CN108875402A - A kind of big data analysis method and system based on transportation network - Google Patents

A kind of big data analysis method and system based on transportation network Download PDF

Info

Publication number
CN108875402A
CN108875402A CN201810383265.2A CN201810383265A CN108875402A CN 108875402 A CN108875402 A CN 108875402A CN 201810383265 A CN201810383265 A CN 201810383265A CN 108875402 A CN108875402 A CN 108875402A
Authority
CN
China
Prior art keywords
transportation network
data
unique
identification code
timestamp
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810383265.2A
Other languages
Chinese (zh)
Inventor
卢永星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810383265.2A priority Critical patent/CN108875402A/en
Publication of CN108875402A publication Critical patent/CN108875402A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/70ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for mining of medical data, e.g. analysing previous cases of other patients
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Public Health (AREA)
  • Data Mining & Analysis (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Biomedical Technology (AREA)
  • Pathology (AREA)
  • Computer Hardware Design (AREA)
  • Epidemiology (AREA)
  • Primary Health Care (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The big data analysis method and system based on transportation network that this application discloses a kind of, this method include:Generate unique transportation network identification code;Transportation network data are obtained according to unique transportation network identification code and timestamp is generated according to current time;Block chain is written into the transportation network data and the timestamp.The embodiment of the present application is by generating unique transportation network identification code using block chain technology, block chain is written into transportation network data,, to realize the decentralization storage and backup of transportation network data, the loss of transportation network data can be avoided with the data of real-time synchronization transportation network equipment.

Description

A kind of big data analysis method and system based on transportation network
Technical field
The application relates to medical big data analysis field, and in particular to a kind of big data analysis method based on transportation network and System.
Background technique
Transportation networkIt is the important component of generation information technology, and the important development rank in " informationization " epoch Section.Transportation network is understood that a certain range of vehicles carry out the intermediate medium of communication and information exchange.This has two layers The meaning:It is the net of extension based on the internet and extension first, the core of transportation network and basis are still internet Network;Second, its user terminal extends and extends between any vehicles and the vehicles, carry outInformation exchangeWithCommunication, Namely the vehicles mutually cease.Transportation network communicates cognition technology by Intellisense, identification technology and general fit calculation etc..It hands over Open network is in terms of intelligent transportation using relatively broad.But all there is security risk in existing intelligent transportation, such as when illegal When molecule invades, the data of entire traffic network system are easily lost, and user is difficult to restore the running of data or system It can be manipulated perhaps to paralyse by criminal and in turn result in system exception operation or utilized by illegal person.But at present It there is no the good method for solving transportation network problem of data safety.
Summary of the invention
The purpose of the embodiment of the present application is:A kind of big data analysis method and system based on transportation network are provided, To improve the safety of transportation network data.
In a first aspect, a kind of big data analysis method based on transportation network is provided, including:
Generate unique transportation network identification code;
Transportation network data are obtained according to unique transportation network identification code and timestamp is generated according to current time;
Block chain is written into the transportation network data and the timestamp.
In a possible design, transportation network data are being obtained according to unique transportation network identification code and are generating the time Before stamp, further include:Judge whether unique transportation network identification code is legal, really to be legal, then by the transportation network data and institute It states timestamp write-in block chain and then issues alarm really to be illegal.
In a possible design, obtains transportation network data and specifically include:It obtains transportation network equipment machine number, hand over Open network device control data, transportation network equipment operating data and transportation network equipment fault data.
In a possible design, after by the transportation network data and timestamp write-in block chain, also wrap It includes:The transportation network data in the block chain are obtained according to transportation network identification code.
In a possible design, generates unique transportation network identification code and specifically include:
Unique transportation network identification code is generated according to Encryption Algorithm, unique transportation network identification code includes unique transportation network Identify that public code and unique transportation network identify private code.
Second aspect provides a kind of big data analysis system based on transportation network, including:
Generation module:Unique transportation network identification code is generated, and transportation network data are obtained according to unique transportation network identification code And timestamp is generated according to current time;
Execution module:Block chain is written into the transportation network data and the timestamp.
In a possible design, the execution module is also used to:It is handed over being obtained according to unique transportation network identification code Open network data and before generating timestamp, judge whether unique transportation network identification code is legal, really to be legal, then by the traffic Network data and the timestamp are written block chain and then issue alarm really to be illegal.
In a possible design, the transportation network data are specifically included:
Transportation network equipment machine number, transportation network device control data, transportation network equipment operating data and transportation network are set Standby fault data.
In a possible design, the execution module is also used to:By the transportation network data and the time After stamp write-in block chain, the transportation network data in the block chain are obtained according to transportation network identification code.
In a possible design, the generation module is specifically used for:Unique transportation network is generated according to Encryption Algorithm Identification code, unique transportation network identification code include that unique transportation network identifies that public code and unique transportation network identify private code
The third aspect provides a kind of big data analysis system based on transportation network, including processor and reservoir, described to deposit Reservoir is stored with the operational order of the method in the method and any possible design for executing first aspect offer, The processor is for executing the operational order.
Fourth aspect provides a kind of computer storage medium, and the computer storage medium is stored with operational order, institute State the method in method and any possible design of the operational order for executing first aspect offer.
Since the embodiment of the present application uses above-mentioned technical proposal, at least following technical effect:
1, transportation network data are written by generating unique transportation network identification code using block chain technology for the embodiment of the present application Block chain, can with the data of real-time synchronization transportation network equipment, thus realize transportation network data decentralization storage and Backup avoids the loss of transportation network data, while can real-time recording vehicle initial data;
2, the embodiment of the present application is also by carrying out encrypted authentication to transportation network data, not conforming in data when block chain is written When method, alarm is issued, to prevent the risk that transportation network is invaded, ensure that the safety of its transportation network.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, below will be to institute in embodiment Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the application Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.Attached drawing does not deliberately draw attached drawing by actual size equal proportion scaling, it is preferred that emphasis is shows the master of the application Purport.
Fig. 1 is the flow chart of the big data analysis method of the embodiment of the present application;
Fig. 2 is the module map one of the big data analysis system of the embodiment of the present application;
Fig. 3 is the module map two of the big data analysis system of the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
When doctor judges patient's state of an illness, sometimes, need to judge according to the previous case of patient the cause of disease etc. of user, But current Medically Oriented Data System cannot achieve the reasonable shared of user's state of an illness data, is likely to result in doctor and judges sufferer disease The problem of feelings inaccuracy.
In view of this, referring to attached drawing 1, the embodiment of the present application provides a kind of big data analysis side based on transportation network Method is described in detail below:
Step S101:Generate unique transportation network identification code;
Step S102:Transportation network data are obtained according to unique transportation network identification code and timestamp is generated according to current time;
Step S103:Block chain is written into the transportation network data and the timestamp.
Transportation network accesses before block chain, and transportation network mentioned herein refers to that a certain range of vehicles are total Network, big data analysis system generate unique transportation network identification code according to Current traffic network system.In order to more into one Step guarantees transportation network data safety, generates unique transportation network identification code according to Encryption Algorithm, unique transportation network is known Other code includes that unique transportation network identifies that public code and unique transportation network identify private code, and unique transportation network identifies that public code is stored in In block chain, for the identification code of block chain identification transportation network, unique transportation network identifies that private code is stored by user oneself, uses In the data for accessing transportation network in block chain, when unique transportation network identifies that private code identifies public code phase with unique transportation network When matching, user can just acquire transportation network data.
When generating unique transportation network identification code, big data analysis system obtains Current traffic network data, hands over Open network data include transportation network equipment machine number, transportation network device control data, transportation network equipment operating data and Transportation network equipment fault data;Transportation network equipment machine number is the machine code of the machine under the transportation network, such as traffic The network equipment includes vehicle-mounted computer, automobile etc., they have the machine code of oneself;Transportation network device control data is the traffic The control instruction that the control equipment of the network equipment issues, such as the vehicle interior temperature control instruction that automobile control equipment issues;Traffic Network equipment operation data refers to the operating condition under the transportation network in the period of equipment, such as daily Celsius 22 of automobile Working time statistical data of degree etc.;The case where transportation network equipment fault data refer to the failure of equipment under transportation network, than As automobile power-down one is inferior.Transportation network data can be backed up by obtaining these transportation network data, be convenient for later period user The case where analytical equipment.It while obtaining transportation network data, also needs to obtain current time, the time is generated according to current time Stamp.
Certainly, before obtaining transportation network data according to unique transportation network identification code and generating timestamp, further include:Sentence Whether unique transportation network identification code of breaking is legal, really to be legal, then by the transportation network data and the timestamp write area Block chain then issues alarm really to be illegal.May have that other are illegally instructed or data attempt to write into block chain, at this time big number Need judge whether the object of presently written data is legal according to unique transportation network identification code according to analysis system, if legal Then continue subsequent step, if it find that it is illegal, then alarm is issued, unauthorized person is avoided to attempt to invade traffic network system, from Source avoids the invasion of illegal person, ensure that the Information Security of transportation network equipment.
Block chain is written into the transportation network data and the timestamp, thus recording traffic network data in real time.
After by the transportation network data and timestamp write-in block chain, further include:It is identified according to transportation network Code obtains the transportation network data in the block chain.User can use unique transportation network identification code and obtain from block pair Should transportation network data, unique transportation network identifies that private code is stored by user oneself, for accessing the network of communication lines in block chain The data of network, when unique transportation network identifies that private code and unique transportation network identify that public code matches, user can just be obtained Obtain transportation network data.
On the basis of above-mentioned big data analysis method, in conjunction with Fig. 2, the embodiment of the present application also provides one kind to be based on traffic The big data analysis system of network, including:
Generation module:Unique transportation network identification code is generated, and transportation network data are obtained according to unique transportation network identification code And timestamp is generated according to current time;
Execution module:Block chain is written into the transportation network data and the timestamp.
In a possible design, the execution module is also used to:It is handed over being obtained according to unique transportation network identification code Open network data and before generating timestamp, judge whether unique transportation network identification code is legal, really to be legal, then by the traffic Network data and the timestamp are written block chain and then issue alarm really to be illegal.
In a possible design, the transportation network data are specifically included:
Transportation network equipment machine number, transportation network device control data, transportation network equipment operating data and transportation network are set Standby fault data.
In a possible design, the execution module is also used to:By the transportation network data and the time After stamp write-in block chain, the transportation network data in the block chain are obtained according to transportation network identification code.
In a possible design, the generation module is specifically used for:Unique transportation network is generated according to Encryption Algorithm Identification code, unique transportation network identification code include that unique transportation network identifies that public code and unique transportation network identify private code
On the basis of above-mentioned big data analysis method, a kind of big data analysis system based on transportation network is provided, including Processor and reservoir, the memory is stored with method for executing first aspect offer and any one possible sets The operational order of method in meter, the processor is for executing the operational order.
On the basis of above-mentioned big data analysis method, a kind of computer storage medium, the computer storage are provided Media storage has an operational order, and the operational order is used to execute the method for first aspect offer and any one possible sets Method in meter.
On the basis of above-mentioned medical data method, in conjunction with Fig. 3, the embodiment of the present application provides a kind of based on the network of communication lines The big data analysis system of network, including processor and reservoir, the memory is stored with to be provided for executing above-described embodiment The method operational order that provides of big data analysis method, the processor is for executing the operational order.
On the basis of above-mentioned medical data method, the embodiment of the present application provides a kind of computer storage medium, institute It states computer storage medium and is stored with operational order, the operational order is for executing big data analysis provided by the above embodiment The method that method provides.
Herein described program product can be using any combination of one or more readable mediums.Readable medium can be Readable signal medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example may be-but not limited to-electricity, magnetic, light, Electromagnetism, the system of infrared ray or semiconductor, device or device, or any above combination.Readable storage medium storing program for executing has more The example (non exhaustive list) of body includes:Electrical connection, portable disc, hard disk with one or more conducting wires are deposited at random Access to memory (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, just Take formula compact disk read-only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The storage medium of the application its can be using portable compact disc read only memory (CD-ROM) and including program Code, and can be run on server apparatus.However, the program product of the application is without being limited thereto, it is in this document, readable to deposit Storage media can be any tangible medium for including or store program, which can be commanded execution system, device or device Part use or in connection.Readable signal medium may include in a base band or as carrier wave a part propagate number It is believed that number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including --- but It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Readable signal medium can also be readable storage Any readable medium other than medium, the readable medium can be sent, propagated or transmitted for by instruction execution system, device Either device use or program in connection.
The program code for including on readable medium can transmit with any suitable medium, including --- but it is unlimited In --- wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the application operation program Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind --- including local area network (LAN) or Wide area network (WAN)-be connected to user calculating equipment, or, it may be connected to external computing device (such as utilize internet Service provider is connected by internet).
It should be noted that although being referred to several unit or sub-units of device in the above detailed description, this stroke It point is only exemplary not enforceable.In fact, according to presently filed embodiment, it is above-described two or more The feature and function of unit can embody in a unit.Conversely, the feature and function of an above-described unit can It is to be embodied by multiple units with further division.In addition, although describing the application method in the accompanying drawings with particular order Operation, still, this does not require that or implies must execute these operations in this particular order, or have to carry out Operation shown in whole is just able to achieve desired result.Additionally or alternatively, it is convenient to omit certain steps, by multiple steps It merges into a step to execute, and/or a step is decomposed into execution of multiple steps.
Although describing spirit herein and principle by reference to several specific embodiments, it should be appreciated that, this It is not limited to the specific embodiments disclosed for invention, does not also mean that the feature in these aspects cannot to the division of various aspects Combination is benefited to carry out, this to divide the convenience merely to statement.This application is intended to cover appended claims spirit and Included various modifications and equivalent arrangements in range.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any Belong to those skilled in the art within the technical scope of the present application, any changes or substitutions that can be easily thought of, all answers Cover within the scope of protection of this application.

Claims (10)

1. a kind of big data analysis method based on transportation network, which is characterized in that including:
Generate unique transportation network identification code;
Transportation network data are obtained according to unique transportation network identification code and timestamp is generated according to current time;
Block chain is written into the transportation network data and the timestamp.
2. the method as described in claim 1, which is characterized in that obtaining transportation network number according to unique transportation network identification code According to and before generating timestamp, further include:Judge whether unique transportation network identification code is legal, really to be legal, then by the traffic Network data and the timestamp are written block chain and then issue alarm really to be illegal.
3. the method as described in claim 1, which is characterized in that obtain transportation network data and specifically include:Obtain transportation network Equipment machine number, transportation network device control data, transportation network equipment operating data and transportation network equipment fault data.
4. the method as described in claim 1, which is characterized in that by the transportation network data and the timestamp write area After block chain, further include:The transportation network data in the block chain are obtained according to transportation network identification code.
5. the method as described in claim 1, which is characterized in that generate unique transportation network identification code and specifically include:
Unique transportation network identification code is generated according to Encryption Algorithm, unique transportation network identification code includes unique transportation network Identify that public code and unique transportation network identify private code.
6. a kind of big data analysis system based on transportation network, which is characterized in that including:
Generation module:Unique transportation network identification code is generated, and transportation network data are obtained according to unique transportation network identification code And timestamp is generated according to current time;
Execution module:Block chain is written into the transportation network data and the timestamp.
7. system as claimed in claim 6, which is characterized in that the execution module is also used to:According to unique transportation network Before identification code obtains transportation network data and generates timestamp, judge whether unique transportation network identification code is legal, really to be legal, The transportation network data and timestamp write-in block chain are then then issued into alarm really to be illegal.
8. system as claimed in claim 6, which is characterized in that the transportation network data specifically include:
Transportation network equipment machine number, transportation network device control data, transportation network equipment operating data and transportation network are set Standby fault data.
9. system as claimed in claim 6, which is characterized in that the execution module is also used to:By the transportation network number After block chain is written with the timestamp, the transportation network data in the block chain are obtained according to transportation network identification code.
10. system as claimed in claim 6, which is characterized in that the generation module is specifically used for:It is generated according to Encryption Algorithm Unique transportation network identification code, unique transportation network identification code include that unique transportation network identifies public code and unique network of communication lines Network identifies private code.
CN201810383265.2A 2018-04-26 2018-04-26 A kind of big data analysis method and system based on transportation network Pending CN108875402A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810383265.2A CN108875402A (en) 2018-04-26 2018-04-26 A kind of big data analysis method and system based on transportation network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810383265.2A CN108875402A (en) 2018-04-26 2018-04-26 A kind of big data analysis method and system based on transportation network

Publications (1)

Publication Number Publication Date
CN108875402A true CN108875402A (en) 2018-11-23

Family

ID=64326583

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810383265.2A Pending CN108875402A (en) 2018-04-26 2018-04-26 A kind of big data analysis method and system based on transportation network

Country Status (1)

Country Link
CN (1) CN108875402A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112233389A (en) * 2020-11-04 2021-01-15 珠海格力电器股份有限公司 Local area energy Internet system and alarm method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237087A (en) * 2013-05-15 2013-08-07 苏州洁祥电子有限公司 Vehicle-mounted intelligent terminal and vehicle internetworking link protection system
CN103415011A (en) * 2013-08-05 2013-11-27 浙江工商大学 Safety certification method of vehicular adhoc network based on intelligent card
CN104010302A (en) * 2014-04-29 2014-08-27 上海交通大学 Vehicle-mounted self-organizing network traffic data trust evaluation method
CN107317856A (en) * 2017-06-23 2017-11-03 李波 A kind of date storage method and device based on block chain
CN107729770A (en) * 2017-10-09 2018-02-23 深圳市轱辘车联数据技术有限公司 The management method and system of a kind of vehicle data
CN107945090A (en) * 2017-11-30 2018-04-20 深圳市轱辘车联数据技术有限公司 Vehicular exhaust data analysing method, device and server based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237087A (en) * 2013-05-15 2013-08-07 苏州洁祥电子有限公司 Vehicle-mounted intelligent terminal and vehicle internetworking link protection system
CN103415011A (en) * 2013-08-05 2013-11-27 浙江工商大学 Safety certification method of vehicular adhoc network based on intelligent card
CN104010302A (en) * 2014-04-29 2014-08-27 上海交通大学 Vehicle-mounted self-organizing network traffic data trust evaluation method
CN107317856A (en) * 2017-06-23 2017-11-03 李波 A kind of date storage method and device based on block chain
CN107729770A (en) * 2017-10-09 2018-02-23 深圳市轱辘车联数据技术有限公司 The management method and system of a kind of vehicle data
CN107945090A (en) * 2017-11-30 2018-04-20 深圳市轱辘车联数据技术有限公司 Vehicular exhaust data analysing method, device and server based on block chain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112233389A (en) * 2020-11-04 2021-01-15 珠海格力电器股份有限公司 Local area energy Internet system and alarm method

Similar Documents

Publication Publication Date Title
Sharma et al. EHDHE: Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain
JP6758501B2 (en) Blockchain-based data processing methods and devices
CN112804257B (en) Method and system for distributed cryptographic keys
CN105493538B (en) The system and method for NFC access control for safety element center type NFC framework
CN109558748A (en) Data processing method, device, electronic equipment and storage medium
CN109583885A (en) Bout controls rewritable block chain
CN109376504A (en) A kind of picture method for secret protection based on block chain technology
CN110321732A (en) Data grant method, apparatus, storage medium and the electronic equipment of block catenary system
CN108985569A (en) A kind of vehicle risk appraisal procedure, server
EP3605381A1 (en) Information provision device, information provision system, information provision method, and program
CN109255210A (en) The method, apparatus and storage medium of intelligent contract are provided in block chain network
CN108830088A (en) A kind of big data analysis method and system based on Internet of Things
CN109600377A (en) Anti- go beyond one's commission method, apparatus, computer equipment and storage medium
CN112804218A (en) Data processing method, device and equipment based on block chain and storage medium
CN103294938A (en) Access request verification method and system, authorization information generation method, hardware equipment
CN111488619A (en) Health data privacy protection and sharing system based on block chain
AU2018256929B2 (en) Systems and methods for identity atomization and usage
CN108074024A (en) Risk Identification Method, apparatus and system
CN110955673A (en) Data de-identification method, device, equipment and storage medium
CN109685225A (en) A kind of vehicle information management method and relevant device
CN110060154A (en) Works based on block chain deposit card method, system, device and equipment
CN116011023A (en) Data desensitization processing method and device, terminal equipment and storage medium
CN109325360B (en) Information management method and device
CN108875402A (en) A kind of big data analysis method and system based on transportation network
CN110363025A (en) A kind of user data privacy management method, apparatus and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181123