacted to the requester, completes data transaction, and delivers the corresponding transaction result to the requester 101 for transmission. Compared with the data transaction scheme in the oil-gas pipe network data safety sharing environment in the prior art, the pipe network data transaction method provided by the implementation environment can construct an electronic service contract mechanism, improve transaction efficiency, ensure the safety of the data using process through a preset encryption algorithm, and reduce various safety risks of enterprises in the oil-gas pipe network.
It should be noted that, the requesting party 101 and the transaction executing party 103 in the implementation environment shown in fig. 1 may be any mechanism with data fusion and sharing requirements in each enterprise, each related department and each related industry in the oil and gas pipe network operation enterprise, and the disclosure is not limited in particular.
FIG. 2 is a flow chart illustrating a method of pipe network data transaction according to an exemplary embodiment of the present application. The method may be applied to the implementation environment shown in fig. 1 and specifically performed by the transaction performer 103 in the embodiment environment shown in fig. 1. In other embodiments, the method may be performed by a device in other embodiments, and this embodiment is not limited in this regard.
As shown in fig. 2, in an exemplary embodiment, the pipe network data transaction method may include steps S201 to S201, which are described in detail as follows:
step S201, a data transaction application sent by a requester is received.
In order to complete the oil and gas pipe network data safe sharing transaction service, a requester can put forward a data transaction application based on data requirements or select specific data service requirements so as to create a data transaction task corresponding to the data transaction application for processing and execution by a data sharing platform and a transaction executive party.
Step S202, acquiring an initial contract based on data transaction application by using a data sharing platform, and encrypting the initial contract through a preset encryption algorithm to obtain a transaction service contract.
In this embodiment, the data sharing platform is pre-deployed with logic for obtaining a transaction service contract between the requesting party and the transaction executing party, so that after receiving the data transaction application, the transaction requesting party will utilize the data sharing platform to obtain an initial contract matched with the data transaction application, and further encrypt the initial contract based on a preset encryption algorithm to obtain the transaction service contract, so that the transaction executing party can use the transaction service contract as a basis for executing the data transaction task. And through a preset encryption algorithm, the transaction service between the requesting party and the transaction executing party is ensured to be closed in the using process, and related data cannot be leaked, so that the security of each enterprise data is influenced.
In step S203, corresponding data resources to be transacted are scheduled based on the transaction service contract.
Because the transaction executive party takes the transaction service contract as the basis for executing the transaction task obtained based on the data transaction application data, in the embodiment, the transaction executive party schedules the corresponding data resources to be transacted based on the transaction service contract so as to complete the data transaction sharing.
In step S204, the transaction executor configures the data resources to be transacted based on the transaction service contract, and feeds the processed data resources to be transacted back to the requester, thereby completing the data transaction.
After the data resources to be transacted are obtained through scheduling, the transaction executive side carries out configuration processing on the data resources to be transacted based on a transaction service contract, so that the data resources to be transacted after processing configuration are matched with a requesting side, namely a data using side, and the transaction executive side delivers the processed data resources to be transacted to the requesting side and completes the data transaction after delivery is completed.
As can be seen from the above, in the method provided in this embodiment, the transaction service contract between the requester and the transaction executor is formed through the data sharing platform, so as to construct an electronic service contract mechanism, so that the purpose and the range of data use can be automatically controlled. In addition, the initial contract formed by the data sharing platform is encrypted through the preset encryption algorithm, so that plaintext data related to a requester and a transaction executive party in a transaction service contract are prevented from being acquired in a continuous interval of the contract, the safety of a data use process is ensured, and various safety risks of enterprises in an oil-gas pipe network are reduced.
Referring to fig. 3, fig. 3 is a flowchart of the step of acquiring an initial contract based on a data transaction application using the data sharing platform in step S202 in the embodiment shown in fig. 2 in an exemplary embodiment.
As shown in fig. 3, it may specifically include steps S301 to S302, which are described in detail below:
step S301, a contract algorithm sent by an algorithm party is obtained by utilizing a data sharing platform, and a contract template is deployed based on the contract algorithm.
The terminal connected with the data sharing platform in this embodiment further includes an algorithm party, the algorithm party is used as a service opening method to provide various algorithm logics, such as a contract algorithm, for the data sharing platform, and the data sharing platform constructs a contract template according to a transaction service contract between the requesting party and the transaction executing party and deploys the contract template in the data sharing platform through the contract algorithm sent by the algorithm party.
Step S302, obtaining an initial contract for the data transaction application based on the data transaction application and the contract template.
The data transaction application carries basic information of a requesting party and various transaction related information corresponding to data transaction tasks, after the data transaction application is received, a data supplier providing data resources to be transacted, a data source address, a requesting party, a service result receiving address, selectable algorithm parameters, digital signatures of all parties and the like can be obtained, and all the data suppliers, the data source address, the requesting party, the service result receiving address, the selectable algorithm parameters, the digital signatures of all the parties and the like are supplemented by all the parties after the requirements of the requesting party are determined. Therefore, when the contract template is deployed, the empty position is reserved for the appointed part according to the contract algorithm, so that various information obtained based on the data transaction application is filled into the contract template, and a complete initial contract for the data transaction application is obtained.
According to the embodiment, a contract algorithm which is sent by an arithmetic sender and corresponds to the function realized by the data sharing platform in the application is obtained through the data sharing platform, and a contract template is deployed based on the algorithm logic of the contract algorithm, so that an electronic service contract mechanism is constructed.
Referring to fig. 4, fig. 4 is a flowchart of an exemplary embodiment of the steps of encrypting an initial contract by a preset encryption algorithm to obtain a transaction service contract in step S202 in the embodiment shown in fig. 2. As shown in fig. 4, it may specifically include steps S401 to S403, which are described in detail below:
step S401, according to preset calculation rules, the initial contract is encrypted through a multiparty secure encryption algorithm, and the encrypted transaction service contract is obtained.
The multiparty safe encryption algorithm is a cipher technology based on multiparty data system to complete calculation target and realize the calculation result and deducible information without revealing private data of each party. In the embodiment, the initial contract is encrypted through the multiparty secure encryption algorithm to obtain the encrypted transaction service contract, so that the security of data in the contract in the using process is protected, and plaintext information is prevented from being leaked.
In this embodiment, an API (Application Programming Interface, an interface between programs) is configured in the data sharing platform, and is used to generate a calculation rule block and write the calculation rule block into the blockchain, so that a preset calculation rule can be obtained through the calculation rule block. The computing rule refers to rule convention of how data is subjected to security operation and use in an application environment of the data sharing platform, all data are subjected to secret state computation and circulation in the platform according to the computing rule, and all parties establishing communication with the platform need to obey the computing rule.
As shown in fig. 5, fig. 5 is a flowchart illustrating steps for applying the calculation rule in an exemplary embodiment, which may include the following steps:
step S501, an algorithm deploys intelligent contracts of a calculation rule template to a block chain;
step S502, returning a deployment result of the intelligent contract;
step S503, a task initiator initiates a calculation task;
step S504, returning a task initiating result;
step S505, notifying a task manager to execute a computing task;
step S506, verifying a computing task;
step S507, returning a verification result;
step S508, returning to the task id;
step S509, notifying the computing node and the data node to perform a computing task;
Step S510, notifying a calculation task manager of the end of calculation;
step S511, task ending request distribution calculation cost;
step S512, the allocation result is returned.
Step S402, acquiring contract certification information formed based on a transmission process of a transaction service contract.
In this embodiment, a data service module and a computing engine are configured in the data sharing platform, encryption of an initial contract is achieved through the data service module and the computing engine, a transaction service contract serving as ciphertext data is obtained, and meanwhile, a certificate is generated and stored in a uplink mode when the data service contract module encrypts the initial contract and then transmits the encrypted initial contract to the computing engine, so that contract certificate information is obtained, and data security of the transaction service contract is further guaranteed.
It should be noted that, in the embodiment provided in the application, any secure multiparty computing (Secure Multiparty Computation, MPC) data obtained by encrypting by the multiparty secure encryption algorithm needs to be stored and verified while being transmitted to the computing engine, so that the data is not lost and tampered, and the authenticity, integrity and security of the data are ensured.
Step S403, storing the transaction service contract and the contract certification information in the blockchain.
Writing the transaction service contract and the contract certificate information into the blockchain through the API, and after writing the transaction service contract into the blockchain, the transaction executive party can utilize the data sharing platform to operate the transaction service contract in the blockchain so as to complete the transaction and change the contract execution state after settlement. Through the blockchain technology, the data is protected from being abused, and the authenticity and traceability of the data circulation use are guaranteed. It should be noted that the blockchain may be a federated chain or a public chain, which is not limited herein.
Thus, the embodiment utilizes the technologies of calculation rules, blockchains and the like, controls the specific use purpose, mode and times of the data through the authorization and the evidence storage of the data, realizes the use controllable metering of the data, ensures the safe circulation and use of the data, and effectively clears the responsibility, the weight and the rights of the use of the data.
Referring to FIG. 6, FIG. 6 is a flowchart illustrating the steps of constructing a target blockchain architecture if the requestor is not in the blockchain network in an exemplary embodiment of the embodiment of FIG. 4. As shown in fig. 6, it may specifically include steps S601 to S602, which are described in detail as follows:
in step S601, if the requester is not in the blockchain network, the communication mode of the requester is obtained.
In the process of carrying out data transaction by utilizing the data sharing platform, the main body involved is more, so that a block chain architecture with universality and expansibility is needed, if the fact that the requester is not in the block chain network is detected, the communication mode of the requester is acquired, and the adaptive block chain architecture is built according to different communication modes.
Step S602, a target blockchain architecture is constructed based on the communication mode and used for storing encrypted transaction service contracts and contract certification information.
The communication modes may include a proxy computing mode, a p2p (peerto peer lending, point-to-point) mode with intermediate supervision, and a pure p2p mode, based on which a corresponding target blockchain architecture is constructed for storing encrypted transaction service contracts and contract certification information.
Referring to FIG. 7, FIG. 7 is a schematic diagram of a target blockchain architecture built based on communication modes in proxy computing mode in an exemplary embodiment. As shown in fig. 7, in the proxy computing mode, a blockchain node or a distributed database can be disposed beside a pipe network data node and beside a task management node, so that a plurality of pipe network data nodes and task management modules can be networked, and each component interacts with the blockchain or the distributed database through the task management modules; referring to fig. 8, fig. 8 is a schematic diagram of a target blockchain architecture built based on communication mode in p2p mode with intermediate supervision in an exemplary embodiment. As shown in fig. 8, in the p2p mode with intermediate supervision, as shown in fig. 8, a blockchain node or a distributed database can be deployed beside a pipe network data node, the pipe network data node uses its own task management module to interact with the blockchain or the distributed database, and the supervision department can directly check the blockchain or the distributed database; referring to fig. 9, fig. 9 is a schematic diagram of a target blockchain architecture built based on communication mode in p2 p-only mode in an exemplary embodiment. As shown in fig. 9, in the pure p2p mode, as shown in fig. 9, blockchain nodes or distributed databases may be deployed alongside the pipe network data nodes that interact using their own task management modules and blockchains.
In addition, if the requesting party is in the blockchain network, a framework with better universality and expansibility can be constructed, so that the threshold of deployment and use is reduced. For example, in the proxy computing mode, a unified blockchain network can be conditionally required to be established among all sub-companies in the pipe network company, and a centralized supervision unit exists, so that all components interact with the blockchain through a task management module; in a p2p mode with intermediate supervision, the pipe network data nodes interact with a block chain by using a task management module of the pipe network data nodes, and a supervision department can directly check the chain; in the pure p2p mode, the pipe network data nodes interact with the blockchain by using own task management modules.
After the fact that the requester is not in the blockchain network is determined, a target blockchain architecture matched with the communication mode is built based on the communication mode applied by the requester, contract data are prevented from being abused, authenticity and traceability of data circulation use are guaranteed, the problem that the requester, a data sharing platform and a transaction executive party have no reliable blockchain network or the requester does not have operation and maintenance capability of the blockchain network is solved, and deployment and operation and maintenance costs are reduced by building the target blockchain architecture.
Referring to fig. 10, fig. 10 is a flowchart of steps subsequent to step S201 in the embodiment shown in fig. 2 in an exemplary embodiment. As shown in fig. 10, it may include steps S1001 to S1002, which are described in detail as follows:
step S1001, utilizing a data sharing platform to audit the data transaction application to obtain an audit result.
An audit module is configured in the data sharing platform in this embodiment, and is configured to audit the data transaction application after receiving the data transaction application sent by the requester, so as to obtain an audit result, where the audit result may be characterized as passing the audit, or may be characterized as failing the audit.
Step S1002, if the auditing result indicates that the data transaction application passes the auditing, the data transaction application is sent to the data sharing platform to obtain a transaction service contract.
If the auditing result indicates that the data transaction application passes the auditing, and the data transaction application passes the verification and approval, the data transaction application is sent to the data sharing platform to obtain a transaction service contract awakening data transaction task, otherwise, the data transaction application is not transmitted.
As can be seen from the above, in the method provided in this embodiment, by verifying and approving the data transaction application before executing the transaction action corresponding to the data transaction application, the security of each item of data is further ensured, and the situation of malicious request is avoided.
Referring to fig. 11, fig. 11 is a flowchart of step S201 in the embodiment shown in fig. 2 in an exemplary embodiment. As shown in fig. 11, it may include steps S1101 to S1103, which are described in detail as follows:
step S1101, using the data sharing platform, obtaining the subject qualification information of the requester and the transaction executor.
An audit module is configured in the data sharing platform in this embodiment, and is configured to obtain the main body qualification information of the requester and the transaction executor of the access platform.
And step 1102, approval is carried out on the main body qualification information to obtain an approval result.
And the auditing module examines and approves the main qualification information to obtain an examination and approval result, and the examination and approval result is used as a preparation work which is performed in advance before the data security sharing transaction service is developed.
Step S1103, if the approval result indicates that the requester and the transaction executor meet the preset qualification requirement, the data transaction application sent by the requester is received.
If the approval result is characterized in that both the requesting party and the transaction executing party meet the preset qualification requirement, the data sharing platform receives the data transaction application sent by the requesting party, and otherwise, the data transaction application sent by the requesting party is refused to be transmitted.
According to the technical scheme of the embodiment of the sample application, the data sharing platform realizes large-scale interconnection, intercommunication and fusion and utilization of data by carrying out data communication with various main bodies such as a requesting party, a transaction executing party and the like, so that the data circulation cost is greatly reduced, the main body qualification of each main body is approved, the data transaction application is further received after the approval, and the safety of the internal and external data of the oil-gas pipe network is ensured.
Referring to fig. 12, fig. 12 is a flowchart of the steps of obtaining an evaluation result for a data transaction task corresponding to a data transaction application in an exemplary embodiment. As shown in fig. 12, it may specifically include steps S1201 to S1202, which are described in detail below:
step S1201, obtaining transaction information formed by executing the data transaction task corresponding to the data transaction application.
In the process of executing the data transaction task corresponding to the data transaction application by the transaction executing party, various transaction information is generated, and the data transaction task is evaluated by acquiring the transaction information.
Step S1202, evaluating the data transaction task based on the transaction information and the transaction service contract to obtain an evaluation result, and writing the evaluation result into the blockchain.
After the transaction executive side executes the data transaction task, the data sharing platform evaluates the service process according to the acquired transaction information, the transaction service contract and the like through the configured audit module, and records the evaluation result and related data.
In another exemplary embodiment, before evaluating the data transaction task, the transaction executing party feeds back the data resource to be transacted and the task execution result to the requesting party, and after confirmation by each party, the transaction executing party performs settlement of the data transaction, and if the fund transaction behavior is involved, corresponding fund payment and profit allocation are also required.
In this way, after the data transaction is completed, the transaction information and the transaction service contract formed by executing the data transaction corresponding to the data transaction application are audited, so as to judge the authenticity, correctness, compliance, legality, benefit and the like in the data transaction process, thereby improving the management efficiency and the management transparency of the data transaction management.
Fig. 13 is a schematic diagram of a data sharing platform in an exemplary embodiment of the present application, where the data sharing platform includes a task scheduling management module, an audit module, a data service module, a calculation engine, a calculation rule API, and functional modules such as an identity authentication module and a proxy signature module, and the data sharing platform is connected with a requester, a transaction executor, a algorithm, a data provider, a calculator, a result user, and a blockchain, and is used to implement a pipe network data transaction method provided in the present application.
As shown in fig. 14, fig. 14 is a flowchart illustrating a method for implementing a network data transaction using the data sharing platform shown in fig. 13, and may include the following steps in an exemplary embodiment of the present application:
the preparation stage: before the data safety sharing transaction service is developed, each participant can perform preparation work in advance, such as checking the main qualification of the accessed participant by an audit module, developing a specific service algorithm by an algorithm party, performing data treatment and standardization processing on the data set by a data provider and the like;
And (3) resource access: the data provider accesses a data source, a service developer, a service algorithm and the like into the data sharing platform;
data transaction application: the request sends a request to an operator, applies for data resources and related safe sharing transaction services;
application audit: the auditing module audits the application of the requesting party;
acquiring a transaction service contract: after approval, the data provider and the requester negotiate in the environment provided by the operator and sign a transaction service contract together;
data transaction task execution: the transaction executive side allocates required data resources according to the signed transaction service contract and carries out processing of data;
obtaining a transaction result: the transaction executive party delivers the service result to the result user;
task settlement: after confirmation by each party, the transaction executive party performs service settlement, and if the transaction executive party relates to fund transaction behavior, corresponding fund payment and income distribution are also required;
evaluation: after the service is finished, the auditing module evaluates the service process according to the collected transaction service contracts, contract storage information and the like, and records the evaluation result and related data.
Fig. 15 is a block diagram of a pipe network data transaction device 1300, according to an exemplary embodiment of the present application. As shown in fig. 15, the apparatus includes:
A receiving unit 1501, configured to receive a data transaction application sent by a requester;
the processing unit 1502 is configured to obtain an initial contract based on a data transaction application by using a data sharing platform, and encrypt the initial contract by using a preset encryption algorithm to obtain a transaction service contract;
a scheduling unit 1503, configured to schedule corresponding data resources to be transacted based on a transaction service contract;
and the transaction unit 1504 is configured to configure and process the data resources to be transacted based on the transaction service contract by the transaction executive party, and feed back the processed data resources to be transacted to the requesting party to complete the data transaction.
After the pipe network data transaction method provided by the application is applied and the data transaction application is received through the receiving unit 1502, a transaction service contract between a requesting party and a transaction executing party is formed through the processing unit 1502 by utilizing a data sharing platform, so that an electronic service contract mechanism is constructed, and the purpose and the range of data use can be automatically controlled. And the processing unit 1502 encrypts the initial contract formed by the data sharing platform through a preset encryption algorithm, so that plaintext data related to the requester and the transaction executor in the transaction service contract is prevented from being acquired in a continuous interval of the contract, thereby ensuring the safety of the data using process and reducing various safety risks of enterprises in the oil-gas network.
In another exemplary embodiment, the processing unit 1502 is further configured to obtain, using the data sharing platform, a contract algorithm sent by the algorithm party, and deploy a contract template based on the contract algorithm; based on the data transaction application and the contract template, an initial contract for the data transaction application is obtained.
In another exemplary embodiment, the processing unit 1502 is further configured to encrypt the initial contract according to a preset calculation rule by using a multiparty secure encryption algorithm, so as to obtain an encrypted transaction service contract; acquiring contract certification information formed in a transmission process based on a transaction service contract; transaction service contracts and contract validation information are stored up-link into the blockchain.
In another exemplary embodiment, the apparatus further comprises:
the construction unit is used for acquiring a communication mode of the requester if the requester is not in the blockchain network; and constructing a target blockchain architecture based on the communication mode, wherein the target blockchain architecture is used for storing encrypted transaction service contracts and contract certificate information.
In another exemplary embodiment, the apparatus further comprises:
the auditing module is arranged in the data sharing platform and is used for auditing the data transaction application by utilizing the data sharing platform to obtain an auditing result; and if the auditing result indicates that the data transaction application passes the auditing, the data transaction application is sent to the data sharing platform so as to obtain a transaction service contract.
In another exemplary embodiment, the receiving unit 1501 is further configured to obtain, using the data sharing platform, body qualification information of the requesting party and the transaction executing party; approval is carried out on the main body qualification information, and an approval result is obtained; and if the approval result represents that the requester and the transaction executive party meet the preset qualification requirement, receiving a data transaction application sent by the requester.
In another exemplary embodiment, the apparatus further comprises:
the evaluation unit is used for acquiring transaction information formed by executing a data transaction task corresponding to the data transaction application; and evaluating the data transaction task based on the transaction information and the transaction service contract to obtain an evaluation result, and writing the evaluation result into the blockchain.
It should be noted that, the pipe network data transaction apparatus provided in the foregoing embodiment and the pipe network data transaction method provided in the foregoing embodiment belong to the same concept, and the specific manner in which each module and unit perform the operation has been described in detail in the method embodiment, which is not repeated herein. In practical application, the pipe network data transaction device provided in the above embodiment may distribute the functions to be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above, which is not limited herein.
The embodiment of the application also provides electronic equipment, which comprises: one or more processors; and the storage device is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the electronic equipment realizes the pipe network data transaction method provided in each embodiment.
Fig. 16 shows a schematic diagram of a computer system suitable for use in implementing the electronic device of the embodiments of the present application. It should be noted that, the computer system 1600 of the electronic device shown in fig. 16 is only an example, and should not impose any limitation on the functions and the application scope of the embodiments of the present application.
As shown in fig. 16, the computer system 1600 includes a central processing unit (Central Processing Unit, CPU) 1601 that can perform various appropriate actions and processes, such as performing the method in the above-described embodiment, according to a program stored in a Read-Only Memory (ROM) 1602 or a program loaded from a storage section 1608 into a random access Memory (Random Access Memory, RAM) 1603. In the RAM 1603, various programs and data required for system operation are also stored. The CPU 1601, ROM 1602, and RAM 1603 are connected to each other by a bus 1604. An Input/Output (I/O) interface 1605 is also connected to bus 1604.
The following components are connected to the I/O interface 1605: an input portion 1606 including a keyboard, a mouse, and the like; an output portion 1607 including a Cathode Ray Tube (CRT), a liquid crystal display (Liquid Crystal Display, LCD), and the like, a speaker, and the like; a storage portion 1608 including a hard disk or the like; and a communication section 1609 including a network interface card such as a LAN (Local AreaNetwork ) card, a modem, or the like. The communication section 1609 performs communication processing via a network such as the internet. The drive 1610 is also connected to the I/O interface 1605 as needed. A removable medium 1611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on the drive 1610 so that a computer program read out therefrom is installed into the storage section 1608 as needed.
In particular, according to embodiments of the present application, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising a computer program for performing the method shown in the flowchart. In such embodiments, the computer program may be downloaded and installed from a network via the communication portion 1609, and/or installed from the removable media 1611. When executed by a Central Processing Unit (CPU) 1601, the computer program performs the various functions defined in the system of the present application.
It should be noted that, the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium may be, for example, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-Only Memory (ROM), an erasable programmable read-Only Memory (Erasable Programmable Read Only Memory, EPROM), flash Memory, an optical fiber, a portable compact disc read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with a computer-readable computer program embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. A computer program embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Where each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present application may be implemented by means of software, or may be implemented by means of hardware, and the described units may also be provided in a processor. Wherein the names of the units do not constitute a limitation of the units themselves in some cases.
Another aspect of the present application also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor implements a pipe network data transaction method as previously described. The computer-readable storage medium may be included in the electronic device described in the above embodiment or may exist alone without being incorporated in the electronic device.
Another aspect of the present application also provides a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the pipe network data transaction method provided in the above embodiments.
The foregoing description of the preferred embodiment of the present invention is provided for the purpose of illustration only, and is not intended to limit the invention to the particular form disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.

Claims (10)

1. A method for pipe network data transaction, the method comprising:
Receiving a data transaction application sent by a requesting party;
acquiring an initial contract based on the data transaction application by using a data sharing platform, and encrypting the initial contract through a preset encryption algorithm to obtain a transaction service contract;
scheduling corresponding data resources to be transacted based on the transaction service contract;
and the transaction executive party carries out configuration processing on the data resources to be transacted based on the transaction service contract, and feeds the processed data resources to be transacted back to the requesting party to complete data transaction.
2. The method of claim 1, wherein the acquiring, with the data sharing platform, an initial contract based on the data transaction application, comprises:
acquiring a contract algorithm sent by an algorithm party by utilizing a data sharing platform, and deploying a contract template based on the contract algorithm;
and obtaining an initial contract aiming at the data transaction application based on the data transaction application and the contract template.
3. The method according to claim 1, wherein the encrypting the initial contract by a preset encryption algorithm to obtain a transaction service contract comprises:
Encrypting the initial contract through a multiparty secure encryption algorithm according to a preset calculation rule to obtain an encrypted transaction service contract;
acquiring contract certificate information formed based on the transmission process of the transaction service contract;
and storing the transaction service contract and the contract certification information in a blockchain in a uplink manner.
4. A method according to claim 3, characterized in that the method further comprises:
if the requester is not in the blockchain network, acquiring a communication mode of the requester;
and constructing a target blockchain architecture based on the communication mode, wherein the target blockchain architecture is used for storing the encrypted transaction service contract and the contract certification information.
5. The method of any of claims 1 to 4, wherein after accepting a request for a data transaction sent by a requestor, the method further comprises:
utilizing the data sharing platform to audit the data transaction application to obtain an audit result;
and if the auditing result indicates that the data transaction application passes the auditing, the data transaction application is sent to the data sharing platform so as to obtain the transaction service contract.
6. The method of any one of claims 1 to 4, wherein accepting the request for data transaction from the requesting party comprises:
acquiring main body qualification information of the requester and the transaction executive party by using the data sharing platform;
approval is carried out on the main qualification information to obtain approval results;
and if the approval result represents that the requester and the transaction executive party meet the preset qualification requirement, receiving a data transaction application sent by the requester.
7. The method according to any one of claims 1 to 4, further comprising:
acquiring transaction information formed by executing a data transaction task corresponding to the data transaction application;
and evaluating the data transaction task based on the transaction information and the transaction service contract to obtain an evaluation result, and writing the evaluation result into a blockchain.
8. A pipe network data transaction device, comprising:
the receiving unit is used for receiving the data transaction application sent by the requesting party;
the processing unit is used for acquiring an initial contract based on the data transaction application by utilizing the data sharing platform, and encrypting the initial contract through a preset encryption algorithm to obtain a transaction service contract;
A scheduling unit, configured to schedule corresponding data resources to be transacted based on the transaction service contract;
and the transaction unit is used for the transaction executive party to perform configuration processing on the data resources to be transacted based on the transaction service contract, and feeds the processed data resources to be transacted back to the requesting party to complete data transaction.
9. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs which, when executed by the one or more processors, cause the electronic device to implement the pipe network data transaction method of any of claims 1 to 7.
10. A computer readable storage medium having stored thereon computer readable instructions which, when executed by a processor of a computer, cause the computer to perform the pipe network data transaction method of any one of claims 1 to 7.
CN202311383378.XA 2023-10-24 2023-10-24 Pipe network data transaction method and device, electronic equipment and storage medium Pending CN117407923A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311383378.XA CN117407923A (en) 2023-10-24 2023-10-24 Pipe network data transaction method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311383378.XA CN117407923A (en) 2023-10-24 2023-10-24 Pipe network data transaction method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117407923A true CN117407923A (en) 2024-01-16

Family

ID=89486635

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311383378.XA Pending CN117407923A (en) 2023-10-24 2023-10-24 Pipe network data transaction method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117407923A (en)

Similar Documents

Publication Publication Date Title
US11710124B2 (en) Method, apparatus, and computer-readable medium for secured multi-lateral data exchange over a computer network
KR102086228B1 (en) A secure and efficient blockchain service based on a untrusted blockchain arbitration server
US20170046694A1 (en) Secure Tracking Beacons Using Distributed Ledgers
TW201947910A (en) Blockchain data processing methods, apparatuses, processing devices, and systems
Mouratidis et al. From goal‐driven security requirements engineering to secure design
TW202024943A (en) Multi-access edge computing node with distributed ledger
KR20180114939A (en) Systems and methods for controlling asset-related activities through block chaining
CN111417977A (en) System and method for managing patent risks
CN111159753B (en) Block chain intelligent contract management method and system, storage medium and terminal
US20230360042A1 (en) Method, system, and computer-readable medium for secured multi-lateral data exchange over a computer network
CN115065461A (en) Secure multiparty computing method, system and computer readable medium
CN108768618A (en) A kind of soft core authorization methods of IP based on block chain, device and medium
CN115705571A (en) Protecting privacy of auditable accounts
CN114417324B (en) Query method based on trusted execution environment privacy intersection
Xia et al. Trust in Software Supply Chains: Blockchain-Enabled SBOM and the AIBOM Future
Mansoor et al. A review of blockchain approaches for kyc
Mahmood et al. Privacy-Preserving Block-chain Framework Based on Ring Signatures (RSs) and Zero-Knowledge Proofs (ZKPs)
Gabrielli et al. KRAKEN: A Secure, Trusted, Regulatory-Compliant, and Privacy-Preserving Data Sharing Platform
Kasinathan et al. Securing emergent IoT applications
CN117407923A (en) Pipe network data transaction method and device, electronic equipment and storage medium
Balamurugan et al. A Survey on Privacy Preserving and Trust Building Techniques of Blockchain-Based Systems
US9467298B1 (en) Device for and method of multilevel chain of trust/revision
Periorellis et al. GOLD infrastructure for virtual organizations
Karmakar et al. Jurisprudence: blockchain enabled privacy preserving framework complying digital ethics
KR20210027012A (en) Peer node and method for processing information thereof, and blockchain platform systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination