CN110223157A - Data capture method, electronic equipment and computer storage medium based on alliance's chain - Google Patents

Data capture method, electronic equipment and computer storage medium based on alliance's chain Download PDF

Info

Publication number
CN110223157A
CN110223157A CN201910423129.6A CN201910423129A CN110223157A CN 110223157 A CN110223157 A CN 110223157A CN 201910423129 A CN201910423129 A CN 201910423129A CN 110223157 A CN110223157 A CN 110223157A
Authority
CN
China
Prior art keywords
data
node
mentioned
destination node
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910423129.6A
Other languages
Chinese (zh)
Inventor
陈子豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201910423129.6A priority Critical patent/CN110223157A/en
Publication of CN110223157A publication Critical patent/CN110223157A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the present application discloses a kind of data capture method based on alliance's chain, electronic equipment and computer-readable medium, it is related to block storage system and block data structures technology, wherein method includes: to send authorization requests to authorized party, and the authorization requests carry Data Identification;When receiving from confirmation instruction of the authorized party to the authorization requests, the corresponding Profile Summary of the Data Identification is obtained in alliance's chain;Determine that destination node, the destination node are the source Nodes of target data to be obtained according to the Profile Summary;Data acquisition request is sent to the destination node, the acquisition request carries the Data Identification;The target data from the destination node is received and stored, the target data is the corresponding data of Data Identification described in the destination node, can increase data acquisition source, reduce the cost of collage-credit data acquiring and maintaining.

Description

Data capture method, electronic equipment and computer storage medium based on alliance's chain
Technical field
This application involves alliance's chain technical fields more particularly to a kind of data capture method based on alliance's chain, electronics to set Standby and computer storage medium.
Background technique
Reference is to acquire, arrange in accordance with the law, saving, processing the credit information of natural person, legal person and its hetero-organization, and externally mentioning For services such as credit report, credit evaluation, credit information consultings, client's judgement, control credit risk are helped, credit management is carried out Activity, it provides the shared platform of credit information for specialized credit mechanism.
Current, credit investigation system centralization generally obtains reference report by people's row reference or main strategies mechanism, Data source is more single, and procurement cost is high.Most of loan enterprises also can not be collected safely and effectively, arrange data.
Summary of the invention
The embodiment of the present application provides a kind of data capture method based on alliance's chain, electronic equipment and computer-readable Jie Matter is related to block storage system and block data structures technology, can increase data acquisition source, reduce collage-credit data obtain and The cost of maintenance.
In a first aspect, the embodiment of the present application provides a kind of data capture method based on alliance's chain, which comprises
First node sends authorization requests to authorized party, and the authorization requests carry Data Identification;
The first node is when receiving from confirmation instruction of the authorized party to the authorization requests, in alliance's chain It is middle to obtain the corresponding Profile Summary of the Data Identification;
The first node determines that destination node, the destination node are mesh to be obtained according to the Profile Summary Mark the source Nodes of data;
The first node sends data acquisition request to the destination node, and the acquisition request carries the data mark Know;
The first node receives and stores the target data from the destination node, and the target data is institute State the corresponding data of Data Identification described in destination node.
As a kind of possible embodiment, the first node includes: to authorized party's transmission authorization requests
The first node sends authorization requests to the authorized party based on the intelligent contract on alliance's chain.
As a kind of possible embodiment, the intelligent contract includes authorization requests time pass corresponding with authorized party System;
The first node sends authorization requests to first terminal equipment based on the intelligent contract on alliance's chain
The first node is when reaching the first moment in the authorization requests time, according to the authorization requests time With the corresponding relationship of authorized party, determine that first moment corresponding authorized party, Xiang Suoshu authorized party send the authorization requests.
As a kind of possible embodiment, the first node to the destination node send data acquisition request it Before, the method also includes:
The first node determines the data acquisition rule of the destination node based on the intelligent contract;
It includes: the first node according to described true that the first node, which sends data acquisition request to the destination node, Fixed data acquisition rule sends the data acquisition request to the destination node.
As a kind of possible embodiment, the first node is according to the data acquisition rule of the determination to the mesh Mark node sends the data acquisition request
The verifying label in the data acquisition rule of the determination is obtained, the corresponding target identities of the verifying label are obtained Information, Xiang Suoshu destination node send the data acquisition request comprising the target identity information.
As a kind of possible embodiment, the target data of the reception from the destination node and it is stored Afterwards, the method also includes:
Data analysis request is sent to data analysis node, the data analysis request carries the analysis of the target data Mark, the data analysis request be used to indicate the data analysis node obtain the corresponding target data of the analysis mark into Row analysis.
As a kind of possible embodiment, before the transmission data analysis request to data analysis node, the side Method further include:
Management node into alliance's chain sends inquiry request, and the inquiry request carries point of the target data Analysis mark;
The query result from the management node is received, the query result includes that the management node is based on the intelligence It can the contract corresponding target analysis node of analysis mark determining in alliance's chain;
It is described that send data analysis request to data analysis node include: to send the data to the target analysis node Analysis request.
Second aspect, the embodiment of the present application provide a kind of electronic equipment, comprising: transmission module obtains module, determines mould Block and memory module, in which:
The transmission module, for sending authorization requests to authorized party, the authorization requests carry Data Identification;
The acquisition module, for receive the confirmations of the authorization requests is instructed from the authorized party when, The corresponding Profile Summary of the Data Identification is obtained in alliance's chain;
The determining module, for determining that destination node, the destination node are wait obtain according to the Profile Summary The source Nodes of the target data taken;
The transmission module is also used to, and Xiang Suoshu destination node sends data acquisition request, and the acquisition request carries institute State Data Identification;
The memory module, for receiving and storing the target data from the destination node, the number of targets According to for the corresponding data of Data Identification described in the destination node.
The third aspect, the embodiment of the present application also provides a kind of electronic equipment, including processor, input equipment, output are set Standby and memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for depositing Computer program is stored up, the computer program includes program instruction, and the processor is configured for calling described program instruction, Execute the method as described in first aspect and its any possible embodiment.
Fourth aspect, the embodiment of the present application provide a kind of computer storage medium, the computer storage medium storage There is computer program, the computer program includes program instruction, and described program instruction makes the place when being executed by a processor The method that reason device executes above-mentioned first aspect and its any possible embodiment.
By sending authorization requests to authorized party, above-mentioned authorization requests carry Data Identification, are receiving the embodiment of the present application To when instructing from above-mentioned authorized party to the confirmation of above-mentioned authorization requests, the corresponding use of above-mentioned Data Identification is obtained in alliance's chain Family informative abstract determines that destination node, above-mentioned destination node are target data to be obtained further according to above-mentioned Profile Summary Source Nodes, data acquisition request then can be sent to above-mentioned destination node, above-mentioned acquisition request carries above-mentioned data mark Know, then receive and store the above-mentioned target data from above-mentioned destination node, above-mentioned target data be in above-mentioned destination node on The corresponding data of Data Identification are stated, data can safely be obtained in the form of informative abstract alliance's chain, number can be increased According to source is obtained, the cost of collage-credit data acquiring and maintaining is reduced.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description Attached drawing is briefly described.
Fig. 1 is a kind of flow diagram of data capture method based on alliance's chain provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram for data capture method based on alliance's chain that another embodiment of the application provides;
Fig. 3 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application;
Fig. 4 is the structural schematic diagram of another electronic equipment provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Herein " embodiment " is referred to it is meant that a particular feature, structure, or characteristic described may be embodied in the application at least in conjunction with the embodiments In one embodiment.The phrase, which occurs, in each position in the description might not each mean identical embodiment, nor With the independent or alternative embodiment of other embodiments mutual exclusion.Those skilled in the art explicitly and implicitly understand, Embodiment described herein can be combined with other embodiments.
Based on the embodiment in the application, those of ordinary skill in the art are obtained without making creative work The every other embodiment obtained, shall fall in the protection scope of this application.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap Include other step or units intrinsic for these process, methods, product or equipment.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment And be not intended to limit the application.As present specification and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to more fully understand the embodiment of the present application, will be situated between below to the method for application the embodiment of the present application It continues.
The electronic equipment mentioned in the embodiment of the present application can be terminal device, be setting of being communicated with server Standby, above-mentioned server is also referred to as servomechanism, is to provide the equipment of the service of calculating, can permit multiple terminal devices and access.On Stating terminal device can be mobile terminal, set including the various handheld devices with wireless communication function, wearable device, calculating Other processing equipments standby or that be connected to radio modem and various forms of user equipmenies (User Equipment, UE), mobile station (Mobile Station, MS) etc..
It referring to Figure 1, is a kind of exemplary flow of data capture method based on alliance's chain provided by the embodiments of the present application Figure, this method as shown in Figure 1 can include:
101, first node sends authorization requests to authorized party, and above-mentioned authorization requests carry Data Identification.
Alliance's chain, member and limited third party just for some special group, inside specify multiple preselected nodes For the people that keeps accounts, each piece of generation is codetermined by all preselected nodes.
Generally according to the difference of alliance's chain network centralization degree, alliance's chain under 3 kinds of different application scenes is differentiated:
(1) the whole network discloses, the block chain of no user licensing scheme, referred to as publicly-owned chain;
(2) network is added in the node for allowing to authorize, and information can be checked according to permission, is often used for inter-agency block Chain, referred to as alliance's chain or industry chain;
(3) node in all-network all rests in a mechanism hand, referred to as privately owned chain.
Alliance's chain and privately owned chain also referred to collectively as permit chain, publicly-owned chain to be known as unlicensed chain.
Alliance's chain in the embodiment of the present application can be understood as above-mentioned second situation, for collage-credit data shared system, Node type in alliance's chain may include enterprise's node, credit information service's node and government organs' node;The embodiment of the present application In executing subject can be any one of alliance's chain for the first node in alliance's chain, above-mentioned first node can be with The node for participating in data sharing, preferably can be enterprise's node.There can also be main chain server in alliance's chain, it is understood that For data sharing platform, the data sharing of other nodes is realized.
It can be deployed with intelligent contract (Smart contract) on alliance's chain, be that one kind is intended to pass in a manner of information-based Broadcast, verify or execute the computer protocol of contract.Intelligent contract permission carries out credible transaction in no third-party situation, this It trades traceable.Each node in above-mentioned alliance's chain can have the database of oneself, data sharing chain node and corresponding Side chain node.
Node in alliance's chain can upload data and be shared, and obtain these shared datas.Obtaining shared number It according to before, can first be authorized, the node after being authorized could obtain shared data.Specifically, above-mentioned first node Authorization requests can be sent to above-mentioned authorized party based on the intelligent contract on alliance's chain.Wherein, above-mentioned authorized party refers to data The node verified before obtaining to the first node for obtaining target data, is also possible to the terminal device that user uses, user Above-mentioned authorization requests can be received by terminal device, judge whether the data acquisition permission for giving the first node.
Optionally, first node can send above-mentioned authorization requests to user terminal, i.e., apply for that reference inquiry is awarded to user Power, can operate initiation by the staff of the first node, and after user agrees to and authorizes, user terminal can be to The first node sends confirmation instruction.
Optionally, authorized party's information has been can store in first node, above-mentioned intelligence contract can specify that in alliance's chain Node trading rules, can be to above-mentioned in the case where needing first node to carry out data acquisition based on above-mentioned intelligent contract Authorized party sends above-mentioned authorization requests, i.e., above-mentioned authorization requests can be understood as automatically initiating based on the regulation of intelligent contract.
Wherein, above-mentioned authorization requests can carry above-mentioned Data Identification, and above-mentioned Data Identification is determined for be obtained Target data, for example can be data number, data name etc., can also be the data date of formation, that is, indicate to need to obtain Target data be the data generated within the data date of formation.
Part of nodes in the intelligent contract and alliance's chain of alliance's chain can be stored with Data Identification and target data Corresponding relationship.Above-mentioned authorization requests are mainly used for authorized party and know the data letter that the node identities of request authorization and needs obtain Breath etc., which can also carry the identity information of above-mentioned first node, know first node identity convenient for authorized party, with Judge whether to give first node authorization.
Authorized party can be chosen whether authorization first node after receiving above-mentioned authorization requests by authorized party user This data acquisition, however, it is determined that authorization can send confirmation instruction to above-mentioned first node, then can execute step 102;If no Authorization, can send refusal instruction to above-mentioned first node, and first node not can be carried out data acquisition.
102, above-mentioned first node is joining when receiving from confirmation instruction of the above-mentioned authorized party to above-mentioned authorization requests The corresponding Profile Summary of above-mentioned Data Identification is obtained in alliance's chain.
The confirmation of above-mentioned authorization requests is instructed from above-mentioned authorized party if above-mentioned first node is received, represents authorized party Agree to that the data acquisition of the first node, first node can obtain the corresponding user information of above-mentioned Data Identification in alliance's chain Abstract.
Specifically, can store multiple user basic informations in the database of the first node, the user including the user Address, the station address are then used to inquire the corresponding Profile Summary of above-mentioned Data Identification.
Informative abstract in the embodiment of the present application can be understood as the corresponding relationship of data and data source, i.e., a kind of data The catalogue of acquisition modes.
Above-mentioned Profile Summary may include the Data Identification sum number for the target data that above-mentioned authorized party's authorization is shared According to source-information, above-mentioned Data Identification is determined for target data, and above-mentioned data origin information includes the target data Provider, that is, data source node can be the data source node identification or data source node address of the target data. Wherein, above-mentioned source Nodes can be other nodes in alliance's chain in addition to the first node.
Above-mentioned Profile Summary can be before first node sends above-mentioned authorization requests, by above-mentioned data source node It generates, and can be broadcasted in alliance's chain, the node in alliance's chain is available and stores above-mentioned Profile Summary.
Broadcast (Broadcasting) is the most common form of multicast, it delivers one point to each point of destination The copy of group.It can be completed by the delivery that multiple singles are grouped, the copy that can also be grouped by individually connecting transmitting, Until each recipient receives a copy.It by way of broadcast, obtain the node in alliance's chain can Take the mode of the target data, but it is different establish a capital to have permission obtain the target data, can also be according to other verification modes It could be obtained after being verified, to improve safety.
It is not data each time to be changed to direct broadcast encryption, but generate one and be similar in the embodiment of the present application The encryption string of informative abstract is broadcasted, data can be made even be decrypted (this is also almost impossible certainly) will not reveal it is any Private data.
After obtaining the corresponding Profile Summary of above-mentioned Data Identification, step 103 can be executed.
103, above-mentioned first node determines that destination node, above-mentioned destination node are to be obtained according to above-mentioned Profile Summary Target data source Nodes.
Due to including the data source node of target data to be obtained in above-mentioned Profile Summary, pass through above-mentioned acquisition Profile Summary, first node can determine the i.e. above-mentioned destination node of the data source node of the target data, then execute Step 104.
104, above-mentioned first node sends data acquisition request to above-mentioned destination node, and above-mentioned acquisition request carries above-mentioned number According to mark.
After determining the data source node by the Profile Summary of above-mentioned acquisition, with can determining the destination node Location sends above-mentioned data acquisition request to the destination node, wherein may include above-mentioned Data Identification, determines for destination node Target data to be shared, then execute step 105.
Above-mentioned destination node, can be according to above-mentioned data mark after the data acquisition request for receiving above-mentioned first node Know and determine above-mentioned target data, then send above-mentioned target data to first node, compressed target data can be transmitted, it can also To share above-mentioned target data from other forms to first node.
105, above-mentioned first node receives and stores the above-mentioned target data from above-mentioned destination node, above-mentioned target data For the corresponding data of Data Identification above-mentioned in above-mentioned destination node.
Optionally, destination node can be based on the judgment rule of itself determination after receiving above-mentioned acquisition request No offer target data.The judgment rule of above-mentioned destination node can be to be realized based on pre-set intelligent contract, can also be with It is to pass through user's operation manually identifying in destination node.It, can be to this after destination node confirmation provides above-mentioned target data First node sends above-mentioned target data.
After the first node receives above-mentioned target data, the target data can be integrated, be restored again into The local data base of one node voluntarily can be obtained and be checked later.
Optionally, after completing transaction, obtaining target data, Data Integration can be carried out in reference side chain, broadcast is used Family collage-credit data change message, and collage-credit data is stored in the database of the node.According to enterprise's node type, database It may include the different types of data such as registration information, transaction record, assets information.
The embodiment of the present application sends authorization requests to authorized party by first node, and above-mentioned authorization requests carry data mark Know, above-mentioned first node obtains in alliance's chain when receiving from confirmation instruction of the above-mentioned authorized party to above-mentioned authorization requests The corresponding Profile Summary of above-mentioned Data Identification is taken, above-mentioned first node determines target section according to above-mentioned Profile Summary Point, above-mentioned destination node are the source Nodes of target data to be obtained, and above-mentioned first node sends number to above-mentioned destination node According to acquisition request, above-mentioned acquisition request carries above-mentioned Data Identification, and above-mentioned first node is received and stored from above-mentioned target section The above-mentioned target data of point, above-mentioned target data are the corresponding data of Data Identification above-mentioned in above-mentioned destination node, can be passed through The mode of alliance's chain and informative abstract realizes the data sharing of credit investigation system, increases data acquisition source, reduces collage-credit data and obtains The cost for taking and safeguarding.
It referring to fig. 2, is the exemplary flow of another data capture method based on alliance's chain provided by the embodiments of the present application Figure, embodiment shown in Fig. 2, which can be, to be obtained on the basis of embodiment shown in Fig. 1, and this method as shown in Figure 2 can wrap It includes:
201, first node sends authorization requests to authorized party based on the intelligent contract on alliance's chain.
Intelligent contract in alliance's chain can specify that each node carries out the tool of the authorization before data sharing and data sharing Body rule, i.e., when which node carries out above-mentioned steps, then the node in alliance's chain can be closed according to above-mentioned intelligence About automatically initiate data sharing request and/or above-mentioned authorization requests.
Specifically, the intelligent contract on above-mentioned alliance's chain may include the above-mentioned authorization requests time, first node can be deposited Authorization requests time and the corresponding relationship of authorized party are contained, then reaches first in the above-mentioned authorization requests time in first node When the moment, the corresponding authorization of above-mentioned first moment can be determined according to the corresponding relationship of above-mentioned authorization requests time and authorized party Side, then send above-mentioned authorization requests to above-mentioned authorized party, similarly with the step 101 in embodiment illustrated in fig. 1, authorized party later It can carry out judging whether to authorize, if authorization, can execute step 202.
202, above-mentioned first node is joining when receiving from confirmation instruction of the above-mentioned authorized party to above-mentioned authorization requests The corresponding Profile Summary of above-mentioned Data Identification is obtained in alliance's chain.
203, above-mentioned first node determines that destination node, above-mentioned destination node are to be obtained according to above-mentioned Profile Summary Target data source Nodes.
204, above-mentioned first node sends data acquisition request to above-mentioned destination node, and above-mentioned acquisition request carries above-mentioned number According to mark.
Optionally, before above-mentioned steps 204, the above method further include:
Above-mentioned first node determines the data acquisition rule of above-mentioned destination node based on above-mentioned intelligent contract;
It includes: above-mentioned first node according to above-mentioned true that above-mentioned first node, which sends data acquisition request to above-mentioned destination node, Fixed data acquisition rule sends above-mentioned data acquisition request to above-mentioned destination node.
The data acquisition rule between each node can be pre-established in above-mentioned intelligence contract, for example specifically can specify that The data acquisition for stating destination node needs which condition, the mainly identity of the node of verifying initiation data acquisition request.It is above-mentioned First node can determine the data acquisition rule of above-mentioned destination node based on above-mentioned intelligent contract, according still further to the number of above-mentioned determination Above-mentioned data acquisition request is sent to above-mentioned destination node according to rule is obtained, to provide the proof of identification needed, is convenient for the target Node is judged, it is determined whether shared data.
Optionally, above-mentioned first node sends above-mentioned number to above-mentioned destination node according to the data acquisition rule of above-mentioned determination Include: according to acquisition request
The verifying label in the data acquisition rule of above-mentioned determination is obtained, the corresponding target identities of above-mentioned verifying label are obtained Information, Xiang Shangshu destination node send the data acquisition request comprising above-mentioned target identity information.
Specifically, may include verifying label in the data acquisition rule of above-mentioned determination, i.e., these verifying labels can refer to Show some Verification Projects when the authentication of the destination node requirement, then first node can be determined by above-mentioned verifying label Corresponding Verification Project obtains corresponding target identity information and (for example needs key, digital signature or credit grade up to upper Limit), above-mentioned target identity information is provided when sending above-mentioned data acquisition request, is advised convenient for the destination node according to data acquisition It is then verified, improves the safety in data sharing.
205, above-mentioned first node receives and stores the above-mentioned target data from above-mentioned destination node, above-mentioned target data For the corresponding data of Data Identification above-mentioned in above-mentioned destination node.
Wherein, above-mentioned steps 202, step 203, step 204 and step 205 can be respectively with reference to embodiment illustrated in fig. 1 Specific descriptions in step 102, step 103, step 104 and step 105, details are not described herein again.
206, data analysis request is sent to data analysis node, above-mentioned data analysis request carries above-mentioned target data Analysis mark, above-mentioned data analysis request are used to indicate above-mentioned data analysis node and obtain the corresponding number of targets of above-mentioned analysis mark According to being analyzed.
Main chain in alliance's chain can provide big data analysis interface simultaneously, and above-mentioned first node can also be requested to data It is analyzed.At least one data analysis node for executing data analysis function, first node are can specify that in intelligent contract After receiving above-mentioned target data, above-mentioned data analysis request can be sent to above-mentioned data analysis node.Wherein, above-mentioned Data analysis request carries the analysis mark of above-mentioned target data, and above-mentioned data analysis node is asked receiving the analysis of above-mentioned data After asking, available above-mentioned analysis identifies corresponding target data and is analyzed.
Optionally, before step 206, this method can also include:
Management node into above-mentioned alliance's chain sends inquiry request, and above-mentioned inquiry request carries point of above-mentioned target data Analysis mark;
The query result from above-mentioned management node is received, above-mentioned query result includes that above-mentioned management node is based on above-mentioned intelligence It can the contract corresponding target analysis node of above-mentioned analysis mark determining in above-mentioned alliance's chain;
Above-mentioned steps 206 can specifically include: Xiang Shangshu target analysis node sends above-mentioned data analysis request.
Intelligent contract in alliance's chain can specify that the data analysis for the data analysis task for being responsible for different node datas Node can specifically include the corresponding relationship of node and data analysis node, i.e. a data analysis node can correspond to one Or other multiple nodes, it is responsible for the data analysis task of other above-mentioned nodes.By the above-mentioned big data interface can with hold The target analysis node of the data analysis function of row first node communicates, and above-mentioned target analysis node can be used as the spy of alliance's chain Different node, can be different with the permission of other nodes.
Management node in alliance's chain can be understood as data management to other nodes and task distribution supervised Special joint can be main chain node, and the management of node interaction can be carried out according to the intelligent contract in alliance's chain.First node First the above-mentioned management node into above-mentioned alliance's chain inquiry request can be sent, above-mentioned inquiry request carries above-mentioned target data Analysis mark, the management node, can be based on above-mentioned intelligent contracts in above-mentioned alliance's chain after receiving above-mentioned inquiry request Determine that the analysis identifies corresponding target analysis node, the data analysis which can be responsible for the first node is appointed Business.Further, which can be generated query result and sends to first node, which may include above-mentioned Analysis identifies corresponding target analysis node (address), and then can send data analysis request to the target analysis node.Then First node can inquire matched data analysis node by management node and carry out data analysis.
Specifically, data analysis algorithm can be deployed on target analysis node, can also be obtained according to above-mentioned Data Identification Profile Summary is taken, then obtains target data and carries out data analysis.It optionally, can be to the after completing data analysis One node sends data analysis result, is also possible to forward based on main chain server to the first node.It can be with by this method It is connected to data silo, and more multiple data origin can be obtained, and then safely and accurately completes data analysis, it can be total based on data It enjoys platform and creates real big data analysis.
The main chain of alliance's chain of the embodiment of the present application can ((Hyperledger) Project Technical be realized based on super account book. Super account book is the open source projects for being intended to push the inter-trade application of block chain.It provides a modular framework, frame The execution (being known as " chaincode " in Fabric project) of node, intelligent contract in structure and configurable common recognition and member Service.One Fabric network includes that companion's node (" Peer nodes ") executes chaincode contract, accesses account book data, The interface of endorsement transaction and referred to as application program.Mandator node (" Orderer nodes ") is responsible for ensuring the one of this block chain Cause property simultaneously conveys the transaction endorsed to the companions in network;And MSP service, mainly as certificate authority X.509 certificate is used to verify member identities and role for (Certificate Authority) management.It, can based on super account book There are at least four class special joints: endorsement node, confirmation node, ordering joint, certificate node.
Alliance's chain in the embodiment of the present application can carry out intelligent contract exploitation based on Go or Java, and the above method can be with Intelligent contract is written to realize, all kinds of nodes is set, message is broadcasted, sort, know together, is confirmed and is write on chain.Wherein authenticate Node (above-mentioned verifying node) and authorization node may be implemented certain nodes and form a small-sized cluster, be carried out using encrypted tunnel Communication interaction, and other lack of competence nodes can not then participate in interacting, and increase safety, the flexibility of data transmission.
In the embodiment of the present application, authorization is sent to authorized party based on the intelligent contract on alliance's chain by first node and is asked It asks, when receiving from confirmation instruction of the above-mentioned authorized party to above-mentioned authorization requests, above-mentioned data mark is obtained in alliance's chain Know corresponding Profile Summary, determines that destination node, above-mentioned destination node are to be obtained according to above-mentioned Profile Summary The source Nodes of target data, then data acquisition request is sent to above-mentioned destination node, above-mentioned acquisition request carries above-mentioned data Mark, can receive later and stores the above-mentioned target data from above-mentioned destination node, and above-mentioned target data is above-mentioned target The corresponding data of above-mentioned Data Identification, are made a summary, the node in alliance's chain can determine data by above-mentioned target information in node Source obtains target data in turn, it can increases data acquisition source, and safety is higher, reduces data acquisition and data The cost of maintenance.Data analysis request can also be sent to data analysis node, above-mentioned data analysis request carries above-mentioned target The analysis of data identifies, and it is corresponding that above-mentioned data analysis request is used to indicate the above-mentioned analysis mark of above-mentioned data analysis node acquisition Target data is analyzed, and can be created real big data analysis based on data sharing platform, not only be ensure that privacy, but also real Existing data sharing and analysis integration.
It is above-mentioned that mainly the scheme of the embodiment of the present application is described from the angle of method side implementation procedure.It is understood that , in order to realize the above functions, it comprises execute the corresponding hardware configuration of each function and/or software mould for electronic equipment Block.Those skilled in the art should be readily appreciated that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, the present invention can be realized with the combining form of hardware or hardware and computer software.Some function actually with Hardware or computer software drive the mode of hardware to execute, the specific application and design constraint item depending on technical solution Part.Professional technician can be to specifically realizing described function using distinct methods, but this realization is not It is considered as beyond the scope of this invention.
The embodiment of the present application can carry out the division of functional module according to above method example to electronic equipment, for example, can With each functional module of each function division of correspondence, two or more functions can also be integrated in a processing module In.Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It needs It is noted that be schematical, only a kind of logical function partition to the division of module in the embodiment of the present application, it is practical real It is current that there may be another division manner.
Fig. 3 is referred to, Fig. 3 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application, the electronic equipment 300 include transmission module 310, acquisition module 320, determining module 330 and memory module 340, in which:
Above-mentioned transmission module 310, for sending authorization requests to authorized party, above-mentioned authorization requests carry Data Identification;
Above-mentioned acquisition module 320, for receive the confirmations of above-mentioned authorization requests is instructed from above-mentioned authorized party when, The corresponding Profile Summary of above-mentioned Data Identification is obtained in alliance's chain;
Above-mentioned determining module 330, for determining destination node according to above-mentioned Profile Summary, above-mentioned destination node be to The source Nodes of the target data of acquisition;
Above-mentioned transmission module 310 is also used to, and Xiang Shangshu destination node sends data acquisition request, and above-mentioned acquisition request carries Above-mentioned Data Identification;
Above-mentioned memory module 340, for receiving and storing the above-mentioned target data from above-mentioned destination node, above-mentioned target Data are the corresponding data of Data Identification above-mentioned in above-mentioned destination node.
Optionally, above-mentioned transmission module 310 is specifically used for, based on the intelligent contract on above-mentioned alliance's chain to above-mentioned authorized party Send authorization requests.
Optionally, above-mentioned intelligent contract includes authorization requests time and the corresponding relationship of authorized party;
Above-mentioned transmission module 310 is specifically used for, when reaching the first moment in the above-mentioned authorization requests time, according to above-mentioned The corresponding relationship of authorization requests time and authorized party determine that corresponding authorized party of above-mentioned first moment, Xiang Shangshu authorized party send Above-mentioned authorization requests.
Optionally, above-mentioned determining module 330 is also used to: sending data to above-mentioned destination node in above-mentioned transmission module 310 Before acquisition request, the data acquisition rule of above-mentioned destination node is determined based on above-mentioned intelligent contract;
Above-mentioned transmission module 310 is specifically used for, and sends according to the data acquisition rule of above-mentioned determination to above-mentioned destination node Above-mentioned data acquisition request.
Optionally, above-mentioned acquisition module 320 is also used to: the verifying label in the data acquisition rule of above-mentioned determination is obtained, Obtain the corresponding target identity information of above-mentioned verifying label;
Above-mentioned transmission module 310 is specifically used for, and Xiang Shangshu destination node sends the data comprising above-mentioned target identity information Acquisition request.
Optionally, above-mentioned transmission module 310 is also used to:
After above-mentioned memory module 340 receives the above-mentioned target data from above-mentioned destination node and stores, to data Analysis node sends data analysis request, and above-mentioned data analysis request carries the analysis mark of above-mentioned target data, above-mentioned data Analysis request is used to indicate the corresponding target data of the above-mentioned analysis mark of above-mentioned data analysis node acquisition and is analyzed.
Optionally, above-mentioned transmission module 310 is also used to:
Before sending data analysis request to data analysis node, the management node in Xiang Shangshu alliance chain sends inquiry Request, above-mentioned inquiry request carry the analysis mark of above-mentioned target data;
The query result from above-mentioned management node is received, above-mentioned query result includes that above-mentioned management node is based on above-mentioned intelligence It can the contract corresponding target analysis node of above-mentioned analysis mark determining in above-mentioned alliance's chain;
Above-mentioned transmission module 310 is also particularly useful for Xiang Shangshu target analysis node sends above-mentioned data analysis request.
According to the specific embodiment of the embodiment of the present application, Fig. 1 and the data capture method shown in Fig. 2 based on alliance's chain The step 101 being related to~105,201~206 modules that can be in electronic equipment 300 as shown in Figure 3 are performed.
By the electronic equipment 300 of the embodiment of the present application, electronic equipment 300 can send authorization requests to authorized party, on It states authorization requests and carries Data Identification, when receiving from confirmation instruction of the above-mentioned authorized party to above-mentioned authorization requests, joining The corresponding Profile Summary of above-mentioned Data Identification is obtained in alliance's chain, and destination node is determined according to above-mentioned Profile Summary, on The source Nodes that destination node is target data to be obtained are stated, Xiang Shangshu destination node sends data acquisition request, above-mentioned to obtain It takes request to carry above-mentioned Data Identification, receives and stores the above-mentioned target data from above-mentioned destination node, above-mentioned target data For the corresponding data of Data Identification above-mentioned in above-mentioned destination node, reference can be realized by way of alliance's chain and informative abstract The data sharing of system increases data acquisition source, reduces the cost of collage-credit data acquiring and maintaining.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another kind electronic equipment disclosed in the embodiment of the present application.Such as Fig. 4 institute Show, which includes processor 401 and memory 402, wherein electronic equipment 400 can also include bus 403, place Reason device 401 and memory 402 can be connected with each other by bus 403, and bus 403 can be Peripheral Component Interconnect standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..Bus 403 can be divided into address bus, data/address bus, Control bus etc..Only to be indicated with a thick line in Fig. 4, it is not intended that an only bus or a seed type convenient for indicating Bus.Wherein, electronic equipment 400 can also include input-output equipment 404, and input-output equipment 404 may include display Screen, such as liquid crystal display.Memory 402 is used to store one or more programs comprising instruction;Processor 401 is for calling Method and step some or all of is mentioned in the above-mentioned Fig. 1 and Fig. 2 embodiment of the instruction execution being stored in memory 402.
It should be appreciated that in the embodiment of the present application, alleged processor 401 can be central processing unit (Central Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at Reason device is also possible to any conventional processor etc..
Input equipment 402 may include that Trackpad, fingerprint adopt sensor (for acquiring the finger print information and fingerprint of user Directional information), microphone etc., output equipment 403 may include display (LCD etc.), loudspeaker etc..
The memory 404 may include read-only memory and random access memory, and to processor 401 provide instruction and Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited Store up the information of device type.
By the electronic equipment 400 of the embodiment of the present application, electronic equipment 400 can send authorization requests to authorized party, on It states authorization requests and carries Data Identification, when receiving from confirmation instruction of the above-mentioned authorized party to above-mentioned authorization requests, joining The corresponding Profile Summary of above-mentioned Data Identification is obtained in alliance's chain, and destination node is determined according to above-mentioned Profile Summary, on The source Nodes that destination node is target data to be obtained are stated, Xiang Shangshu destination node sends data acquisition request, above-mentioned to obtain It takes request to carry above-mentioned Data Identification, receives and stores the above-mentioned target data from above-mentioned destination node, above-mentioned target data For the corresponding data of Data Identification above-mentioned in above-mentioned destination node, reference can be realized by way of alliance's chain and informative abstract The data sharing of system increases data acquisition source, reduces the cost of collage-credit data acquiring and maintaining.
The embodiment of the present application also provides a kind of computer storage medium, wherein computer storage medium storage is for electricity The computer program of subdata exchange, it is as any in recorded in above method embodiment which execute computer A kind of some or all of the data capture method based on alliance's chain step.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, it is only a kind of Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or module, It can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
If the integrated module is realized in the form of software function module and sells or use as independent product When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment (can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention Step.And memory above-mentioned includes: USB flash disk, read-only memory (Read-Only Memory, ROM), random access memory The various media that can store program code such as (Random Access Memory, RAM), mobile hard disk, magnetic or disk.

Claims (10)

1. a kind of data capture method based on alliance's chain, which is characterized in that the described method includes:
First node sends authorization requests to authorized party, and the authorization requests carry Data Identification;
The first node obtains in alliance's chain when receiving from confirmation instruction of the authorized party to the authorization requests Take the corresponding Profile Summary of the Data Identification;
The first node determines that destination node, the destination node are number of targets to be obtained according to the Profile Summary According to source Nodes;
The first node sends data acquisition request to the destination node, and the acquisition request carries the Data Identification;
The first node receives and stores the target data from the destination node, and the target data is the mesh Mark the corresponding data of Data Identification described in node.
2. the method according to claim 1, wherein the first node sends authorization requests packet to authorized party It includes:
The first node sends authorization requests to the authorized party based on the intelligent contract on alliance's chain.
3. according to the method described in claim 2, it is characterized in that, the intelligence contract includes authorization requests time and authorized party Corresponding relationship;
The first node sends authorization requests to first terminal equipment based on the intelligent contract on alliance's chain
The first node when reaching the first moment in authorization requests time, according to the authorization requests time with award The corresponding relationship of Quan Fang determines that first moment corresponding authorized party, Xiang Suoshu authorized party send the authorization requests.
4. method according to claim 1-3, which is characterized in that the first node is sent out to the destination node Before sending data acquisition request, the method also includes:
The first node determines the data acquisition rule of the destination node based on the intelligent contract;
It includes: the first node according to the determination that the first node, which sends data acquisition request to the destination node, Data acquisition rule sends the data acquisition request to the destination node.
5. according to the method described in claim 4, it is characterized in that, the first node is advised according to the data acquisition of the determination Then sending the data acquisition request to the destination node includes:
The verifying label in the data acquisition rule of the determination is obtained, the corresponding target identities letter of the verifying label is obtained Breath, Xiang Suoshu destination node send the data acquisition request comprising the target identity information.
6. according to the method described in claim 5, it is characterized in that, the number of targets of the reception from the destination node According to and store after, the method also includes:
Data analysis request is sent to data analysis node, the data analysis request carries the analysis mark of the target data Know, the data analysis request is used to indicate the data analysis node and obtains the corresponding target data progress of the analysis mark Analysis.
7. according to the method described in claim 6, it is characterized in that, it is described to data analysis node send data analysis request it Before, the method also includes:
Management node into alliance's chain sends inquiry request, and the inquiry request carries the analysis mark of the target data Know;
The query result from the management node is received, the query result includes that the management node is based on the intelligence conjunction The analysis determined about in alliance's chain identifies corresponding target analysis node;
It is described that send data analysis request to data analysis node include: to send data analysis to the target analysis node Request.
8. a kind of electronic equipment characterized by comprising transmission module obtains module, determining module and memory module, in which:
The transmission module, for sending authorization requests to authorized party, the authorization requests carry Data Identification;
The acquisition module, for receive the confirmations of the authorization requests is instructed from the authorized party when, in alliance The corresponding Profile Summary of the Data Identification is obtained in chain;
The determining module, for determining that destination node, the destination node are to be obtained according to the Profile Summary The source Nodes of target data;
The transmission module is also used to, and Xiang Suoshu destination node sends data acquisition request, and the acquisition request carries the number According to mark;
The memory module, for receiving and storing the target data from the destination node, the target data is The corresponding data of Data Identification described in the destination node.
9. a kind of electronic equipment, which is characterized in that including processor, input equipment, output equipment and memory, the processing Device, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing computer program, the meter Calculation machine program includes program instruction, and the processor is configured for calling described program instruction, executes claim 1-7 such as and appoints Method described in one.
10. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with computer program, described Computer program includes program instruction, and described program instruction makes the processor execute such as claim when being executed by a processor The described in any item methods of 1-7.
CN201910423129.6A 2019-05-21 2019-05-21 Data capture method, electronic equipment and computer storage medium based on alliance's chain Pending CN110223157A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910423129.6A CN110223157A (en) 2019-05-21 2019-05-21 Data capture method, electronic equipment and computer storage medium based on alliance's chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910423129.6A CN110223157A (en) 2019-05-21 2019-05-21 Data capture method, electronic equipment and computer storage medium based on alliance's chain

Publications (1)

Publication Number Publication Date
CN110223157A true CN110223157A (en) 2019-09-10

Family

ID=67821486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910423129.6A Pending CN110223157A (en) 2019-05-21 2019-05-21 Data capture method, electronic equipment and computer storage medium based on alliance's chain

Country Status (1)

Country Link
CN (1) CN110223157A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487454A (en) * 2020-12-03 2021-03-12 天聚地合(苏州)数据股份有限公司 Data management method, device, equipment and storage medium
CN112883425A (en) * 2021-03-26 2021-06-01 重庆度小满优扬科技有限公司 Data processing method based on block chain and block chain link point
CN113468600A (en) * 2021-06-30 2021-10-01 建信金融科技有限责任公司 Data authorization method, device and equipment
CN114531260A (en) * 2020-11-09 2022-05-24 腾讯科技(深圳)有限公司 Information processing method based on alliance chain system and related equipment
CN114884679A (en) * 2022-05-16 2022-08-09 江苏科技大学 Intellectual property authorization method and device based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848080A (en) * 2018-06-01 2018-11-20 深圳崀途科技有限公司 Data-sharing systems based on the storage verification of alliance's chain
CN109190881A (en) * 2018-07-24 2019-01-11 东软集团股份有限公司 A kind of data assets management method, system and equipment
CN109189962A (en) * 2018-08-17 2019-01-11 福建南威软件有限公司 A kind of license service realization system based on block chain
CN109615529A (en) * 2019-02-25 2019-04-12 中国农业银行股份有限公司 A kind of credit investigation system based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848080A (en) * 2018-06-01 2018-11-20 深圳崀途科技有限公司 Data-sharing systems based on the storage verification of alliance's chain
CN109190881A (en) * 2018-07-24 2019-01-11 东软集团股份有限公司 A kind of data assets management method, system and equipment
CN109189962A (en) * 2018-08-17 2019-01-11 福建南威软件有限公司 A kind of license service realization system based on block chain
CN109615529A (en) * 2019-02-25 2019-04-12 中国农业银行股份有限公司 A kind of credit investigation system based on block chain

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114531260A (en) * 2020-11-09 2022-05-24 腾讯科技(深圳)有限公司 Information processing method based on alliance chain system and related equipment
CN112487454A (en) * 2020-12-03 2021-03-12 天聚地合(苏州)数据股份有限公司 Data management method, device, equipment and storage medium
CN112883425A (en) * 2021-03-26 2021-06-01 重庆度小满优扬科技有限公司 Data processing method based on block chain and block chain link point
CN113468600A (en) * 2021-06-30 2021-10-01 建信金融科技有限责任公司 Data authorization method, device and equipment
CN113468600B (en) * 2021-06-30 2023-04-28 建信金融科技有限责任公司 Data authorization method, device and equipment
CN114884679A (en) * 2022-05-16 2022-08-09 江苏科技大学 Intellectual property authorization method and device based on block chain
CN114884679B (en) * 2022-05-16 2024-01-19 江苏科技大学 Intellectual property right authorizing method and device based on blockchain

Similar Documents

Publication Publication Date Title
CN110210961A (en) Data capture method, server and computer storage medium based on alliance's chain
CN110246017A (en) Data capture method, terminal device and computer storage medium based on alliance's chain
CN110223157A (en) Data capture method, electronic equipment and computer storage medium based on alliance's chain
CN110266648A (en) Data capture method, server and computer storage medium based on alliance's chain
US11362814B1 (en) Autonomous devices
Xiong et al. Smart contract based data trading mode using blockchain and machine learning
Xie et al. A survey of blockchain technology applied to smart cities: Research issues and challenges
US20220263671A1 (en) Data processing method, apparatus, and device, blockchain system, and computer-readable storage medium
CN108256859B (en) Financial product transaction consensus method, node and system based on block chain
CN110555029B (en) Ticket management method, device and storage medium based on block chain
CN110222529A (en) Assets management method, electronic equipment and computer storage medium based on alliance's chain
CN108805573A (en) A kind of Information Authentication method, server and storage medium
CN109450910A (en) Data sharing method, data sharing network and electronic equipment based on block chain
CN110728494B (en) Real estate business handling method, real property information system and device
CN110245185A (en) Data processing method, terminal device and computer storage medium based on alliance's chain
CN112163954B (en) Transaction method and device based on block chain
CN110263025A (en) Data liquidation method, electronic equipment and computer storage medium based on alliance's chain
EP1738239A1 (en) Secure messaging system
CN111798209A (en) Engineering project management method based on block chain, electronic equipment and storage medium
CN109190881A (en) A kind of data assets management method, system and equipment
CN110246040A (en) Trade management method, electronic equipment and computer storage medium based on alliance's chain
CN114881757A (en) Letter method, system and electronic equipment
CN111612452A (en) Intellectual property management system and method based on block chain
CN111292057A (en) Service processing method based on block chain
Yang et al. Leveraging blockchain for scaffolding work management in construction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination