CN112532395B - Block chain-based data credit system, method and medium - Google Patents

Block chain-based data credit system, method and medium Download PDF

Info

Publication number
CN112532395B
CN112532395B CN202011349830.7A CN202011349830A CN112532395B CN 112532395 B CN112532395 B CN 112532395B CN 202011349830 A CN202011349830 A CN 202011349830A CN 112532395 B CN112532395 B CN 112532395B
Authority
CN
China
Prior art keywords
data
blockchain
uploading
trust
unit configured
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011349830.7A
Other languages
Chinese (zh)
Other versions
CN112532395A (en
Inventor
赵亮
张鹏
杨文韬
雷富强
张驰
甄君
程骏超
金群昊
王强
杨珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Zhigui Internet Technology Co ltd
CSSC Systems Engineering Research Institute
Original Assignee
Xi'an Zhigui Internet Technology Co ltd
CSSC Systems Engineering Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Zhigui Internet Technology Co ltd, CSSC Systems Engineering Research Institute filed Critical Xi'an Zhigui Internet Technology Co ltd
Priority to CN202011349830.7A priority Critical patent/CN112532395B/en
Publication of CN112532395A publication Critical patent/CN112532395A/en
Application granted granted Critical
Publication of CN112532395B publication Critical patent/CN112532395B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data trust system, a data trust method and a data trust medium based on a block chain. Wherein the system comprises: a data acquisition unit configured to: collecting original data from an offshore terminal, and encrypting and signing the data according to a hardware-based embedded equipment private key to obtain first data; a data transmission unit configured to: introducing a third party supervision service based on a prophetic machine to audit the first data in transmission; a data-holding unit configured to: receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the blockchain; and a data use unit configured to: and writing access rights in the second data, and automatically executing access to the data through intelligent contracts in the blockchain.

Description

Block chain-based data credit system, method and medium
Technical Field
The present invention relates to the field of blockchain, and in particular, to a blockchain-based data trust system, method and medium.
Background
In complex marine environments, communication and co-operation between devices is important. In the prior art, a centralized information system construction scheme is often adopted, a communication hub service is used as a center, communication individuals are connected to the communication hub for information interaction and collaboration, and the information interaction among the communication individuals needs to be forwarded by the communication hub. Such a centralized system can realize complex environmental communication, but is faced with great potential safety hazards, and once the centralized communication hub is attacked maliciously, the whole system is faced with the risk of paralysis. The adoption of the blockchain technology can solve the trust reconstruction and the trusted interaction in the unequal trust mode in the complex environment, and solve the security problem faced by the centralized communication hub.
Networking technology is network construction technology. There are many types of computer networks, and different classification bases are available according to different networking technologies. The network can be divided into according to the switching technology: circuit switched networks, packet switched networks. The transmission technology can be divided into: broadcast network, non-broadcast multiple access network, point-to-point network. Topology can be divided into bus, star, ring, tree, full mesh, and partial mesh networks. The transmission medium can be divided into wired network and wireless network. The wired network refers to a network formed by connecting coaxial cables, twisted pair wires and optical fibers. Wireless networks refer to a type of network that uses an electromagnetic wave as a carrier to effect data transmission. Offshore equipment is mainly a wireless broadcast network and is in security considerations, typically a local area network.
As shown in fig. 1, the conventional offshore equipment networking system mostly adopts a tree structure, an upper-level processing unit is a root node, and a lower-level processing unit is a leaf node. A typical networking system is shown in the figures above. The root node is responsible for collecting and summarizing data and is connected with each leaf node; and on the other hand, the land terminal is connected, and the land terminal is fed back according to the data acquisition and analysis results to carry out decision support of related actions.
The offshore equipment networking system of the tree model has obvious advantages of centralized rights, clear instructions, smooth information and clear responsibilities, can clearly define the structure of the whole system, and is easy to increase and reduce certain organization. However, the system has obvious defects, and how to ensure that the sensor on the offshore terminal equipment can reliably transmit data in the weakly connected and weakly coordinated offshore complex environment becomes a current urgent problem to be solved.
Disclosure of Invention
The invention aims to provide a data trust scheme based on a block chain so as to solve the technical problems in the prior art.
The first aspect of the present invention provides a blockchain-based data trust system, the system comprising: a data acquisition unit configured to: collecting original data from an offshore terminal, and encrypting and signing the data according to a hardware-based embedded equipment private key to obtain first data; a data transmission unit configured to: introducing a third party supervision service based on a prophetic machine to audit the first data in transmission; a data-holding unit configured to: receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the blockchain; and a data use unit configured to: and writing access rights in the second data, and automatically executing access to the data through intelligent contracts in the blockchain.
According to the system provided by the first aspect of the invention, the hardware-based embedded equipment private key is U shield and is used for verifying the offshore terminal.
According to the system provided by the first aspect of the invention, the propulsor supports communication with the server based on https protocol, and provides monitoring evidence of the data acquisition service to the third party supervision service.
According to the system provided by the first aspect of the invention, the data certification unit is specifically configured to certify the first data based on the hash map and verify the certified second data based on the certification consensus.
The second aspect of the present invention provides a blockchain-based data trust method, the method comprising: s1, acquiring original data from an offshore terminal, and encrypting and signing the data according to an embedded equipment private key based on hardware to obtain first data; s2, introducing a third party supervision service based on a prophetic machine to audit the first data in transmission; s3, receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the block chain; and step S4, writing access rights in the second data, and automatically executing access to the data through the intelligent contracts in the blockchain.
According to the method provided by the second aspect of the invention, the private key of the embedded equipment based on hardware is U shield, which is used for verifying the offshore terminal.
According to the method provided by the second aspect of the invention, the propulsor supports communication with the server based on https protocol, and provides monitoring evidence of the data acquisition service to the third party supervision service.
According to the method provided in the second aspect of the present invention, in the step S3, the first data is authenticated based on the hash map, and the authenticated second data is authenticated based on the authentication consensus.
A third aspect of the present invention provides a non-transitory computer readable medium storing instructions which, when executed by a processor, perform the steps of a blockchain-based data trust method according to the second aspect of the present invention.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings which are required in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are some embodiments of the invention and that other drawings may be obtained from these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a tree structure of a conventional offshore equipment networking system;
FIG. 2 is a schematic diagram of a block chain based data trust scheme according to an embodiment of the invention;
FIG. 3 is a block chain based data trust system architecture according to an embodiment of the invention;
FIG. 4 is a schematic diagram of a flow of intelligent contract invocation foreseeing machine contracts, in accordance with an embodiment of the present invention;
FIG. 5 is a block chain certification flow according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a data access control flow according to an embodiment of the present invention; and
FIG. 7 is a flow chart of a method for blockchain-based data trust in accordance with an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made apparent and fully in view of the accompanying drawings, in which some, but not all embodiments of the invention are shown. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The data trust scheme based on the blockchain is adopted in the method, as shown in fig. 2, and the method is used for realizing the trust assurance of the full life cycle of the offshore terminal data through technical means and process optimization around four aspects of data trust acquisition, trust transmission, trust storage and trusted use.
The first aspect of the present invention provides a blockchain-based data trust system. FIG. 3 is a block chain based data trust system architecture according to an embodiment of the invention; as shown in fig. 3, the system includes: a data acquisition unit 301 configured to: collecting original data from an offshore terminal, and encrypting and signing the data according to a hardware-based embedded equipment private key to obtain first data; a data transmission unit 302 configured to: introducing a third party supervision service based on a prophetic machine to audit the first data in transmission; a data-holding unit 303 configured to: receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the blockchain; and a data use unit 304 configured to: and writing access rights in the second data, and automatically executing access to the data through intelligent contracts in the blockchain.
The data collection unit 301 encrypts and signs the data collected by the offshore terminal by using the hardware-based embedded device private key, so as to ensure that the collected content is not tamperable and can not be repudiated. In some embodiments, the hardware-based embedded device private key is a U-shield used to authenticate the offshore terminal. The offshore terminal is verified through a U shield, wherein the U shield is hardware private key equipment and is used for storing the unique identity of the equipment. The private key information of the device after the U shield is adopted is not stored on the network any more and only exists in the U shield, and when the device joins the network, whether the public key of the device is matched is verified through the private key in the U shield. When a device sends collected data to the blockchain network, the blockchain network may require the terminal device to store the device signature using the hardware private key. The terminal equipment needs to sign and endorse the acquired data, the network can interact data and business with the terminal after obtaining the data with the sign confirmation, and synchronize the data with other terminals in block information, and the data can be written into the whole network after the whole block chain is agreed. The secure private key storage device supports secure CPU kernel, hardware true random number, cryptographic algorithm and USB/7816 interface, and can realize functions of private key generation, signature, public key export, PIN code verification, recovery word import and export, and the like.
The data transmission unit 302 introduces a third party supervision service by using a prophetic machine technology, audits the transmission process, and claims an audit report to ensure the safety and the reliability of the transmission process. In some embodiments, the propulsor supports https protocol-based communications with a server and provides monitoring evidence of the data acquisition service to the third party regulatory service. The predictor technology is used for guaranteeing the credibility of the data transmission process, and corresponding predictor certificates are generated for proving the credibility of the data transmission process through audit and certificate number service from credible computing hardware. The predictive engine needs to provide two independent service modules for data transmission and process audit, and the two modules interact with a data source together to complete data transmission and recording. The data transmission service support and the server are required to pass through https protocol, and are compatible with different versions of communication rules such as TLS 1.0-1.2. The process audit service is required to run in a trusted computing environment, and can provide monitoring evidence for a single data acquisition service for any third party to audit.
As shown in fig. 4, the on-chain smart contract performs trusted off-chain data transfer by invoking a foreshadowing machine contract. The transmission data and audit information obtained by the prophetic contract are provided by both an audit service and a data transmission (uplink) module. The two modules interact with a trusted data source together, one is responsible for data transmission, and the other is responsible for supervising the acquisition process. The verification mechanism is introduced to restrict a data transmission (uplink) service provider, a certain cryptography method is adopted, on the premise of not influencing normal network communication, the uplink service is ensured to be restricted to be capable of only transmitting data provided by a trusted data source (avoiding maliciousness), and the restriction process can be verified.
Entering a propranolol certificate verification page, uploading the propranolol certificate from the local, clicking the propranolol certificate to start the verification of the propranolol certificate, and dividing the verification of the certificate into six verification links: an effective certification format; an effective server public key; a valid certificate key; effectively auditing the signature; a valid encryption server response; effectively decrypting the corresponding content. And when all six items of verification pass, the certificate verification passes, otherwise, the certificate verification fails. The certificate passes verification, and the data transmission process is represented to be true and reliable, otherwise, the data transmission has problems, and further the user is prompted to further check the data acquisition equipment and the data transmission service.
The data storage and certification unit 303 uses the blockchain technology to store and certify the collected data, and adds a time stamp and uploading equipment/personnel information to ensure the credibility of data storage. In a complex offshore environment, information interaction between terminals is frequent, and aiming at information security, data confidentiality, data evidence storage and postmortem summarization under the scene, the system builds an evidence storage chain on the basis of an offshore blockchain terminal network, so that real-time chain evidence storage of data information in the offshore complex environment is realized. Through technical characteristics of common block chain knowledge, non-falsification, safety, transparency and the like, the system is helped to realize data storage, and a trusted data source is provided for post-hoc data carding, summarizing and analyzing.
The business flow of the certification chain is shown in fig. 5, and mainly comprises several stages of data production, data hashing, data uplink, data consensus and data verification. 1) Data production; the method comprises the steps of generating data in individual equipment according to the needs of the offshore individual equipment and storing the data locally. 2) Data hashing; the data itself is not used as the information of the on-chain certificate, but the hash value of the data is required to implement the on-chain certificate operation. The data hash is in one-to-one correspondence with the data file. After the data is produced, the data hash calculation is needed to be completed locally. 3) The certificate is linked; after the data hash calculation is completed, the data hash is completed through the local block link point, and a consensus request is sent to the network. 4) Identification of the existence of the syndrome; in the evidence storage and consensus phase, each node in the blockchain network confirms and endorses the evidence storage, and after the consensus process is completed, each node uniformly records the hash account book of the evidence storage information of various data. 5) Verifying the certificate; in the post analysis process, each node in the blockchain network stores various information materials and circulation records of the information. Through extraction and comparison of the file and the on-chain evidence storage information, verification, carding and analysis of data can be completed, and trusted data support is provided for post analysis. As a bottom layer supporting environment for information storage, the blockchain system needs to have the characteristics of high concurrency, non-falsification, data security privacy and the like so as to ensure the timely storage of complex data and the requirements of post-data verification and analysis.
The data usage unit 304 writes the authority of the data, the authority of the user main body and the security access control rule into the blockchain, and automatically executes the data through the intelligent contract to ensure the credibility of the data usage process. In order to strengthen the safe access control of intelligent terminal data and services in the interactive scene of the offshore terminal, the invention builds a safe access control mechanism based on a blockchain, realizes effective authority control on sensitive data, executive services and results thereof, truly and comprehensively records, provides relevant evidence and audit management supporting means for responsibility tracking for terminal services, and realizes data trusted use.
As shown in fig. 6, an application layer on the terminal initiates a micro service call request through a micro service management module; the management module performs security access control detection through the block chain; the block chain stores all user rights, all registered service rights and the matching relation of the user rights and the registered service rights, and automatically executes security access control through intelligent contracts; the dynamic audit module exists in all terminals and records and reports micro service requests, calls and used conditions on the terminals; the on-chain audit analysis system is responsible for full life cycle monitoring audit of all micro services.
The whole flow comprises the following steps: the application layer initiates a micro-service call request to the micro-service management module; the micro-service management module initiates a verification request to the blockchain to verify whether the security access control rule is met; after verifying whether the block chain accords with the safety access control rule, returning corresponding approval information to the micro-service management module; the micro-service management module returns approval information to the application layer; the micro-service management module reports approval information to the on-chain audit analysis system; after the micro-service management module agrees, the application layer initiates a request to the micro-service party, and the request flows through the dynamic audit module of the request party and the dynamic audit module of the service party; the dynamic audit module of the requesting party performs compliance checking, and the log is forwarded after being kept; the dynamic audit module of the requesting party reports the log to the dynamic audit analysis system on the chain; the server side dynamic audit module performs compliance checking, and the log is forwarded after being kept; and the server side dynamic audit module reports the log to a dynamic audit analysis background.
A second aspect of the present invention provides a blockchain-based data trust method. FIG. 7 is a flow chart of a blockchain-based data trust method according to an embodiment of the invention, as shown in FIG. 7, the method comprising: s1, acquiring original data from an offshore terminal, and encrypting and signing the data according to an embedded equipment private key based on hardware to obtain first data; s2, introducing a third party supervision service based on a prophetic machine to audit the first data in transmission; s3, receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the block chain; and step S4, writing access rights in the second data, and automatically executing access to the data through the intelligent contracts in the blockchain.
According to the method provided by the second aspect of the invention, the private key of the embedded equipment based on hardware is U shield, which is used for verifying the offshore terminal.
According to the method provided by the second aspect of the invention, the propulsor supports communication with the server based on https protocol, and provides monitoring evidence of the data acquisition service to the third party supervision service.
According to the method provided in the second aspect of the present invention, in the step S3, the first data is authenticated based on the hash map, and the authenticated second data is authenticated based on the authentication consensus.
A third aspect of the present invention provides a non-transitory computer readable medium storing instructions which, when executed by a processor, perform the steps of a blockchain-based data trust method according to the second aspect of the present invention.
In summary, the blockchain-based data trust scheme provided by the present disclosure has the following technical advantages: 1) Through the excellent shield, the reliable identification of the offshore terminal identity and the reliable collection of data are realized; 2) The reliable transmission of the offshore terminal data is realized through the predictor; 3) And through a predictor certificate verification technology, the reliability verification of the data transmission process is realized. The method comprises the steps of carrying out a first treatment on the surface of the 4) The data trusted memory card is realized through data hash, timestamp and acquisition equipment/personnel information uplink; 5) Automatically executing a security access control strategy through an intelligent contract to realize data trusted use; and 6) realizing the trusted traceability audit by the uplink of the data full life cycle circulation record.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.

Claims (5)

1. A blockchain-based data trust system, the system comprising:
a data acquisition unit configured to: collecting original data from an offshore terminal, and encrypting and signing the data according to a hardware-based embedded equipment private key to obtain first data;
a data transmission unit configured to: introducing a third party supervision service based on a prophetic machine to audit the first data in transmission;
a data-holding unit configured to: receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the blockchain, wherein the uploading information is uploading equipment/personnel information; and
a data use unit configured to: writing access rights in the second data, and automatically executing access to the data through intelligent contracts in the blockchain;
the predictor supports communication with a server based on https protocol, and provides monitoring evidence for data acquisition service to the third party supervision service;
the data certification unit is specifically configured to certify the first data based on hash mapping, and verify the certified second data based on certification consensus.
2. The blockchain-based data trust system of claim 1, wherein the hardware-based embedded device private key is a U-shield for authenticating the offshore terminal.
3. A blockchain-based data trust method, the method comprising:
s1, acquiring original data from an offshore terminal, and encrypting and signing the data according to an embedded equipment private key based on hardware to obtain first data;
s2, introducing a third party supervision service based on a prophetic machine to audit the first data in transmission;
s3, receiving the first data, storing the first data, adding a time stamp and uploading information to obtain second data, and uploading the second data to the blockchain, wherein the uploading information is uploading equipment/personnel information; and
s4, writing access rights in the second data, and automatically executing access to the data through intelligent contracts in the blockchain;
the predictor supports communication with a server based on https protocol, and provides monitoring evidence for data acquisition service to the third party supervision service;
in the step S3, the first data is authenticated based on the hash map, and the authenticated second data is authenticated based on the authentication consensus.
4. A blockchain-based data trust method according to claim 3, wherein the hardware-based embedded device private key is a U-shield for authenticating the offshore terminal.
5. A non-transitory computer readable medium storing instructions which, when executed by a processor, perform the steps of the blockchain-based data trust method of any of claims 3-4.
CN202011349830.7A 2020-11-26 2020-11-26 Block chain-based data credit system, method and medium Active CN112532395B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011349830.7A CN112532395B (en) 2020-11-26 2020-11-26 Block chain-based data credit system, method and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011349830.7A CN112532395B (en) 2020-11-26 2020-11-26 Block chain-based data credit system, method and medium

Publications (2)

Publication Number Publication Date
CN112532395A CN112532395A (en) 2021-03-19
CN112532395B true CN112532395B (en) 2024-02-27

Family

ID=74993758

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011349830.7A Active CN112532395B (en) 2020-11-26 2020-11-26 Block chain-based data credit system, method and medium

Country Status (1)

Country Link
CN (1) CN112532395B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114969835B (en) * 2022-08-01 2022-10-25 北京笔新互联网科技有限公司 Webpage information evidence storing method and device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108964905A (en) * 2018-07-18 2018-12-07 胡祥义 A kind of safe and efficient block chain implementation method
CN110287739A (en) * 2019-06-17 2019-09-27 西安纸贵互联网科技有限公司 Data safety control method and system based on hardware private keys memory technology
CN110581854A (en) * 2019-09-12 2019-12-17 北京笔新互联网科技有限公司 intelligent terminal safety communication method based on block chain
CN111080292A (en) * 2019-11-25 2020-04-28 支付宝(杭州)信息技术有限公司 Method and device for acquiring block chain transaction signature data
CN111368953A (en) * 2020-03-10 2020-07-03 大仝智能科技有限公司 Product anti-counterfeiting traceability system and method
CN111475574A (en) * 2020-04-09 2020-07-31 成都九宽科技有限公司 Data acquisition device based on block chain
CN111737654A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
WO2020207090A1 (en) * 2019-04-12 2020-10-15 创新先进技术有限公司 Blockchain-based data processing system and method, computing device and storage medium
CN111798209A (en) * 2020-06-30 2020-10-20 远光软件股份有限公司 Engineering project management method based on block chain, electronic equipment and storage medium
CN111930852A (en) * 2020-09-29 2020-11-13 北京百度网讯科技有限公司 Data processing method, device and equipment based on block chain and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11461768B2 (en) * 2017-08-21 2022-10-04 American Express Travel Related Services Company, Inc. Systems and methods for data file transfer balancing and control on blockchain

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108964905A (en) * 2018-07-18 2018-12-07 胡祥义 A kind of safe and efficient block chain implementation method
WO2020207090A1 (en) * 2019-04-12 2020-10-15 创新先进技术有限公司 Blockchain-based data processing system and method, computing device and storage medium
CN110287739A (en) * 2019-06-17 2019-09-27 西安纸贵互联网科技有限公司 Data safety control method and system based on hardware private keys memory technology
CN110581854A (en) * 2019-09-12 2019-12-17 北京笔新互联网科技有限公司 intelligent terminal safety communication method based on block chain
CN111080292A (en) * 2019-11-25 2020-04-28 支付宝(杭州)信息技术有限公司 Method and device for acquiring block chain transaction signature data
CN111368953A (en) * 2020-03-10 2020-07-03 大仝智能科技有限公司 Product anti-counterfeiting traceability system and method
CN111475574A (en) * 2020-04-09 2020-07-31 成都九宽科技有限公司 Data acquisition device based on block chain
CN111798209A (en) * 2020-06-30 2020-10-20 远光软件股份有限公司 Engineering project management method based on block chain, electronic equipment and storage medium
CN111737654A (en) * 2020-08-14 2020-10-02 支付宝(杭州)信息技术有限公司 Infringement detection method and device based on block chain and electronic equipment
CN111930852A (en) * 2020-09-29 2020-11-13 北京百度网讯科技有限公司 Data processing method, device and equipment based on block chain and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链在广电的安全应用研究;冯晴;薛静宜;吴钟乐;宫良;;广播与电视技术(04);全文 *

Also Published As

Publication number Publication date
CN112532395A (en) 2021-03-19

Similar Documents

Publication Publication Date Title
US11973750B2 (en) Federated identity management with decentralized computing platforms
Qi et al. Cpds: Enabling compressed and private data sharing for industrial Internet of Things over blockchain
Vangala et al. Blockchain-enabled authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks
Dehalwar et al. Blockchain-based trust management and authentication of devices in smart grid
CN101674304A (en) Network identity authentication system and method
CN113515756B (en) High-credibility digital identity management method and system based on block chain
Fan et al. Identity Management Security Authentication Based on Blockchain Technologies.
CN117313122A (en) Data sharing and exchanging management system based on block chain
CN114357492A (en) Medical data privacy fusion method and device based on block chain
Marian et al. Experimenting with digital signatures over a DNP3 protocol in a multitenant cloud-based SCADA architecture
Qiang et al. Mine consortium blockchain: the application research of coal mine safety production based on blockchain
Zhao et al. TrustCA: achieving certificate transparency through smart contract in blockchain platforms
CN112532395B (en) Block chain-based data credit system, method and medium
Gao et al. BFR‐SE: A Blockchain‐Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine‐Grained Access Control in Cloud Environment
CN113205345A (en) Agricultural product certificate tracing system based on Ether house block chain technology and tracing method thereof
CN113792301A (en) Block chain-based Internet of things data access method and device
US20100030805A1 (en) Propagating information from a trust chain processing
Duan et al. An edge cloud data integrity protection scheme based on Blockchain
CN116684160A (en) Public service litigation data security sharing and privacy protecting method and system
Cheng et al. Ocean data sharing based on blockchain
Wang et al. A User‐Centered Medical Data Sharing Scheme for Privacy‐Preserving Machine Learning
Lu et al. Secure and Real Time Traceable Data Sharing in Cloud-Assisted IoT
Chen et al. Cloud service platform of electronic identity in cyberspace
Dong et al. ETSB: energy trading system based on blockchain
Gu et al. IoT security and new trends of solutions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant