CN110225056A - A kind of evaluation data cochain method and its equipment for applying intelligent contract - Google Patents
A kind of evaluation data cochain method and its equipment for applying intelligent contract Download PDFInfo
- Publication number
- CN110225056A CN110225056A CN201910547125.9A CN201910547125A CN110225056A CN 110225056 A CN110225056 A CN 110225056A CN 201910547125 A CN201910547125 A CN 201910547125A CN 110225056 A CN110225056 A CN 110225056A
- Authority
- CN
- China
- Prior art keywords
- client
- evaluation data
- evaluation
- public key
- intelligent contract
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application discloses a kind of evaluation data cochain methods and its equipment for applying intelligent contract, which comprises block chain node receives the evaluation data cochain request that the first client is sent;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client;Receive the inquiry request of the evaluation data of the second client;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client;After verification passes through, the evaluation data inquiry request is sent to first client, including the second client public key in the evaluation data inquiry request;Receive the evaluation data query response that first client is sent;Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and after verification passes through, the evaluation data of second client public key encryption are executed cochain process.The application can will evaluate data cochain, disclose credible.
Description
Technical field
This application involves block chain technical field more particularly to a kind of evaluation data cochain method for applying intelligent contract and
Its equipment.
Background technique
Currently, block chain technology is the peer-to-peer network based on decentralization, with open source software Cryptography Principles, when ordinal number
It is combined according to common recognition mechanism, to ensure the coherent of each node in distributed data base and continue, so that information is verified immediately, can
Retrospect, but be difficult to tamper with and can not shield, to create a set of privacy, shareable value system efficiently, safe.
Existing evaluation platform is all the database using centralization, saves the evaluation number of commodity, and evaluation time is used
The contents such as the mobile phone that the evaluation at family uses;However, the database of evaluation platform, there is data to be tampered, the authenticity of data
The problems such as operation platform that cannot be guaranteed, and evaluate modifies the evaluation number of certain commodity, deletes situations such as user's difference is commented.Especially
To some small evaluation platforms, the Information Security and authenticity of commodity all be cannot be guaranteed: and commodity or service
Evaluation content it is untrue, can mislead to user, influence the experience of user.
Therefore, how can not distort based on block chain, the data of evaluation platform are stored in block chain by believable mode
On, become urgent problem to be solved.
Above content is only used for the technical solution that auxiliary understands the application, does not represent and recognizes that above content is existing skill
Art.
Summary of the invention
To solve the above-mentioned problems, the application provides a kind of evaluation data cochain method for applying intelligent contract and its sets
It is standby, it can allow the data cochain of evaluation, so that the evaluation data on chain are credible, it is open and clear.
The application first aspect provides a kind of evaluation data cochain method for applying intelligent contract, which comprises
Block chain node receives the evaluation data cochain request that the first client is sent, the evaluation data cochain request packet
Include the evaluation data of the first client public key encryption;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, verifies
By rear, the cochain process of the execution evaluation data;
The block chain node receives the inquiry request of the evaluation data of the second client;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client;
After verification passes through, the block chain node sends the evaluation data inquiry request to first client, institute
It include the second client public key in commentary valence data inquiry request, so that first client, second client public key
To the evaluation data encryption;
The block chain node receives the evaluation data query response that first client is sent, the review number it is investigated that
Ask the evaluation data that response includes the encryption of the second client public key;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, verifies
By rear, the evaluation data of second client public key encryption are executed into cochain process.
In one possible implementation, the method also includes: the block chain node receives second client
End sends evaluation data inquiry request;
The block chain node sends evaluation data query and responds to second client, and the evaluation data query is rung
It should include the evaluation data of the second client public key encryption, in order to which the second client own private key is to second visitor
The evaluation data of family end public key encryption are decrypted.
In one possible implementation, the evaluation data are that the corresponding user of first client is flat in evaluation
The operation data of platform, including evaluation number, evaluation time, comment content and evaluation type.
In one possible implementation, the first client own public key is to the evaluation data encryption, tool
Body are as follows: first client carries out the encryption of preset ratio with own public key to the evaluation data.
In one possible implementation, the evaluation data include relating attribute and dereferenced attribute;Wherein, described
The attribute value of evaluation data relating attribute is superimposed automatically.
The application second aspect provides a kind of evaluation data cochain equipment for applying intelligent contract, and the equipment is block chain
Node, the equipment include receiving unit, processing unit and transmission unit;Wherein,
The receiving unit, receives the evaluation data cochain request that the first client is sent, and the evaluation data cochain is asked
Seek the evaluation data including first client public key encryption;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client
It is verified, after verification passes through, executes the cochain process of the evaluation data;
The receiving unit receives the inquiry request of the evaluation data of the second client;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of second client
It is verified;
It verifies after passing through, the transmission unit, the transmission evaluation data inquiry request is described to first client
Evaluating in data inquiry request includes the second client public key, so that first client, second client public key pair
The evaluation data encryption;
The receiving unit receives the evaluation data query response that first client is sent, the review number it is investigated that
Ask the evaluation data that response includes the encryption of the second client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client
It is verified, after verification passes through, the evaluation data of second client public key encryption is executed into cochain process.
In one possible implementation, the receiving unit, receive second client send review number it is investigated that
Ask request;The transmission unit sends evaluation data query and responds to second client, the evaluation data query response
Evaluation data including the encryption of the second client public key, in order to which the second client own private key is to second client
The evaluation data of end public key encryption are decrypted.
In one possible implementation, the evaluation data are that the corresponding user of first client is flat in evaluation
The operation data of platform, including evaluation number, evaluation time, comment content and evaluation type.
In one possible implementation, the first client own public key is to the evaluation data encryption, tool
Body are as follows: first client carries out the encryption of preset ratio with own public key to the evaluation data.
In one possible implementation, the evaluation data include relating attribute and dereferenced attribute;Wherein, described
The attribute value of evaluation data relating attribute is superimposed automatically.
The application can allow the data cochain of evaluation, so that the evaluation data on chain are credible, it is open and clear, to promote use
Family experience.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 is a kind of evaluation data cochain method flow schematic diagram for applying intelligent contract provided by the embodiments of the present application;
Fig. 2 is the evaluation data cochain method flow signal of the intelligent contract of another application provided by the embodiments of the present application
Figure;
Fig. 3 is a kind of evaluation data cochain device structure schematic diagram for applying intelligent contract provided by the embodiments of the present application.
Specific embodiment
For the clearer general idea for illustrating the application, carry out in an illustrative manner with reference to the accompanying drawings of the specification detailed
It describes in detail bright.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Similar object, without being used to describe a particular order or precedence order.It should be understood that the sequence used in this way is in appropriate feelings
It can be interchanged under condition, so that the embodiment of the present invention described herein can be other than those of illustrating or describing herein
Sequence implement.
In addition, term " includes " and " having " and their any deformation, it is intended that covering non-exclusive includes example
Such as, the process, method, system, product or equipment for containing a series of steps or units those of are not necessarily limited to be clearly listed
Step or unit, but may include being not clearly listed or intrinsic for these process, methods, product or equipment other
Step or unit.
So-called block chain node and client in the embodiment of the present application, it can be understood as respond extraneous certain trigger item
Part, and the abstract machine that state is converted is done by certain rule, it can be mobile phone, tablet computer, palm PC, individual's PC computer etc.
It can be according to application software and the equipment that can be networked.
As shown in Figure 1, a kind of evaluation data cochain method for applying intelligent contract, the method includes the steps S101-
S107。
S101, block chain node receive the evaluation data cochain request that the first client is sent, the evaluation data cochain
Request includes the evaluation data of first client public key encryption.
S102, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of first client,
After verification passes through, the cochain process of the evaluation data is executed.
S103, the block chain node receive the inquiry request of the evaluation data of the second client.
S104, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of second client.
S105, after verification passes through, the block chain node sends the evaluation data inquiry request to first client
End, including the second client public key in the evaluation data inquiry request, so that first client is with second client
Hold public key to the evaluation data encryption.
S106, the block chain node receive the evaluation data query response that first client is sent, the evaluation
Data query response includes the evaluation data of the second client public key encryption.
S107, triggering verify intelligent contract, and the intelligent contract of the verification verifies the identity of first client,
After verification passes through, the evaluation data of second client public key encryption are executed into cochain process.
In one example, the method also includes: the block chain node receives second client and sends evaluation
Data inquiry request;The block chain node sends evaluation data query and responds to second client, the evaluation data
Inquiry response includes the evaluation data of the second client public key encryption, in order to which the second client own private key is to described
The evaluation data of second client public key encryption are decrypted.
In one example, the evaluation data are operand of the corresponding user of first client in evaluation platform
According to, including evaluation number, evaluation time, comment content and evaluation type.
In one example, the first client own public key is to the evaluation data encryption, specifically: described
One client carries out the encryption of preset ratio with own public key to the evaluation data.
In one example, the evaluation data include relating attribute and dereferenced attribute;Wherein, the evaluation data are closed
Attribute attribute value is superimposed automatically.
In above-mentioned example, operator of first client as evaluation data, the second client is looked into as evaluation data
Inquiry person;For some specific evaluation platform, every user either evaluation data operator, be also possible to evaluate data
Inquiry.
Below by taking Fig. 2 as an example, above-mentioned evaluation data cochain method is illustrated, the method comprising the steps of S201-
S214。
S201, the first client encrypt the evaluation data itself generated with public key, which includes
The user's operations such as evaluation number, evaluation time, the IP address of user and the account number cipher of user of the user on evaluation platform
The data that behavior generates.
First client encrypts the evaluation data itself generated with own public key, which can be review number
It is encrypted according to whole fields, is also possible to encrypt the part field of the evaluation data, such as: only to the comment of privacy
Content is encrypted;It is also possible to user not encrypt the evaluation data.
In addition, the evaluation data include being divided into two attribute, relating attribute and dereferenced attribute.Such as: when user's evaluation
Between, belong to dereferenced attribute, the evaluation time of every user may be stored on block chain;Such as: the quantity of user's evaluation,
It is exactly relating attribute, includes evaluation quantity in the data format of a commodity, as long as there is user to evaluate the commodity, the quotient
The evaluation quantity of product can be superimposed automatically.
Evaluation type includes commodity evaluation, personal preference evaluation, clothes dress appraisal etc.;Such as: individual is to season
Hobby evaluation, likes evaluation to the collocation of clothes, likes evaluation to the style of clothes, the moulding hobby evaluation etc. to hair.
S202, the first client send evaluation data cochain and request to give block chain node.
S203, triggers the verification intelligence contract on block chain, which carries out the identity of the first client
Verification, executes the cochain process of the evaluation data.
The verification refer to judge first client whether be the evaluation platform user, the only user of the evaluation platform
It can just have permission and the evaluation data are subjected to cochain.
It should be noted that upper chain process is the conventional process of this field, without being described in detail.Such as: in workload
It proves to be packaged data under PoW common recognition mode, verify, the block chain node for getting book keeping operation power can be by the packing block
It is placed on next block of current block, as new block cochain.
S204, block chain node send evaluation data cochain and respond to the first client.
S205, the second client send evaluation data inquiry request and give block chain node, the evaluation data inquiry request
Including the second client public key.
At this point, the corresponding user of the second client can be after seeing the evaluation data, which is looked into
It askes.The first client and the second client are all the terminal devices for being equipped with decentralization application software in the application, all may be used
It is interacted with directly clicking through row information with the block chain link on block chain.
S206, triggers the verification intelligence contract on block chain, which carries out the identity of the second client
Verification.
After verification passes through, process is performed the next step;Verification does not pass through, Flow ends.
S207, after verification passes through, which sends evaluation data inquiry request to the first client, the review number
It is investigated that asking request includes the second client public key.
S208, the first client encrypt the evaluation data with second client public key.
S209, the first client send evaluation data query and respond to the block chain node, evaluation data query response
Evaluation data including the encryption of the second client public key.
S210 triggers the verification intelligence contract on block chain, identity of the verification intelligence contract to first client
It is verified, and the evaluation data of second client public key encryption is executed into cochain process.
S211, the block chain node send evaluation data query and respond to the second client.
S212, the second client send evaluation data inquiry request and give block chain node.
S213, the block chain node send the evaluation data query and respond to second client, the evaluation data query
Response includes the evaluation data of the second client public key encryption.
S214, the second client are decrypted with the evaluation data that own private key encrypts second client public key, are obtained
To the evaluation data.
The application can allow the data cochain of evaluation, and the cochain process is open and clear, any user of same evaluation platform
It can check the evaluation data;It ensure that the authenticity of evaluation data.Also, user can be according to oneself hobby, to commenting
Valence mumber is encrypted according to carrying out or is not encrypted, and improves user experience.
It should be noted that client is directly to carry out the interaction of information, block chain with the node of block chain in the application
Information is stored directly on block chain by node, not the server of centralization, so that it is credible to allow evaluation data more to disclose;And
It is not that the server of existing client and centralization interacts.
As shown in figure 3, a kind of evaluation data cochain equipment for applying intelligent contract, the equipment are block chain node, institute
Stating equipment includes receiving unit, processing unit and transmission unit.
The receiving unit, receives the evaluation data cochain request that the first client is sent, and the evaluation data cochain is asked
Seek the evaluation data including first client public key encryption;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client
It is verified, after verification passes through, executes the cochain process of the evaluation data;
The receiving unit receives the inquiry request of the evaluation data of the second client;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of second client
It is verified;
It verifies after passing through, the transmission unit, the transmission evaluation data inquiry request is described to first client
Evaluating in data inquiry request includes the second client public key, so that first client, second client public key pair
The evaluation data encryption;
The receiving unit receives the evaluation data query response that first client is sent, the review number it is investigated that
Ask the evaluation data that response includes the encryption of the second client public key;
The processing unit, triggering verifies intelligent contract, described to verify intelligent contract to the identity of first client
It is verified, after verification passes through, the evaluation data of second client public key encryption is executed into cochain process.
In one example, the receiving unit receives second client and sends evaluation data inquiry request;It is described
Transmission unit sends evaluation data query and responds to second client, and the evaluation data query response includes the second visitor
The evaluation data of family end public key encryption, in order to which the second client own private key encrypts second client public key
Evaluation data be decrypted.
In one example, the evaluation data are operand of the corresponding user of first client in evaluation platform
According to, including evaluation number, evaluation time, comment content and evaluation type.
In one example, the first client own public key is to the evaluation data encryption, specifically: described
One client carries out the encryption of preset ratio with own public key to the evaluation data.
In one example, the evaluation data include relating attribute and dereferenced attribute;Wherein, the evaluation data are closed
Attribute attribute value is superimposed automatically.
The application can allow the data cochain of evaluation, and the cochain process is open and clear, any user of same evaluation platform
It can check the evaluation data;It ensure that the authenticity of evaluation data.Also, user can be according to oneself hobby, to commenting
Valence mumber is encrypted according to carrying out or is not encrypted, and improves user experience.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure
Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate
The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description.
These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.
Professional technician can use different methods to achieve the described function each specific application, but this realization
It is not considered that exceeding scope of the present application.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (10)
1. a kind of evaluation data cochain method for applying intelligent contract, which is characterized in that the described method includes:
Block chain node receives the evaluation data cochain request that the first client is sent, and the evaluation data cochain request includes institute
State the evaluation data of the first client public key encryption;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and verification passes through
Afterwards, the cochain process of the evaluation data is executed;
The block chain node receives the inquiry request of the evaluation data of the second client;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of second client;
After verification passes through, the block chain node sends the evaluation data inquiry request to first client, institute's commentary
It include the second client public key in valence data inquiry request, so that first client is with second client public key to institute
Commentary valence data encryption;
The block chain node receives the evaluation data query response that first client is sent, and the evaluation data query is rung
It should include the evaluation data of the second client public key encryption;
Triggering verifies intelligent contract, and the intelligent contract of the verification verifies the identity of first client, and verification passes through
Afterwards, the evaluation data by second client public key encryption execute cochain process.
2. the method according to claim 1, wherein the method also includes:
The block chain node receives second client and sends evaluation data inquiry request;
The block chain node sends evaluation data query and responds to second client, the evaluation data query response bag
The evaluation data of the second client public key encryption are included, in order to which the second client own private key is to second client
The evaluation data of public key encryption are decrypted.
3. the method according to claim 1, wherein the evaluation data are the corresponding use of first client
Family evaluation platform operation data, including evaluation number, evaluation time, comment content and evaluation type.
4. the method according to claim 1, wherein the first client own public key is to the review number
According to encryption, specifically:
First client carries out the encryption of preset ratio with own public key to the evaluation data.
5. the method according to claim 1, wherein the evaluation data include relating attribute and dereferenced category
Property;Wherein,
The attribute value of the evaluation data relating attribute is superimposed automatically.
6. a kind of evaluation data cochain equipment for applying intelligent contract, which is characterized in that the equipment is block chain node, described
Equipment includes receiving unit, processing unit and transmission unit;Wherein,
The receiving unit receives the evaluation data cochain request that the first client is sent, the evaluation data cochain request packet
Include the evaluation data of the first client public key encryption;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of first client
Verification after verification passes through, executes the cochain process of the evaluation data;
The receiving unit receives the inquiry request of the evaluation data of the second client;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of second client
Verification;
After verification passes through, the transmission unit sends the evaluation data inquiry request to first client, the evaluation
It include the second client public key in data inquiry request, so that first client is with second client public key to described
Evaluate data encryption;
The receiving unit, receives the evaluation data query response that first client is sent, and the evaluation data query is rung
It should include the evaluation data of the second client public key encryption;
The processing unit, triggering verify intelligent contract, and the intelligence contract that verifies carries out the identity of first client
The evaluation data of second client public key encryption after verification passes through, are executed cochain process by verification.
7. equipment according to claim 6, which is characterized in that
The receiving unit receives second client and sends evaluation data inquiry request;
The transmission unit sends evaluation data query and responds to second client, the evaluation data query response bag
The evaluation data of the second client public key encryption are included, in order to which the second client own private key is to second client
The evaluation data of public key encryption are decrypted.
8. equipment according to claim 6, which is characterized in that the evaluation data are the corresponding use of first client
Family evaluation platform operation data, including evaluation number, evaluation time, comment content and evaluation type.
9. equipment according to claim 6, which is characterized in that the first client own public key is to the review number
According to encryption, specifically:
First client carries out the encryption of preset ratio with own public key to the evaluation data.
10. equipment according to claim 6, which is characterized in that the evaluation data include relating attribute and dereferenced category
Property;Wherein,
The attribute value of the evaluation data relating attribute is superimposed automatically.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910547125.9A CN110225056A (en) | 2019-06-24 | 2019-06-24 | A kind of evaluation data cochain method and its equipment for applying intelligent contract |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910547125.9A CN110225056A (en) | 2019-06-24 | 2019-06-24 | A kind of evaluation data cochain method and its equipment for applying intelligent contract |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110225056A true CN110225056A (en) | 2019-09-10 |
Family
ID=67814598
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910547125.9A Pending CN110225056A (en) | 2019-06-24 | 2019-06-24 | A kind of evaluation data cochain method and its equipment for applying intelligent contract |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110225056A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110597841A (en) * | 2019-09-29 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Application comment information processing method and device based on block chain network |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160217532A1 (en) * | 2015-01-23 | 2016-07-28 | Sure, Inc. | Securing Claim Data via Block-Chains for a Peer to Peer Platform |
CN106339639A (en) * | 2016-08-30 | 2017-01-18 | 弗洛格(武汉)信息科技有限公司 | Credit score management method and system based on block chain |
CN106533696A (en) * | 2016-11-18 | 2017-03-22 | 江苏通付盾科技有限公司 | Block chain-based identity authentication methods, authentication server and user terminal |
CN108765023A (en) * | 2018-06-01 | 2018-11-06 | 深圳市元征科技股份有限公司 | A kind of commodity evaluation management method, system and equipment |
US20180349968A1 (en) * | 2017-06-02 | 2018-12-06 | Walmart Apollo, Llc | Systems and methods for product review management with distributed database |
CN109657450A (en) * | 2018-12-14 | 2019-04-19 | 泰康保险集团股份有限公司 | Method, apparatus, medium and the electronic equipment evaluated based on block chain |
CN109801108A (en) * | 2019-01-18 | 2019-05-24 | 杭州明至科技有限公司 | A kind of course evaluation sharing method based on block chain technology |
-
2019
- 2019-06-24 CN CN201910547125.9A patent/CN110225056A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160217532A1 (en) * | 2015-01-23 | 2016-07-28 | Sure, Inc. | Securing Claim Data via Block-Chains for a Peer to Peer Platform |
CN106339639A (en) * | 2016-08-30 | 2017-01-18 | 弗洛格(武汉)信息科技有限公司 | Credit score management method and system based on block chain |
CN106533696A (en) * | 2016-11-18 | 2017-03-22 | 江苏通付盾科技有限公司 | Block chain-based identity authentication methods, authentication server and user terminal |
US20180349968A1 (en) * | 2017-06-02 | 2018-12-06 | Walmart Apollo, Llc | Systems and methods for product review management with distributed database |
CN108765023A (en) * | 2018-06-01 | 2018-11-06 | 深圳市元征科技股份有限公司 | A kind of commodity evaluation management method, system and equipment |
CN109657450A (en) * | 2018-12-14 | 2019-04-19 | 泰康保险集团股份有限公司 | Method, apparatus, medium and the electronic equipment evaluated based on block chain |
CN109801108A (en) * | 2019-01-18 | 2019-05-24 | 杭州明至科技有限公司 | A kind of course evaluation sharing method based on block chain technology |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110597841A (en) * | 2019-09-29 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Application comment information processing method and device based on block chain network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110232286A (en) | A kind of electric quotient data cochain method and its equipment for applying intelligent contract | |
CN110225032B (en) | Business data transaction method and equipment | |
CN105871805A (en) | Anti-stealing-link method and device | |
CN110278270A (en) | A kind of polled data cochain method and its equipment based on block chain | |
CN110247923A (en) | Number cochain method and its equipment are shaken based on block chain | |
CN110247918A (en) | Number cochain method and its equipment are shaken applied to block chain | |
CN114598671B (en) | Session message processing method, device, storage medium and electronic equipment | |
CN110266696A (en) | A kind of evaluation data cochain method and its equipment applied to block chain | |
CN110247921A (en) | A kind of polled data cochain method and its equipment for applying intelligent contract | |
CN110264206A (en) | A kind of electric quotient data cochain method and its equipment based on block chain | |
CN110263529A (en) | Number cochain method and its equipment are shaken using intelligent contract | |
CN110266699A (en) | Prize drawing data cochain method and its equipment applied to block chain | |
CN110266698A (en) | Pass through the Knowledge Sharing data cochain method and its equipment of block chain | |
JP2015090993A (en) | Encryption control device, encryption control method and program | |
CN110263563A (en) | By means of the ad click data cochain method and its equipment of block chain | |
CN110263100A (en) | Using the shared economic data cochain method and its equipment of intelligent contract | |
CN110225056A (en) | A kind of evaluation data cochain method and its equipment for applying intelligent contract | |
CN110232287A (en) | Pass through the shared economic data cochain method and its equipment of block chain | |
CN110263562A (en) | A kind of evaluation data cochain method and its equipment based on block chain | |
CN110266695A (en) | Using the lottery data cochain method and its equipment of intelligent contract | |
CN110213296A (en) | It is a kind of that data cochain method and its equipment are thumbed up based on block chain | |
CN110233852A (en) | Prize drawing data cochain method and its equipment based on block chain | |
CN110233853A (en) | It is a kind of to thumb up data cochain method and its equipment applied to block chain | |
CN110213294A (en) | By means of the community data cochain method and its equipment of block chain | |
CN110266691A (en) | Credit data cochain method and its equipment based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100085 No. 108, 1st Floor, No. 9, Shangdi Jiujie, Haidian District, Beijing Applicant after: Beijing ruice Technology Co., Ltd Address before: 100085 No. 108, 1st Floor, No. 9, Shangdi Jiujie, Haidian District, Beijing Applicant before: BEIJING AIMO RUICE TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190910 |
|
RJ01 | Rejection of invention patent application after publication |