Nothing Special   »   [go: up one dir, main page]

CN109255250A - A kind of data safety encryption device and application method based on alliance's chain - Google Patents

A kind of data safety encryption device and application method based on alliance's chain Download PDF

Info

Publication number
CN109255250A
CN109255250A CN201811110651.0A CN201811110651A CN109255250A CN 109255250 A CN109255250 A CN 109255250A CN 201811110651 A CN201811110651 A CN 201811110651A CN 109255250 A CN109255250 A CN 109255250A
Authority
CN
China
Prior art keywords
data
node
common
common recognition
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811110651.0A
Other languages
Chinese (zh)
Inventor
刘端阳
弓箭峰
赵敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Mobi Hi Ke Raspberry Intelligent Robot Co ltd
Original Assignee
Dalian Mobi Hike Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian Mobi Hike Intelligent Technology Co Ltd filed Critical Dalian Mobi Hike Intelligent Technology Co Ltd
Priority to CN201811110651.0A priority Critical patent/CN109255250A/en
Publication of CN109255250A publication Critical patent/CN109255250A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of data safety encryption devices and application method based on alliance's chain, pass through the alliance's chain being deployed on P2P peer-to-peer network, and it is connected to alliance's chain Common Gateway node or data input cell and data request unit on privately owned gateway node, form data safety encryption device;Data input cell has storage authorized certificate, and request of data unit has the reading authorized certificate of different stage;When carrying out data storage and reading, encryption or decryption are completed in node, and verifying authentication is completed on the common recognition node of alliance's chain, to complete the addition or reading to account book.

Description

A kind of data safety encryption device and application method based on alliance's chain
Technical field
The present invention relates to data safety field of storage, encrypt more particularly, to a kind of data safety based on alliance's chain Device and application method.
Background technique
The different demands used according to data, the data of circulation generally include the generaton number after initial data and working process According to, be related to data-application programming interface (application programming interface, API), data report, The different types of data resource commodity such as original data packet, technique algorithm, data application.Using in conjunction with different data needs It asks, data circulation ISP generallys use different circulation patterns, and such as only provider and party in request establish data circulation Or " intermediary's type " service of service relation;Autonomous acquisition data and " adopting production and marketing " type service for sale;It is further to data Working process generates valuable derivative data or application, and " processing service type " service externally provided.In these moulds that circulate Data providing and data party in request are not usually same entity under formula.
However, China's data circulate, especially transaction industry data circulate, and still suffer from serious problem, such as data Each link standard that Privacy Protection is extremely prominent, data ownership problem needs accurately to be defined, data circulate lacks unified Common recognition, invalid data transaction wildness etc..In addition, being peddled non-with the formal implementation of " People's Republic of China's network security method " Method data formally enter punishment.In the case where auxiliary law and standard are improved not to the utmost, many enterprises are numerous and confused to postpone in order to avoid risk Or reduce data circulation industry size.Data Circulation Industry faces maximum challenge in recent years, need be answered by new technology With the new guarantee of offer.
Block chain pattern avoids the defect of traditional mode.Any node can recorde authorization message, and can not change.It is more Side can Real-Time Sharing authority record, search efficiency is higher.In addition, authorizing business decoupling, it can be added and exit at any time.
Summary of the invention
It is an object of the invention to overcome drawbacks described above of the existing technology, a kind of data peace based on alliance's chain is provided Full encryption device and application method, by the alliance's chain being deployed on P2P peer-to-peer network, and are connected to alliance's chain Common Gateway Node or data input cell and data request unit on privately owned gateway node form data safety encryption device;Data are defeated Entering unit has storage authorized certificate, and request of data unit has the reading authorized certificate of different stage;Carrying out data storage It when with reading, completing to encrypt or decrypt in node, and complete verifying authentication on the common recognition node of alliance's chain, thus completion pair The addition or reading of account book.Node, the account book of alliance's chain are controllable and can be supervised to meet access demand, simultaneously Account book data are traceable and auditable.
To achieve the above object, technical scheme is as follows:
A kind of data safety encryption device based on alliance's chain, the data including P2P network and deployment on the p 2 p network are defeated Enter unit, alliance's chain and data request unit, which is characterized in that
Alliance's chain is safeguarded that the quantity of monitoring party is one or more, the quantity of participant by monitoring party and participant jointly For one or more;
The node of alliance's chain includes common recognition node, Common Gateway node, privately owned gateway node and data memory node;
Common recognition node is for mechanism of reaching common understanding;
Common Gateway node for connect data input cell and common recognition node, be also used for connection data request unit and altogether Know node;
Privately owned gateway node for connect data input cell and common recognition node, be also used for connection data request unit and altogether Know node, and the private key keeping function of localization is provided;
For storing data, the quantity of data memory node is one or more, data memory node to data memory node It is connected with any node or both the node in another data memory node, common recognition node;
Monitoring party is connected to common recognition node by privately owned gateway node;
Participant is connected to common recognition node by Common Gateway node.
Further, the data input cell or the request of data unit are the equipment that can be connected into internet.
Further, the data that the data input cell obtains have the characteristics that storage that is standardized, and having local Authorized certificate.
Further, the data input cell or the request of data unit pass through api interface and Common Gateway node Or privately owned gateway node is connected.
Further, the common recognition mechanism is POS machine system.
Further, the request of data unit has local reading authorized certificate.
Further, the authorized certificate that reads is the intelligent Contracts Definitions by legal bind.
A kind of application method of the data safety encryption device based on alliance's chain, which is characterized in that
When carrying out data input or adding, comprising the following steps:
S1-1: data input cell obtains data, and is processed into standardized format, is transmitted to Common Gateway node, simultaneously Storage authorized certificate is uploaded to common recognition node by Common Gateway node;
S1-2: Common Gateway node receives standardized data, while node of knowing together receives storage authorized certificate, is tested Card and common recognition ballot;
S1-3: if common recognition node is completed to verify and meets the polling request under common recognition mechanism, by corresponding encryption number According to being uploaded to data memory node and being encrypted, encryption data is formed, is included in account book, completes data input or additional;If The polling request that common recognition node is unable to complete verifying or is unsatisfactory under common recognition mechanism, then it is assumed that be invalid data;
When carrying out data acquisition, comprising the following steps:
S2-1: request of data unit initiate data acquisition request, by data acquisition request be uploaded to Common Gateway node or Privately owned gateway node, while common recognition node is uploaded to for authorized certificate is read by Common Gateway node or privately owned gateway node;
S2-2: common recognition node authenticate on chain, and whether the user of confirmation request of data unit, which has, meets data acquisition The permission of request;
S2-3: if meeting permission, data acquisition request is decomposed to and is uploaded to data memory node, data storage Node inquires account book data according to decomposition result, returns to Common Gateway node or privately owned by common recognition node again after obtaining result Gateway node, Common Gateway node or privately owned gateway node are decrypted and are integrated, and finally return to request of data unit, complete At data acquisition;Otherwise data acquisition request is returned.
Further, encryption method employed in the step S1-3 is national secret algorithm SM2, SM3 or SM4.
Further, the cipher mode of encryption method employed in the step S1-3 is by hardware encryption or homomorphism Encryption.
It can be seen from the above technical proposal that the present invention encrypts data by national secret algorithm, realize to data First layer protection, while by authority credentials ensure that data supplementing and reading permission be it is controllable, realize to data The second layer protection;At the same time, the source of data is retrospective, meets the needs of being supervised, being audited to data.Cause This, the present invention has while meeting data traffic travel, sufficiently ensures the distinguishing feature of data safety and supervision.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of data safety encryption device of the present invention;
Fig. 2 is the schematic diagram of data safety encryption device application method of the present invention;
Specific embodiment
With reference to the accompanying drawing, specific embodiments of the present invention will be described in further detail.
It should be noted that in following specific embodiments, when describing embodiments of the invention in detail, in order to clear Ground indicates structure of the invention in order to illustrate, spy does not draw to the structure in attached drawing according to general proportion, and has carried out part Amplification, deformation and simplified processing, therefore, should be avoided in this, as limitation of the invention to understand.
In specific embodiment of the invention below, Fig. 1~2 is please referred to, Fig. 1 is the structure of data safety encryption device Schematic diagram;Fig. 2 is the schematic diagram of data safety encryption device application method.
As shown in Figure 1, a kind of data safety encryption device based on alliance's chain, including P2P network and it is deployed in P2P network On data input cell, alliance's chain and data request unit, which is characterized in that
Alliance's chain is safeguarded that the quantity of monitoring party is one or more, the quantity of participant by monitoring party and participant jointly For one or more.
The node of alliance's chain includes common recognition node, Common Gateway node, privately owned gateway node and data memory node.
Common recognition node is for mechanism of reaching common understanding.
Common Gateway node for connect data input cell and common recognition node, be also used for connection data request unit and altogether Know node.
Privately owned gateway node for connect data input cell and common recognition node, be also used for connection data request unit and altogether Know node, and the private key keeping function of localization is provided.
For storing data, the quantity of data memory node is one or more, data memory node to data memory node Only it is connected with another data memory node or common recognition node.
In general, standardized interactive operation will become a feature of development late stage data exchange, and many data It is Legacy System, the interaction with standardized A PI can not be provided, so needs to reach this standardization using alternative.
Request of data unit is that mobile phone, computer, IPAD or other equipment that can be connected into internet, request of data unit have Local reading authorized certificate, request of data unit are connected by api interface with Common Gateway node or privately owned gateway node.It reads Taking authorized certificate is the intelligent Contracts Definitions by legal bind.
For common recognition node for mechanism of reaching common understanding, common recognition mechanism is POS machine system.
Common Gateway node for connect data input cell and common recognition node, be also used for connection data request unit and altogether Know node.
Privately owned gateway node for connect data input cell and common recognition node, be also used for connection data request unit and altogether Know node, and the private key keeping function of localization is provided.
For storing data, the quantity of data memory node is one or more, data memory node to data memory node Only it is connected with another data memory node or common recognition node.
Monitoring party is connected to common recognition node by privately owned gateway node.Monitoring party deployment common recognition and privately owned gateway node, it is right Public visit inquiry, as " depositing card publicity ".
Participant is connected to common recognition node by Common Gateway node.Participant only maintains Common Gateway node, by, altogether Know node and access alliance's chain, benefit is easy for voluntarily managing private key, and maintenance cost is low, but gateway node does not hold data.
In the embodiment of the present invention, the Floor layer Technology frame of alliance's chain follows the specification and mark of super account book Fabric project It is quasi-.Block chain pattern avoids the defect of traditional mode.Any node can recorde authorization message, and can not change.In many ways may be used With Real-Time Sharing authority record, search efficiency is higher.In addition, authorizing business decoupling, it can be added and exit at any time.Alliance's chain Build the effective cooperation for needing multiple functional units, these components include that network communication, block chain data structure, account book state are deposited Storage, transaction modules, intelligent contract performing environment, common recognition mechanism etc..In the present embodiment, expansible framework is followed in design Design and pluggable modular implementation.Each individually component can both select the default of Fabric to realize, can also be voluntarily Develop or introduce third-party realization.
Data keep safety in storage and analytic process because data can be inquired, but can only by digital identity with The permission of card is inquired, and the specific data operation of legal bind intelligence Contracts Definitions could be passed through.Data are generating it always Data repository node on encrypted.Importantly, each node has potential tamper-resistant distribution formula account book, so as to Management organization can audit to data access.
As shown in Fig. 2, a kind of application method of the data safety encryption device based on alliance's chain, which is characterized in that
When carrying out data input or adding, comprising the following steps:
S1-1: data input cell obtains data, and is processed into standardized format, and be transmitted to Common Gateway node, together When storage authorized certificate by Common Gateway node is uploaded to common recognition node;
S1-2: Common Gateway node receives standardized data, and is encrypted, and forms encryption data;
S1-3: if common recognition node is completed to verify and meets the polling request under common recognition mechanism, by corresponding encryption number According to being uploaded to data memory node and being encrypted, encryption data is formed, is included in account book, completes data input or additional;If The polling request that common recognition node is unable to complete verifying or is unsatisfactory under common recognition mechanism, then it is assumed that be invalid data.
Encryption method is national secret algorithm SM2/3/4.National secret algorithm is the series of algorithms that State Commercial Cryptography Administration formulates standard, with Financial security rise to national security height, the application of national secret algorithm is also more and more extensive, in November, 2017 SM2/9 formally into Enter ISO/IEC standard.The present embodiment supports the close SM2/3/4 of state, provides multiple encryption algorithms and selects to user, while meeting conjunction rule It is required that.
Encryption method can also be through hardware encryption or homomorphic cryptography.
In the rank of data repository node, data are encrypted by algorithm, and keep adding in storage and calculating process Close state, to tackle internal data theft.
When carrying out data acquisition, comprising the following steps:
S2-1: request of data unit initiate data acquisition request, by data acquisition request be uploaded to Common Gateway node or Privately owned gateway node, while common recognition node is uploaded to for authorized certificate is read by Common Gateway node or privately owned gateway node;
S2-2: common recognition node authenticate on chain, and whether the user of confirmation request of data unit, which has, meets data acquisition The permission of request;
S2-3: if meeting permission, data acquisition request is decomposed to and is uploaded to data memory node, data storage Node inquires account book data according to decomposition result, returns to Common Gateway node or privately owned by common recognition node again after obtaining result Gateway node, Common Gateway node or privately owned gateway node are decrypted and are integrated, and finally return to request of data unit, complete At data acquisition;Otherwise data acquisition request is returned.
Reading authorized certificate is the intelligent Contracts Definitions by legal bind.This is a kind of zero-knowledge proof, so-called zero Knowledge proof can make verifier in the case where not providing any useful information state to verifier to believe that the conclusion is correct , it was demonstrated that do not have to reveal the message being proved to verifier in the process.
Data repository is sent for the subquery after inquiry and decomposition by using Distributed Query Processing, substantially " algorithm is moved on into data ", so that each data repository is returned only to the polymerization result of identification.The data repository owner can To control the granularity of inquiry answer, to protect privacy.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (10)

1. a kind of data safety encryption device based on alliance's chain, the data input including P2P network and deployment on the p 2 p network Unit, alliance's chain and data request unit, which is characterized in that
Alliance's chain is safeguarded that the quantity of monitoring party is one or more by monitoring party and participant jointly, and the quantity of participant is one It is a or multiple;
The node of alliance's chain includes common recognition node, Common Gateway node, privately owned gateway node and data memory node;
Common recognition node is for mechanism of reaching common understanding;
Common Gateway node is also used for connection data request unit and common recognition section for connecting data input cell and common recognition node Point;
Privately owned gateway node is also used for connection data request unit and common recognition section for connecting data input cell and common recognition node Point, and the private key keeping function of localization is provided;
For storing data, the quantity of data memory node is one or more to data memory node, data memory node and another Any node in one data memory node, common recognition node or both node is connected;
Monitoring party is connected to common recognition node by privately owned gateway node;
Participant is connected to common recognition node by Common Gateway node.
2. the apparatus according to claim 1, which is characterized in that the data input cell or the request of data unit are The equipment that internet can be connected into.
3. the apparatus according to claim 1, which is characterized in that the data that the data input cell obtains have standardization The characteristics of, and there is local storage authorized certificate.
4. the apparatus according to claim 1, which is characterized in that the data input cell or the request of data unit are logical Api interface is crossed to be connected with Common Gateway node or privately owned gateway node.
5. the apparatus according to claim 1, which is characterized in that the common recognition mechanism is POS machine system.
6. the apparatus according to claim 1, which is characterized in that the request of data unit have local reading authorization with Card.
7. device according to claim 6, which is characterized in that the authorized certificate that reads is the intelligence by legal bind Contracts Definitions.
8. a kind of application method of the data safety encryption device based on alliance's chain, which is characterized in that
When carrying out data input or adding, comprising the following steps:
S1-1: data input cell obtains data, and is processed into standardized format, is transmitted to Common Gateway node, while will deposit It stores up authorized certificate and common recognition node is uploaded to by Common Gateway node;
S1-2: Common Gateway node receives standardized data, while node of knowing together receives storage authorized certificate, carry out verifying and Common recognition ballot;
S1-3:, will be in corresponding encryption data if common recognition node is completed to verify and meets the polling request under common recognition mechanism It reaches data memory node and is encrypted, form encryption data, be included in account book, complete data input or additional;If common recognition The polling request that node is unable to complete verifying or is unsatisfactory under common recognition mechanism, then it is assumed that be invalid data;
When carrying out data acquisition, comprising the following steps:
S2-1: request of data unit initiates data acquisition request, and data acquisition request is uploaded to Common Gateway node or privately owned Gateway node, while common recognition node is uploaded to for authorized certificate is read by Common Gateway node or privately owned gateway node;
S2-2: common recognition node authenticate on chain, and whether the user of confirmation request of data unit, which has, meets data acquisition request Permission;
S2-3: if meeting permission, data acquisition request is decomposed to and is uploaded to data memory node, data memory node Account book data are inquired according to decomposition result, Common Gateway node or privately owned gateway are returned to by common recognition node again after obtaining result Node, Common Gateway node or privately owned gateway node are decrypted and are integrated, and finally return to request of data unit, complete number According to acquisition process;Otherwise data acquisition request is returned.
9. according to the method described in claim 8, it is characterized in that, encryption method employed in the step S1-3 is that state is close Algorithm SM2, SM3 or SM4.
10. according to the method described in claim 8, it is characterized in that, encryption method employed in the step S1-3 adds Close mode is by hardware encryption or homomorphic cryptography.
CN201811110651.0A 2018-09-21 2018-09-21 A kind of data safety encryption device and application method based on alliance's chain Pending CN109255250A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811110651.0A CN109255250A (en) 2018-09-21 2018-09-21 A kind of data safety encryption device and application method based on alliance's chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811110651.0A CN109255250A (en) 2018-09-21 2018-09-21 A kind of data safety encryption device and application method based on alliance's chain

Publications (1)

Publication Number Publication Date
CN109255250A true CN109255250A (en) 2019-01-22

Family

ID=65048471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811110651.0A Pending CN109255250A (en) 2018-09-21 2018-09-21 A kind of data safety encryption device and application method based on alliance's chain

Country Status (1)

Country Link
CN (1) CN109255250A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110751485A (en) * 2019-10-28 2020-02-04 腾讯科技(深圳)有限公司 Data processing method and equipment
CN110912705A (en) * 2019-11-14 2020-03-24 山东师范大学 Distributed electronic voting method and system based on block chain
CN111402037A (en) * 2020-04-15 2020-07-10 中国银行股份有限公司 User data processing method and device
CN112019330A (en) * 2020-08-04 2020-12-01 广东省科技基础条件平台中心 Intranet security audit data storage method and system based on alliance chain
CN113014387A (en) * 2021-04-09 2021-06-22 杭州云象网络技术有限公司 Method for improving multidimensional encryption interface based on hardware encryption machine and encryption device
CN114154965A (en) * 2021-12-14 2022-03-08 数字未来(福建)信息科技有限公司 Collaborative law enforcement and case handling management method and system based on block chain
CN115622728A (en) * 2022-08-05 2023-01-17 贵州大学 Auditable alliance chain privacy protection scheme based on DLIN encryption

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150310067A1 (en) * 2014-04-28 2015-10-29 Red Hat, Inc. Method and system for providing security in a data federation system
CN107395403A (en) * 2017-07-07 2017-11-24 北京区块链云科技有限公司 A kind of fiduciary block chain common recognition method suitable for extensive ecommerce
CN107679857A (en) * 2017-10-10 2018-02-09 马晶瑶 Across the chain method of commerce and storage medium of block chain
CN107733855A (en) * 2017-08-31 2018-02-23 中国科学院信息工程研究所 A kind of block catenary system and application process that can support publicly-owned chain, alliance's chain and privately owned chain simultaneously
CN108021821A (en) * 2017-11-28 2018-05-11 北京航空航天大学 Multicenter block chain transaction intimacy protection system and method
CN108022090A (en) * 2017-12-18 2018-05-11 深圳前海微众银行股份有限公司 Virtual account management method, equipment, system and readable storage medium storing program for executing
US10020936B1 (en) * 2015-02-05 2018-07-10 Ionic Security Inc. Systems and methods for encryption and provision of information security using platform services

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150310067A1 (en) * 2014-04-28 2015-10-29 Red Hat, Inc. Method and system for providing security in a data federation system
US10020936B1 (en) * 2015-02-05 2018-07-10 Ionic Security Inc. Systems and methods for encryption and provision of information security using platform services
CN107395403A (en) * 2017-07-07 2017-11-24 北京区块链云科技有限公司 A kind of fiduciary block chain common recognition method suitable for extensive ecommerce
CN107733855A (en) * 2017-08-31 2018-02-23 中国科学院信息工程研究所 A kind of block catenary system and application process that can support publicly-owned chain, alliance's chain and privately owned chain simultaneously
CN107679857A (en) * 2017-10-10 2018-02-09 马晶瑶 Across the chain method of commerce and storage medium of block chain
CN108021821A (en) * 2017-11-28 2018-05-11 北京航空航天大学 Multicenter block chain transaction intimacy protection system and method
CN108022090A (en) * 2017-12-18 2018-05-11 深圳前海微众银行股份有限公司 Virtual account management method, equipment, system and readable storage medium storing program for executing

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110751485A (en) * 2019-10-28 2020-02-04 腾讯科技(深圳)有限公司 Data processing method and equipment
CN110751485B (en) * 2019-10-28 2021-08-17 腾讯科技(深圳)有限公司 Data processing method and equipment
CN113506110A (en) * 2019-10-28 2021-10-15 腾讯科技(深圳)有限公司 Data processing method and equipment
CN110912705A (en) * 2019-11-14 2020-03-24 山东师范大学 Distributed electronic voting method and system based on block chain
CN110912705B (en) * 2019-11-14 2022-07-05 山东师范大学 Distributed electronic voting method and system based on block chain
CN111402037A (en) * 2020-04-15 2020-07-10 中国银行股份有限公司 User data processing method and device
CN112019330A (en) * 2020-08-04 2020-12-01 广东省科技基础条件平台中心 Intranet security audit data storage method and system based on alliance chain
CN112019330B (en) * 2020-08-04 2024-03-29 广东省科技基础条件平台中心 Intranet security audit data storage method and system based on alliance chain
CN113014387A (en) * 2021-04-09 2021-06-22 杭州云象网络技术有限公司 Method for improving multidimensional encryption interface based on hardware encryption machine and encryption device
CN113014387B (en) * 2021-04-09 2022-07-19 杭州云象网络技术有限公司 Method for improving multidimensional encryption interface based on hardware encryption machine and encryption device
CN114154965A (en) * 2021-12-14 2022-03-08 数字未来(福建)信息科技有限公司 Collaborative law enforcement and case handling management method and system based on block chain
CN115622728A (en) * 2022-08-05 2023-01-17 贵州大学 Auditable alliance chain privacy protection scheme based on DLIN encryption

Similar Documents

Publication Publication Date Title
CN109255250A (en) A kind of data safety encryption device and application method based on alliance's chain
Yu et al. A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings
US11397829B2 (en) Method for handling privacy data
CN108418680B (en) Block chain key recovery method and medium based on secure multi-party computing technology
US20180041520A1 (en) Data access method based on cloud computing platform, and user terminal
CN104718526A (en) Secure mobile framework
CN112733121B (en) Data acquisition method, device, equipment and storage medium
CN110474921B (en) Perception layer data fidelity method for local area Internet of things
CN110191153A (en) Social communication method based on block chain
CN100514333C (en) Data base safety access method and system
CN112487443A (en) Energy data fine-grained access control method based on block chain
CN114547583A (en) Identity authentication system, method, device, equipment and computer readable storage medium
CN111008855B (en) Retrospective data access control method based on improved proxy re-encryption
CN109446259A (en) Data processing method and device, processor and storage medium
CN115840683B (en) Heterogeneous alliance chain monitoring method, system, device, equipment and storage medium
CN111597583B (en) Data sharing and exchanging method based on block chain
Kiruthika et al. Fusion of IoT, blockchain and artificial intelligence for developing smart cities
Prada-Delgado et al. A blockchain-based crypto-anchor platform for interoperable product authentication
CN113259084A (en) Method and device for pre-warning of mortgage risk of movable property, computer equipment and storage medium
KR102219018B1 (en) Blockchain based data transmission method in internet of things
CN111931230A (en) Data authorization method and device, storage medium and electronic device
CN117056984A (en) Method, system, computer equipment and storage medium for data security calculation
US12130941B2 (en) Method for handling privacy data
CN110492997A (en) A kind of encryption system based on super account book, method, apparatus and storage medium
CN116089968A (en) Scientific data sharing method and system based on blockchain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200429

Address after: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A

Applicant after: Shenzhen Mobi hi Ke raspberry intelligent robot Co.,Ltd.

Address before: Room 301, Room 3, Pioneer Port E, No. 1, Dalian High-tech Industrial Park, Liaoning Province, 116000

Applicant before: DALIAN MOBI HAIKE INTELLIGENT TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200731

Address after: Room 107, building a, Chuangye No.1 building, No.43 Yanshan Road, Yanshan community, zhaoshang street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen mobihaike data intelligent technology Co.,Ltd.

Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A

Applicant before: Shenzhen Mobi hi Ke raspberry intelligent robot Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201222

Address after: 1504, building 1, shuimuyifang building, 286 Nanguang Road, dawangshan community, Nantou street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Mobi hi Ke raspberry intelligent robot Co.,Ltd.

Address before: Room 107, building a, Chuangye No.1 building, No.43 Yanshan Road, Yanshan community, zhaoshang street, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: Shenzhen mobihaike data intelligent technology Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190122