CN108875402A - A kind of big data analysis method and system based on transportation network - Google Patents
A kind of big data analysis method and system based on transportation network Download PDFInfo
- Publication number
- CN108875402A CN108875402A CN201810383265.2A CN201810383265A CN108875402A CN 108875402 A CN108875402 A CN 108875402A CN 201810383265 A CN201810383265 A CN 201810383265A CN 108875402 A CN108875402 A CN 108875402A
- Authority
- CN
- China
- Prior art keywords
- transportation network
- data
- unique
- identification code
- timestamp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H50/00—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
- G16H50/70—ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for mining of medical data, e.g. analysing previous cases of other patients
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Public Health (AREA)
- Data Mining & Analysis (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Biomedical Technology (AREA)
- Pathology (AREA)
- Computer Hardware Design (AREA)
- Epidemiology (AREA)
- Primary Health Care (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The big data analysis method and system based on transportation network that this application discloses a kind of, this method include:Generate unique transportation network identification code;Transportation network data are obtained according to unique transportation network identification code and timestamp is generated according to current time;Block chain is written into the transportation network data and the timestamp.The embodiment of the present application is by generating unique transportation network identification code using block chain technology, block chain is written into transportation network data,, to realize the decentralization storage and backup of transportation network data, the loss of transportation network data can be avoided with the data of real-time synchronization transportation network equipment.
Description
Technical field
The application relates to medical big data analysis field, and in particular to a kind of big data analysis method based on transportation network and
System.
Background technique
Transportation networkIt is the important component of generation information technology, and the important development rank in " informationization " epoch
Section.Transportation network is understood that a certain range of vehicles carry out the intermediate medium of communication and information exchange.This has two layers
The meaning:It is the net of extension based on the internet and extension first, the core of transportation network and basis are still internet
Network;Second, its user terminal extends and extends between any vehicles and the vehicles, carry outInformation exchangeWithCommunication,
Namely the vehicles mutually cease.Transportation network communicates cognition technology by Intellisense, identification technology and general fit calculation etc..It hands over
Open network is in terms of intelligent transportation using relatively broad.But all there is security risk in existing intelligent transportation, such as when illegal
When molecule invades, the data of entire traffic network system are easily lost, and user is difficult to restore the running of data or system
It can be manipulated perhaps to paralyse by criminal and in turn result in system exception operation or utilized by illegal person.But at present
It there is no the good method for solving transportation network problem of data safety.
Summary of the invention
The purpose of the embodiment of the present application is:A kind of big data analysis method and system based on transportation network are provided,
To improve the safety of transportation network data.
In a first aspect, a kind of big data analysis method based on transportation network is provided, including:
Generate unique transportation network identification code;
Transportation network data are obtained according to unique transportation network identification code and timestamp is generated according to current time;
Block chain is written into the transportation network data and the timestamp.
In a possible design, transportation network data are being obtained according to unique transportation network identification code and are generating the time
Before stamp, further include:Judge whether unique transportation network identification code is legal, really to be legal, then by the transportation network data and institute
It states timestamp write-in block chain and then issues alarm really to be illegal.
In a possible design, obtains transportation network data and specifically include:It obtains transportation network equipment machine number, hand over
Open network device control data, transportation network equipment operating data and transportation network equipment fault data.
In a possible design, after by the transportation network data and timestamp write-in block chain, also wrap
It includes:The transportation network data in the block chain are obtained according to transportation network identification code.
In a possible design, generates unique transportation network identification code and specifically include:
Unique transportation network identification code is generated according to Encryption Algorithm, unique transportation network identification code includes unique transportation network
Identify that public code and unique transportation network identify private code.
Second aspect provides a kind of big data analysis system based on transportation network, including:
Generation module:Unique transportation network identification code is generated, and transportation network data are obtained according to unique transportation network identification code
And timestamp is generated according to current time;
Execution module:Block chain is written into the transportation network data and the timestamp.
In a possible design, the execution module is also used to:It is handed over being obtained according to unique transportation network identification code
Open network data and before generating timestamp, judge whether unique transportation network identification code is legal, really to be legal, then by the traffic
Network data and the timestamp are written block chain and then issue alarm really to be illegal.
In a possible design, the transportation network data are specifically included:
Transportation network equipment machine number, transportation network device control data, transportation network equipment operating data and transportation network are set
Standby fault data.
In a possible design, the execution module is also used to:By the transportation network data and the time
After stamp write-in block chain, the transportation network data in the block chain are obtained according to transportation network identification code.
In a possible design, the generation module is specifically used for:Unique transportation network is generated according to Encryption Algorithm
Identification code, unique transportation network identification code include that unique transportation network identifies that public code and unique transportation network identify private code
The third aspect provides a kind of big data analysis system based on transportation network, including processor and reservoir, described to deposit
Reservoir is stored with the operational order of the method in the method and any possible design for executing first aspect offer,
The processor is for executing the operational order.
Fourth aspect provides a kind of computer storage medium, and the computer storage medium is stored with operational order, institute
State the method in method and any possible design of the operational order for executing first aspect offer.
Since the embodiment of the present application uses above-mentioned technical proposal, at least following technical effect:
1, transportation network data are written by generating unique transportation network identification code using block chain technology for the embodiment of the present application
Block chain, can with the data of real-time synchronization transportation network equipment, thus realize transportation network data decentralization storage and
Backup avoids the loss of transportation network data, while can real-time recording vehicle initial data;
2, the embodiment of the present application is also by carrying out encrypted authentication to transportation network data, not conforming in data when block chain is written
When method, alarm is issued, to prevent the risk that transportation network is invaded, ensure that the safety of its transportation network.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, below will be to institute in embodiment
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the application
Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings
Obtain other attached drawings.Attached drawing does not deliberately draw attached drawing by actual size equal proportion scaling, it is preferred that emphasis is shows the master of the application
Purport.
Fig. 1 is the flow chart of the big data analysis method of the embodiment of the present application;
Fig. 2 is the module map one of the big data analysis system of the embodiment of the present application;
Fig. 3 is the module map two of the big data analysis system of the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
When doctor judges patient's state of an illness, sometimes, need to judge according to the previous case of patient the cause of disease etc. of user,
But current Medically Oriented Data System cannot achieve the reasonable shared of user's state of an illness data, is likely to result in doctor and judges sufferer disease
The problem of feelings inaccuracy.
In view of this, referring to attached drawing 1, the embodiment of the present application provides a kind of big data analysis side based on transportation network
Method is described in detail below:
Step S101:Generate unique transportation network identification code;
Step S102:Transportation network data are obtained according to unique transportation network identification code and timestamp is generated according to current time;
Step S103:Block chain is written into the transportation network data and the timestamp.
Transportation network accesses before block chain, and transportation network mentioned herein refers to that a certain range of vehicles are total
Network, big data analysis system generate unique transportation network identification code according to Current traffic network system.In order to more into one
Step guarantees transportation network data safety, generates unique transportation network identification code according to Encryption Algorithm, unique transportation network is known
Other code includes that unique transportation network identifies that public code and unique transportation network identify private code, and unique transportation network identifies that public code is stored in
In block chain, for the identification code of block chain identification transportation network, unique transportation network identifies that private code is stored by user oneself, uses
In the data for accessing transportation network in block chain, when unique transportation network identifies that private code identifies public code phase with unique transportation network
When matching, user can just acquire transportation network data.
When generating unique transportation network identification code, big data analysis system obtains Current traffic network data, hands over
Open network data include transportation network equipment machine number, transportation network device control data, transportation network equipment operating data and
Transportation network equipment fault data;Transportation network equipment machine number is the machine code of the machine under the transportation network, such as traffic
The network equipment includes vehicle-mounted computer, automobile etc., they have the machine code of oneself;Transportation network device control data is the traffic
The control instruction that the control equipment of the network equipment issues, such as the vehicle interior temperature control instruction that automobile control equipment issues;Traffic
Network equipment operation data refers to the operating condition under the transportation network in the period of equipment, such as daily Celsius 22 of automobile
Working time statistical data of degree etc.;The case where transportation network equipment fault data refer to the failure of equipment under transportation network, than
As automobile power-down one is inferior.Transportation network data can be backed up by obtaining these transportation network data, be convenient for later period user
The case where analytical equipment.It while obtaining transportation network data, also needs to obtain current time, the time is generated according to current time
Stamp.
Certainly, before obtaining transportation network data according to unique transportation network identification code and generating timestamp, further include:Sentence
Whether unique transportation network identification code of breaking is legal, really to be legal, then by the transportation network data and the timestamp write area
Block chain then issues alarm really to be illegal.May have that other are illegally instructed or data attempt to write into block chain, at this time big number
Need judge whether the object of presently written data is legal according to unique transportation network identification code according to analysis system, if legal
Then continue subsequent step, if it find that it is illegal, then alarm is issued, unauthorized person is avoided to attempt to invade traffic network system, from
Source avoids the invasion of illegal person, ensure that the Information Security of transportation network equipment.
Block chain is written into the transportation network data and the timestamp, thus recording traffic network data in real time.
After by the transportation network data and timestamp write-in block chain, further include:It is identified according to transportation network
Code obtains the transportation network data in the block chain.User can use unique transportation network identification code and obtain from block pair
Should transportation network data, unique transportation network identifies that private code is stored by user oneself, for accessing the network of communication lines in block chain
The data of network, when unique transportation network identifies that private code and unique transportation network identify that public code matches, user can just be obtained
Obtain transportation network data.
On the basis of above-mentioned big data analysis method, in conjunction with Fig. 2, the embodiment of the present application also provides one kind to be based on traffic
The big data analysis system of network, including:
Generation module:Unique transportation network identification code is generated, and transportation network data are obtained according to unique transportation network identification code
And timestamp is generated according to current time;
Execution module:Block chain is written into the transportation network data and the timestamp.
In a possible design, the execution module is also used to:It is handed over being obtained according to unique transportation network identification code
Open network data and before generating timestamp, judge whether unique transportation network identification code is legal, really to be legal, then by the traffic
Network data and the timestamp are written block chain and then issue alarm really to be illegal.
In a possible design, the transportation network data are specifically included:
Transportation network equipment machine number, transportation network device control data, transportation network equipment operating data and transportation network are set
Standby fault data.
In a possible design, the execution module is also used to:By the transportation network data and the time
After stamp write-in block chain, the transportation network data in the block chain are obtained according to transportation network identification code.
In a possible design, the generation module is specifically used for:Unique transportation network is generated according to Encryption Algorithm
Identification code, unique transportation network identification code include that unique transportation network identifies that public code and unique transportation network identify private code
On the basis of above-mentioned big data analysis method, a kind of big data analysis system based on transportation network is provided, including
Processor and reservoir, the memory is stored with method for executing first aspect offer and any one possible sets
The operational order of method in meter, the processor is for executing the operational order.
On the basis of above-mentioned big data analysis method, a kind of computer storage medium, the computer storage are provided
Media storage has an operational order, and the operational order is used to execute the method for first aspect offer and any one possible sets
Method in meter.
On the basis of above-mentioned medical data method, in conjunction with Fig. 3, the embodiment of the present application provides a kind of based on the network of communication lines
The big data analysis system of network, including processor and reservoir, the memory is stored with to be provided for executing above-described embodiment
The method operational order that provides of big data analysis method, the processor is for executing the operational order.
On the basis of above-mentioned medical data method, the embodiment of the present application provides a kind of computer storage medium, institute
It states computer storage medium and is stored with operational order, the operational order is for executing big data analysis provided by the above embodiment
The method that method provides.
Herein described program product can be using any combination of one or more readable mediums.Readable medium can be
Readable signal medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example may be-but not limited to-electricity, magnetic, light,
Electromagnetism, the system of infrared ray or semiconductor, device or device, or any above combination.Readable storage medium storing program for executing has more
The example (non exhaustive list) of body includes:Electrical connection, portable disc, hard disk with one or more conducting wires are deposited at random
Access to memory (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, just
Take formula compact disk read-only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The storage medium of the application its can be using portable compact disc read only memory (CD-ROM) and including program
Code, and can be run on server apparatus.However, the program product of the application is without being limited thereto, it is in this document, readable to deposit
Storage media can be any tangible medium for including or store program, which can be commanded execution system, device or device
Part use or in connection.Readable signal medium may include in a base band or as carrier wave a part propagate number
It is believed that number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including --- but
It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Readable signal medium can also be readable storage
Any readable medium other than medium, the readable medium can be sent, propagated or transmitted for by instruction execution system, device
Either device use or program in connection.
The program code for including on readable medium can transmit with any suitable medium, including --- but it is unlimited
In --- wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the application operation program
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind --- including local area network (LAN) or
Wide area network (WAN)-be connected to user calculating equipment, or, it may be connected to external computing device (such as utilize internet
Service provider is connected by internet).
It should be noted that although being referred to several unit or sub-units of device in the above detailed description, this stroke
It point is only exemplary not enforceable.In fact, according to presently filed embodiment, it is above-described two or more
The feature and function of unit can embody in a unit.Conversely, the feature and function of an above-described unit can
It is to be embodied by multiple units with further division.In addition, although describing the application method in the accompanying drawings with particular order
Operation, still, this does not require that or implies must execute these operations in this particular order, or have to carry out
Operation shown in whole is just able to achieve desired result.Additionally or alternatively, it is convenient to omit certain steps, by multiple steps
It merges into a step to execute, and/or a step is decomposed into execution of multiple steps.
Although describing spirit herein and principle by reference to several specific embodiments, it should be appreciated that, this
It is not limited to the specific embodiments disclosed for invention, does not also mean that the feature in these aspects cannot to the division of various aspects
Combination is benefited to carry out, this to divide the convenience merely to statement.This application is intended to cover appended claims spirit and
Included various modifications and equivalent arrangements in range.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any
Belong to those skilled in the art within the technical scope of the present application, any changes or substitutions that can be easily thought of, all answers
Cover within the scope of protection of this application.
Claims (10)
1. a kind of big data analysis method based on transportation network, which is characterized in that including:
Generate unique transportation network identification code;
Transportation network data are obtained according to unique transportation network identification code and timestamp is generated according to current time;
Block chain is written into the transportation network data and the timestamp.
2. the method as described in claim 1, which is characterized in that obtaining transportation network number according to unique transportation network identification code
According to and before generating timestamp, further include:Judge whether unique transportation network identification code is legal, really to be legal, then by the traffic
Network data and the timestamp are written block chain and then issue alarm really to be illegal.
3. the method as described in claim 1, which is characterized in that obtain transportation network data and specifically include:Obtain transportation network
Equipment machine number, transportation network device control data, transportation network equipment operating data and transportation network equipment fault data.
4. the method as described in claim 1, which is characterized in that by the transportation network data and the timestamp write area
After block chain, further include:The transportation network data in the block chain are obtained according to transportation network identification code.
5. the method as described in claim 1, which is characterized in that generate unique transportation network identification code and specifically include:
Unique transportation network identification code is generated according to Encryption Algorithm, unique transportation network identification code includes unique transportation network
Identify that public code and unique transportation network identify private code.
6. a kind of big data analysis system based on transportation network, which is characterized in that including:
Generation module:Unique transportation network identification code is generated, and transportation network data are obtained according to unique transportation network identification code
And timestamp is generated according to current time;
Execution module:Block chain is written into the transportation network data and the timestamp.
7. system as claimed in claim 6, which is characterized in that the execution module is also used to:According to unique transportation network
Before identification code obtains transportation network data and generates timestamp, judge whether unique transportation network identification code is legal, really to be legal,
The transportation network data and timestamp write-in block chain are then then issued into alarm really to be illegal.
8. system as claimed in claim 6, which is characterized in that the transportation network data specifically include:
Transportation network equipment machine number, transportation network device control data, transportation network equipment operating data and transportation network are set
Standby fault data.
9. system as claimed in claim 6, which is characterized in that the execution module is also used to:By the transportation network number
After block chain is written with the timestamp, the transportation network data in the block chain are obtained according to transportation network identification code.
10. system as claimed in claim 6, which is characterized in that the generation module is specifically used for:It is generated according to Encryption Algorithm
Unique transportation network identification code, unique transportation network identification code include that unique transportation network identifies public code and unique network of communication lines
Network identifies private code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810383265.2A CN108875402A (en) | 2018-04-26 | 2018-04-26 | A kind of big data analysis method and system based on transportation network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810383265.2A CN108875402A (en) | 2018-04-26 | 2018-04-26 | A kind of big data analysis method and system based on transportation network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108875402A true CN108875402A (en) | 2018-11-23 |
Family
ID=64326583
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810383265.2A Pending CN108875402A (en) | 2018-04-26 | 2018-04-26 | A kind of big data analysis method and system based on transportation network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108875402A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112233389A (en) * | 2020-11-04 | 2021-01-15 | 珠海格力电器股份有限公司 | Local area energy Internet system and alarm method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103237087A (en) * | 2013-05-15 | 2013-08-07 | 苏州洁祥电子有限公司 | Vehicle-mounted intelligent terminal and vehicle internetworking link protection system |
CN103415011A (en) * | 2013-08-05 | 2013-11-27 | 浙江工商大学 | Safety certification method of vehicular adhoc network based on intelligent card |
CN104010302A (en) * | 2014-04-29 | 2014-08-27 | 上海交通大学 | Vehicle-mounted self-organizing network traffic data trust evaluation method |
CN107317856A (en) * | 2017-06-23 | 2017-11-03 | 李波 | A kind of date storage method and device based on block chain |
CN107729770A (en) * | 2017-10-09 | 2018-02-23 | 深圳市轱辘车联数据技术有限公司 | The management method and system of a kind of vehicle data |
CN107945090A (en) * | 2017-11-30 | 2018-04-20 | 深圳市轱辘车联数据技术有限公司 | Vehicular exhaust data analysing method, device and server based on block chain |
-
2018
- 2018-04-26 CN CN201810383265.2A patent/CN108875402A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103237087A (en) * | 2013-05-15 | 2013-08-07 | 苏州洁祥电子有限公司 | Vehicle-mounted intelligent terminal and vehicle internetworking link protection system |
CN103415011A (en) * | 2013-08-05 | 2013-11-27 | 浙江工商大学 | Safety certification method of vehicular adhoc network based on intelligent card |
CN104010302A (en) * | 2014-04-29 | 2014-08-27 | 上海交通大学 | Vehicle-mounted self-organizing network traffic data trust evaluation method |
CN107317856A (en) * | 2017-06-23 | 2017-11-03 | 李波 | A kind of date storage method and device based on block chain |
CN107729770A (en) * | 2017-10-09 | 2018-02-23 | 深圳市轱辘车联数据技术有限公司 | The management method and system of a kind of vehicle data |
CN107945090A (en) * | 2017-11-30 | 2018-04-20 | 深圳市轱辘车联数据技术有限公司 | Vehicular exhaust data analysing method, device and server based on block chain |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112233389A (en) * | 2020-11-04 | 2021-01-15 | 珠海格力电器股份有限公司 | Local area energy Internet system and alarm method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sharma et al. | EHDHE: Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain | |
JP6758501B2 (en) | Blockchain-based data processing methods and devices | |
CN112804257B (en) | Method and system for distributed cryptographic keys | |
CN105493538B (en) | The system and method for NFC access control for safety element center type NFC framework | |
CN109558748A (en) | Data processing method, device, electronic equipment and storage medium | |
CN109583885A (en) | Bout controls rewritable block chain | |
CN109376504A (en) | A kind of picture method for secret protection based on block chain technology | |
CN110321732A (en) | Data grant method, apparatus, storage medium and the electronic equipment of block catenary system | |
CN108985569A (en) | A kind of vehicle risk appraisal procedure, server | |
EP3605381A1 (en) | Information provision device, information provision system, information provision method, and program | |
CN109255210A (en) | The method, apparatus and storage medium of intelligent contract are provided in block chain network | |
CN108830088A (en) | A kind of big data analysis method and system based on Internet of Things | |
CN109600377A (en) | Anti- go beyond one's commission method, apparatus, computer equipment and storage medium | |
CN112804218A (en) | Data processing method, device and equipment based on block chain and storage medium | |
CN103294938A (en) | Access request verification method and system, authorization information generation method, hardware equipment | |
CN111488619A (en) | Health data privacy protection and sharing system based on block chain | |
AU2018256929B2 (en) | Systems and methods for identity atomization and usage | |
CN108074024A (en) | Risk Identification Method, apparatus and system | |
CN110955673A (en) | Data de-identification method, device, equipment and storage medium | |
CN109685225A (en) | A kind of vehicle information management method and relevant device | |
CN110060154A (en) | Works based on block chain deposit card method, system, device and equipment | |
CN116011023A (en) | Data desensitization processing method and device, terminal equipment and storage medium | |
CN109325360B (en) | Information management method and device | |
CN108875402A (en) | A kind of big data analysis method and system based on transportation network | |
CN110363025A (en) | A kind of user data privacy management method, apparatus and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181123 |