CN110022211B - Data screening system based on block chain - Google Patents

Data screening system based on block chain Download PDF

Info

Publication number
CN110022211B
CN110022211B CN201910258400.5A CN201910258400A CN110022211B CN 110022211 B CN110022211 B CN 110022211B CN 201910258400 A CN201910258400 A CN 201910258400A CN 110022211 B CN110022211 B CN 110022211B
Authority
CN
China
Prior art keywords
request
ciphertext
information
user terminal
screening
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910258400.5A
Other languages
Chinese (zh)
Other versions
CN110022211A (en
Inventor
王龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianju Dihe Suzhou Technology Co ltd
Original Assignee
Tianju Dihe Suzhou Data Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianju Dihe Suzhou Data Co ltd filed Critical Tianju Dihe Suzhou Data Co ltd
Priority to CN201910258400.5A priority Critical patent/CN110022211B/en
Publication of CN110022211A publication Critical patent/CN110022211A/en
Application granted granted Critical
Publication of CN110022211B publication Critical patent/CN110022211B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to a data screening system based on a block chain, which comprises a background processing end and a plurality of user terminals connected with the background processing end, wherein centralized encryption processing is carried out by the arrangement, each user terminal has data structure relationship data of all users, each user terminal can acquire the data relationship between the user terminal and other user terminals in a network in a permission requesting mode, the data security is ensured by the data encryption mode, the data transmission cost is reduced by the decentralized mode, and the system processing efficiency is improved.

Description

Data screening system based on block chain
Technical Field
The invention relates to the field of data processing, in particular to a data screening system based on a block chain.
Background
Data (Data) is a representation of facts, concepts or instructions that can be processed by either manual or automated means. After the data is interpreted and given a certain meaning, it becomes information. Data processing (data processing) is the collection, storage, retrieval, processing, transformation, and transmission of data.
The basic purpose of data processing is to extract and derive valuable, meaningful data for certain people from large, possibly chaotic, unintelligible amounts of data.
Data processing is the basic link of system engineering and automatic control. Data processing is throughout various fields of social production and social life.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm.
The block chain (Blockchain) is an important concept of the bitcoin, which is essentially a decentralized database, and is used as the underlying technology of the bitcoin, and is a series of data blocks which are generated by using a cryptographic method to be related, wherein each data block contains information of one bitcoin network transaction, and the information is used for verifying the validity (anti-counterfeiting) of the information and generating the next block.
And the data is screened by the block chain technology, so that the data security can be ensured, and the data screening efficiency is improved.
Disclosure of Invention
In view of the above, the present invention provides a data screening system based on block chains to solve the above problems.
In order to solve the technical problems, the technical scheme of the invention is as follows: a data screening system based on a block chain comprises a background processing end and a plurality of user terminals connected with the background processing end, wherein each user terminal is configured with independent terminal information, each user terminal is configured with an associated database used for storing associated information, the background processing end is configured with an associated service module used for generating the associated information, the associated service module is configured with an associated service strategy, and the associated service strategy comprises a request generation step, a request confirmation step, a data encryption step and an output distribution step;
the request generating step comprises receiving an association request generated by a user terminal and a corresponding independent key, wherein the association request comprises request terminal information, association content information and destination terminal information, the request terminal information is the terminal information corresponding to the user terminal generating the association request, the destination terminal information is the terminal information corresponding to the user terminal to which the association request points, and the association content information reflects the association between the destination terminal information and the request terminal information and enters a request confirming step;
the request confirmation step comprises the steps of sending a confirmation request to the corresponding user terminal according to the destination terminal information when the background processing terminal receives the association request, feeding back the independent key of the user terminal after the corresponding user terminal confirms, and entering the data encryption step;
the data encryption step comprises defining an independent key in the request generation step as a first key, an independent key in the request confirmation step as a second key, generating a third key according to the first key and the second key through a preset processing algorithm, encrypting associated content information in the associated request by using a preset first encryption algorithm to generate an associated content ciphertext, splitting the associated content ciphertext into first ciphertext data and second ciphertext data, encrypting the first ciphertext and target terminal information by using a preset second encryption algorithm to generate a target mixed ciphertext, encrypting the second ciphertext and the request terminal information by using a preset third encryption algorithm to generate a request mixed ciphertext, and entering the output distribution step;
the output distribution step comprises generating associated information according to a target mixed ciphertext and a request mixed ciphertext, sending the associated information to each user terminal connected with the background processing terminal, and deleting all received or generated data in the associated service strategy;
the user terminal receives the associated information and stores the associated information to an associated database;
each user terminal is configured with a processing algorithm, a first decryption algorithm, a second decryption algorithm and a third decryption algorithm, a first ciphertext and target terminal information can be obtained by decrypting a target mixed ciphertext through a corresponding first key by the second decryption algorithm, a second ciphertext and request terminal information can be obtained by decrypting a request mixed ciphertext through a corresponding second key by the first decryption algorithm, and a corresponding associated content information can be obtained by decrypting an associated content ciphertext through a corresponding third key by the first decryption algorithm;
the user terminal is provided with a screening module, the screening module is provided with a screening strategy, the screening strategy is used for screening corresponding associated information according to a screening request, and the screening strategy comprises a primary screening step, an access permission step, a first decryption step, a second decryption step and an output step;
the preliminary screening step comprises the steps that the user terminal decrypts the target mixed ciphertext through a second decryption algorithm by using the independent key to obtain a first ciphertext and target terminal information or decrypts the request mixed ciphertext through a third decryption algorithm by using the independent key to obtain a second ciphertext and request terminal information, and then the access permission step is carried out;
the access permission step comprises the steps of sending an access request to a corresponding user terminal according to the destination terminal information or request terminal information obtained in the preliminary screening step so as to obtain an independent key of the corresponding user terminal, and entering a first decryption step;
the first decryption step comprises the steps of decrypting the target mixed ciphertext through a second decryption algorithm by using the independent key obtained in the access permission step to obtain a first ciphertext and target terminal information or decrypting the request mixed ciphertext through a third decryption algorithm of the independent key obtained in the access permission step to obtain a second ciphertext and request terminal information, and entering a second decryption step;
the second decryption step comprises the steps of generating a third key according to a processing algorithm, generating a related content ciphertext according to the obtained first ciphertext and the second ciphertext, decrypting the related content ciphertext through the third key by using a corresponding first decryption algorithm to generate related content information, and entering the output step;
the outputting step includes outputting the associated content information and deleting data generated and acquired in the current filtering policy.
Further, the first encryption algorithm is configured as an asymmetric encryption algorithm.
Further, the second encryption algorithm and the third encryption algorithm are both configured as symmetric encryption algorithms.
Further, the first encryption algorithm is configured as an ECC encryption algorithm.
Further, the second encryption algorithm and the third encryption algorithm are both configured with a 3DES encryption algorithm.
Further, the user terminal is configured as a mobile user terminal.
Further, the destination terminal information includes a network address of the corresponding user terminal.
Further, the request terminal information includes a network address of the corresponding user terminal.
Further, the preliminary screening step is configured with a first screening condition, and the request terminal information or the destination terminal information obtained by screening is screened according to the first screening condition.
Further, the second decryption step is configured with a second filtering condition, and filters the obtained associated content information through the second filtering condition.
The technical effects of the invention are mainly reflected in the following aspects: through the arrangement, the decentralized encryption processing is carried out, each user terminal has data structure relation data of all users, each user terminal can acquire the data relation between the user terminal and other user terminals in the network in a permission requesting mode, the data security is guaranteed through the data encryption mode, meanwhile, the data transmission cost is reduced through the decentralized mode, and the system processing efficiency is improved.
Drawings
FIG. 1: the data construction architecture diagram of the data screening system based on the block chain is disclosed;
FIG. 2: the invention discloses a data screening architecture diagram of a data screening system based on a block chain.
Reference numerals: 100. a user terminal; 110. an association database; 200. and a background processing end.
Detailed Description
The following detailed description of the embodiments of the present invention is provided in order to make the technical solution of the present invention easier to understand and understand.
Referring to fig. 1, a data screening system based on a block chain includes a background processing end 200 and a plurality of user terminals 100 connected to the background processing end 200, each user terminal 100 is configured with independent terminal information, each user terminal 100 is configured with an association database 110, the association database 110 is used for storing association information, and the principle of the whole system is described first, the core of the invention is to store all information in a distributed manner, and then, even if the stored information is stored, the content cannot be obtained, so as to avoid data leakage, and the data can be obtained only by a request, so as to improve the security and reliability of the data, for example, if the user a and the user B are in a top-bottom level relationship, the association information reflects the relationship between the user a and the user B, and the user C stores the information content but cannot be opened, only user a and user B have this right, which is specifically implemented as follows:
first, a step of initially processing data in order to generate encrypted association information is transmitted to each user terminal 100. The user terminal 100 is configured as a mobile user terminal 100.
Referring to fig. 1, the background processing end 200 is configured with an associated service module for generating the associated information, and the associated service module is configured with an associated service policy, where the associated service policy includes a request generation step, a request confirmation step, a data encryption step, and an output distribution step; the destination terminal information includes a network address corresponding to the user terminal 100. The request terminal information includes a network address of the corresponding user terminal 100.
The request generating step comprises receiving an association request generated by the user terminal 100 and a corresponding independent key, wherein the association request comprises request terminal information, association content information and destination terminal information, the request terminal information is the terminal information corresponding to the user terminal 100 generating the association request, the destination terminal information is the terminal information corresponding to the user terminal 100 to which the association request points, and the association content information reflects the association between the destination terminal information and the request terminal information, and entering a request confirming step; that is, the work that needs to be entered in the early stage, for example, if the user a sets the user B as the upper level, the user a sends an association request, the request terminal information corresponds to the user a, the destination terminal information corresponds to the user B, and the associated content information is information such as position, authority, relationship, and the like.
The request confirmation step includes that when the background processing end 200 receives the association request, a confirmation request is sent to the corresponding user terminal 100 according to the destination terminal information, and after the corresponding user terminal 100 confirms, an independent key of the user terminal 100 is fed back, and a data encryption step is performed; this step needs to be confirmed by the user B, and if the user B does not accept the step, the whole step is ended, and after the user B accepts the step, the background processing end 200 obtains the independent key of the user a and the independent key of the user B.
The data encryption step comprises defining an independent key in the request generation step as a first key, an independent key in the request confirmation step as a second key, generating a third key according to the first key and the second key through a preset processing algorithm, encrypting associated content information in the associated request by using a preset first encryption algorithm to generate an associated content ciphertext, splitting the associated content ciphertext into first ciphertext data and second ciphertext data, encrypting the first ciphertext and target terminal information by using a preset second encryption algorithm to generate a target mixed ciphertext, encrypting the second ciphertext and the request terminal information by using a preset third encryption algorithm to generate a request mixed ciphertext, and entering the output distribution step; while the association request is encrypted by the independent keys of user a and user B. The first encryption algorithm is configured as an asymmetric encryption algorithm. The second encryption algorithm and the third encryption algorithm are both configured as symmetric encryption algorithms. The first encryption algorithm is configured as an ECC encryption algorithm. And the second encryption algorithm and the third encryption algorithm are both configured with a 3DES encryption algorithm.
The output distribution step comprises generating associated information according to the target mixed ciphertext and the request mixed ciphertext, sending the associated information to each user terminal 100 connected with the background processing terminal 200, and deleting all received or generated data in the associated service strategy; and sending the encrypted ciphertext and deleting all data, so that other terminals cannot open the file, and corresponding data cannot be acquired.
The user terminal 100 receives and stores the association information to an association database 110;
referring to fig. 2, each user terminal 100 is configured with a processing algorithm, a first decryption algorithm, a second decryption algorithm, and a third decryption algorithm, and decrypts a target mixed ciphertext with the second decryption algorithm through a corresponding first key to obtain a first ciphertext and target terminal information, decrypts a request mixed ciphertext with the first decryption algorithm through a corresponding second key to obtain a second ciphertext and request terminal information, and decrypts an associated content ciphertext with the first decryption algorithm through a corresponding third key to obtain corresponding associated content information; similarly, taking a user A and a user B as an example, at this time, the user A needs to find a certain known user from the own relationship network, and since the A has two relationship conditions, 1 and A are requesting parties, the user A can obtain the user B through the independent key of the A and a third decryption algorithm; 2. a is the requested party, then B can be obtained through the independent key of A and a second decryption algorithm; therefore, all the relationships can be obtained in the database of a through the independent key of a, and the specific steps are as follows:
the user terminal 100 is configured with a screening module, the screening module is configured with a screening policy, the screening policy is used for screening corresponding associated information according to a screening request, and the screening policy includes a preliminary screening step, an access permission step, a first decryption step, a second decryption step and an output step;
the preliminary screening step comprises the steps that the user terminal 100 decrypts the target mixed ciphertext through a second decryption algorithm by using the independent key to obtain a first ciphertext and target terminal information or the user terminal 100 decrypts the request mixed ciphertext through a third decryption algorithm by using the independent key to obtain a second ciphertext and request terminal information, and then the access permission step is carried out; at this time, the information of all the users establishing the relationship with the user A, including the target user B, is obtained, so that the communication with the corresponding users can be directly carried out without the processing of a central server. And the preliminary screening step is also configured with a first screening condition, and the request terminal information or the target terminal information is obtained by screening through the first screening condition.
The access permission step comprises the steps of sending an access request to the corresponding user terminal 100 according to the destination terminal information or the request terminal information obtained in the preliminary screening step so as to obtain an independent key of the corresponding user terminal 100, and entering a first decryption step; at this time, each corresponding user can obtain a corresponding independent key after confirmation, and then, under the condition that both keys are provided, the associated content ciphertext can be obtained through a decryption algorithm.
The first decryption step comprises the steps of decrypting the target mixed ciphertext through a second decryption algorithm by using the independent key obtained in the access permission step to obtain a first ciphertext and target terminal information or decrypting the request mixed ciphertext through a third decryption algorithm of the independent key obtained in the access permission step to obtain a second ciphertext and request terminal information, and entering a second decryption step;
the second decryption step comprises the steps of generating a third key according to a processing algorithm, generating a related content ciphertext according to the obtained first ciphertext and the second ciphertext, decrypting the related content ciphertext through the third key by using a corresponding first decryption algorithm to generate related content information, and entering the output step; and the second decryption step is configured with a second screening condition, and the associated content information is obtained by screening through the second screening condition.
The outputting step includes outputting the associated content information and deleting data generated and acquired in the current filtering policy.
The above are only typical examples of the present invention, and besides, the present invention may have other embodiments, and all the technical solutions formed by equivalent substitutions or equivalent changes are within the scope of the present invention as claimed.

Claims (10)

1. A data screening system based on a block chain is characterized by comprising a background processing end and a plurality of user terminals connected with the background processing end, wherein each user terminal is configured with independent terminal information, each user terminal is configured with an associated database, the associated database is used for storing associated information, the background processing end is configured with an associated service module used for generating the associated information, the associated service module is configured with an associated service strategy, and the associated service strategy comprises a request generation step, a request confirmation step, a data encryption step and an output distribution step;
the request generating step comprises receiving an association request generated by a user terminal and a corresponding independent key, wherein the association request comprises request terminal information, association content information and destination terminal information, the request terminal information is the terminal information corresponding to the user terminal generating the association request, the destination terminal information is the terminal information corresponding to the user terminal to which the association request points, and the association content information reflects the association between the destination terminal information and the request terminal information and enters a request confirming step;
the request confirmation step comprises the steps of sending a confirmation request to the corresponding user terminal according to the destination terminal information when the background processing terminal receives the association request, feeding back the independent key of the user terminal after the corresponding user terminal confirms, and entering the data encryption step;
the data encryption step comprises defining an independent key in the request generation step as a first key, an independent key in the request confirmation step as a second key, generating a third key according to the first key and the second key through a preset processing algorithm, encrypting associated content information in the associated request by using a preset first encryption algorithm to generate an associated content ciphertext, splitting the associated content ciphertext into first ciphertext data and second ciphertext data, encrypting the first ciphertext and target terminal information by using a preset second encryption algorithm to generate a target mixed ciphertext, encrypting the second ciphertext and the request terminal information by using a preset third encryption algorithm to generate a request mixed ciphertext, and entering the output distribution step;
the output distribution step comprises generating associated information according to a target mixed ciphertext and a request mixed ciphertext, sending the associated information to each user terminal connected with the background processing terminal, and deleting all received or generated data in the associated service strategy;
the user terminal receives the associated information and stores the associated information to an associated database;
each user terminal is configured with a processing algorithm, a first decryption algorithm, a second decryption algorithm and a third decryption algorithm, a first ciphertext and target terminal information can be obtained by decrypting a target mixed ciphertext through a corresponding first key by the second decryption algorithm, a second ciphertext and request terminal information can be obtained by decrypting a request mixed ciphertext through a corresponding second key by the first decryption algorithm, and a corresponding associated content information can be obtained by decrypting an associated content ciphertext through a corresponding third key by the first decryption algorithm;
the user terminal is provided with a screening module, the screening module is provided with a screening strategy, the screening strategy is used for screening corresponding associated information according to a screening request, and the screening strategy comprises a primary screening step, an access permission step, a first decryption step, a second decryption step and an output step;
the preliminary screening step comprises the steps that the user terminal decrypts the target mixed ciphertext through a second decryption algorithm by using the independent key to obtain a first ciphertext and target terminal information, and an access permission step is carried out; or the preliminary screening step comprises the step that the user terminal decrypts the request mixed ciphertext through a third decryption algorithm by using the independent key to obtain a second ciphertext and request terminal information, and then the access permission step is carried out;
the access permission step comprises the steps of sending an access request to a corresponding user terminal according to the destination terminal information or request terminal information obtained in the preliminary screening step so as to obtain an independent key of the corresponding user terminal, and entering a first decryption step;
the first decryption step comprises the steps of decrypting the target mixed ciphertext through a second decryption algorithm by using the independent key obtained in the access permission step to obtain a first ciphertext and target terminal information or decrypting the request mixed ciphertext through a third decryption algorithm of the independent key obtained in the access permission step to obtain a second ciphertext and request terminal information, and entering a second decryption step;
the second decryption step comprises the steps of generating a third key according to a processing algorithm, generating a related content ciphertext according to the obtained first ciphertext and the second ciphertext, decrypting the related content ciphertext through the third key by using a corresponding first decryption algorithm to generate related content information, and entering the output step;
the outputting step includes outputting the associated content information and deleting data generated and acquired in the current filtering policy.
2. The blockchain-based data screening system of claim 1, wherein the first encryption algorithm is configured as an asymmetric encryption algorithm.
3. The blockchain-based data screening system of claim 1, wherein the second encryption algorithm and the third encryption algorithm are each configured as symmetric encryption algorithms.
4. The blockchain-based data screening system of claim 1, wherein the first encryption algorithm is configured as an ECC encryption algorithm.
5. The blockchain-based data screening system of claim 1, wherein the second encryption algorithm and the third encryption algorithm are each configured with a 3DES encryption algorithm.
6. The blockchain-based data screening system of claim 1, wherein the user terminal is configured as a mobile user terminal.
7. The blockchain-based data screening system of claim 1, wherein the destination terminal information includes a network address of the corresponding user terminal.
8. The blockchain-based data screening system of claim 1, wherein the requesting terminal information includes a network address of the corresponding user terminal.
9. The system according to claim 1, wherein the preliminary screening step is further configured with a first screening condition, and the request terminal information or the destination terminal information is obtained through screening by the first screening condition.
10. The system according to claim 9, wherein the second decryption step is configured with a second filtering condition, and the associated content information is obtained by filtering through the second filtering condition.
CN201910258400.5A 2019-04-01 2019-04-01 Data screening system based on block chain Active CN110022211B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910258400.5A CN110022211B (en) 2019-04-01 2019-04-01 Data screening system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910258400.5A CN110022211B (en) 2019-04-01 2019-04-01 Data screening system based on block chain

Publications (2)

Publication Number Publication Date
CN110022211A CN110022211A (en) 2019-07-16
CN110022211B true CN110022211B (en) 2020-11-24

Family

ID=67190453

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910258400.5A Active CN110022211B (en) 2019-04-01 2019-04-01 Data screening system based on block chain

Country Status (1)

Country Link
CN (1) CN110022211B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850187A (en) * 2017-01-13 2017-06-13 温州大学瓯江学院 A kind of privacy character information encrypted query method and system
CN107257340A (en) * 2017-06-19 2017-10-17 阿里巴巴集团控股有限公司 A kind of authentication method, authentication data processing method and equipment based on block chain
CN107566342A (en) * 2017-08-01 2018-01-09 东华大学 M2M safety methods in a kind of cotton spinning production CPS based on block chain technology
CN108521331A (en) * 2018-04-11 2018-09-11 西安邮电大学 Hidden information based on source address sends system and sending method
CN109388643A (en) * 2018-10-26 2019-02-26 陕西医链区块链集团有限公司 A kind of rapid data searching system and method based on block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7616762B2 (en) * 2004-08-20 2009-11-10 Sony Corporation System and method for authenticating/registering network device in power line communication (PLC)
CN109120639B (en) * 2018-09-26 2021-03-16 众安信息技术服务有限公司 Data cloud storage encryption method and system based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850187A (en) * 2017-01-13 2017-06-13 温州大学瓯江学院 A kind of privacy character information encrypted query method and system
CN107257340A (en) * 2017-06-19 2017-10-17 阿里巴巴集团控股有限公司 A kind of authentication method, authentication data processing method and equipment based on block chain
CN107566342A (en) * 2017-08-01 2018-01-09 东华大学 M2M safety methods in a kind of cotton spinning production CPS based on block chain technology
CN108521331A (en) * 2018-04-11 2018-09-11 西安邮电大学 Hidden information based on source address sends system and sending method
CN109388643A (en) * 2018-10-26 2019-02-26 陕西医链区块链集团有限公司 A kind of rapid data searching system and method based on block chain

Also Published As

Publication number Publication date
CN110022211A (en) 2019-07-16

Similar Documents

Publication Publication Date Title
CN107358424B (en) Transaction method and device based on digital currency
CN108055274B (en) Encryption and sharing method and system based on alliance chain storage data
EP3324355B1 (en) Contract agreement method, agreement verification method, contract agreement system, agreement verification device, contract agreement device, contract agreement program and agreement verification program
US9923877B2 (en) External indexing and search for a secure cloud collaboration system
CN110769035B (en) Block chain asset issuing method, platform, service node and storage medium
CN110046521A (en) Decentralization method for secret protection
US9246888B2 (en) Systems and methods for secure communication over an unsecured communication channel
CN110059503A (en) The retrospective leakage-preventing method of social information
CN112822255B (en) Block chain-based mail processing method, mail sending end, receiving end and equipment
CN113065961A (en) Power block chain data management system
CN101981889A (en) Secure communications in computer cluster systems
US20220391893A1 (en) Secure electronic messaging guaranteeing integrity and non-repudation
CN110191153A (en) Social communication method based on block chain
CN109714170B (en) Data isolation method in alliance chain and corresponding alliance chain system
CN112801664B (en) Intelligent contract supply chain trusted service method based on block chain
KR102647433B1 (en) The Method to prove an Existence utilizing Hybrid bloc-chain
CN112653556A (en) TOKEN-based micro-service security authentication method, device and storage medium
CN111523142B (en) Data processing method, device, electronic equipment and medium
CN114363013B (en) Supervision-friendly blockchain content privacy protection system, message sending and query method
CN110022211B (en) Data screening system based on block chain
CN111581673B (en) SAP electronic signature method and system
CN111311412B (en) Decentralized transaction confirmation method and device and server
KR20220066801A (en) Method and appratus for providing blackchain-based secure messenger service
KR102605368B1 (en) Method and server for verifying authenticity of mail
CN117521092B (en) Block chain data reflow processing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201103

Address after: Room 307, Zijin Oriental Building, 288 Qiyue Street, Suzhou Industrial Park, Jiangsu Province

Applicant after: TIANJU DIHE (SUZHOU) DATA Co.,Ltd.

Address before: The large village of Qinglong Town Yuxi City, Yunnan province 652803 Huaning County will White Village No. 73

Applicant before: Wang Long

GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Room 307, Zijin Oriental building, No. 288, Qiyue street, Suzhou Industrial Park, Suzhou, Jiangsu 215000

Patentee after: Tianju DIHE (Suzhou) Technology Co.,Ltd.

Address before: Room 307, Zijin Oriental building, No. 288, Qiyue street, Suzhou Industrial Park, Suzhou, Jiangsu 215000

Patentee before: TIANJU DIHE (SUZHOU) DATA CO.,LTD.