[go: up one dir, main page]

CN108848081A - The data sharing method of verification and integral incentive mechanism is stored based on alliance's chain - Google Patents

The data sharing method of verification and integral incentive mechanism is stored based on alliance's chain Download PDF

Info

Publication number
CN108848081A
CN108848081A CN201810555897.2A CN201810555897A CN108848081A CN 108848081 A CN108848081 A CN 108848081A CN 201810555897 A CN201810555897 A CN 201810555897A CN 108848081 A CN108848081 A CN 108848081A
Authority
CN
China
Prior art keywords
data
network
information
party
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810555897.2A
Other languages
Chinese (zh)
Inventor
张燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Way Technology Co Ltd
Original Assignee
Shenzhen Way Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Way Technology Co Ltd filed Critical Shenzhen Way Technology Co Ltd
Priority to CN201810555897.2A priority Critical patent/CN108848081A/en
Publication of CN108848081A publication Critical patent/CN108848081A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention discloses a kind of data sharing method that verification and integral incentive mechanism are stored based on alliance's chain, and first network node is built by member mechanism, and service node extracts the characteristic information of data, and data and characteristic information are sent to middleware layer;Middleware layer calibration feature information sends the file to BT node and synchronizes operation, and according to corresponding the second network node for generating storage integration information of first network node;To the file attachment of BT node is synchronized to, cochain marks middleware layer, service request, which is sent, to respective first network node by service node carries out the whole network broadcast, and according to the whole network common recognition result and/or the service request type of transmission, the corresponding integration information adjusted in the second network node associated with the service request type.By the way that mechanism will be integrated applied in alliance's chain technology, valuable data are shared on alliance's chain with the timely active of Cu Shige member mechanism, improve the scale and value of data sharing.

Description

Data sharing method based on alliance chain storage check and integral excitation mechanism
Technical Field
The invention relates to the technical field of data exchange, in particular to a data sharing method based on a coalition chain storage check and integral excitation mechanism.
Background
With the rise of big data methodology, both academia and industry began to attach importance to the role of data. However, as the basis of big data methodology, the development of data resources is always a project consuming a lot of manpower and material resources, and relates to a series of processes such as data acquisition, arrangement, analysis and application, and benefits from the development of internet technology, and although each organization can crawl a lot of data from the network, most network data lacks direct value, and the authenticity of the network data is to be testified, so that a lot of cleaning work is required. In fact, the most valuable real data are often dispersed inside each organization, and if an effective data sharing method is provided, so that the valuable data can be actively shared, the pressure of data resource development can be greatly relieved.
In recent years, although a data sharing method based on the blockchain technology is widely mentioned, and a data trust mechanism is established to improve the efficiency of data sharing so as to solve the problems of security and accuracy of shared data, in practical application, due to the lack of a sufficient incentive mechanism to motivate an organization to upload data, the scale and value of sharable data are greatly limited.
Disclosure of Invention
The invention aims to provide a data sharing method based on a storage check and integral incentive mechanism of a alliance chain, which is used for promoting each member mechanism to timely and actively share valuable data on the alliance chain by applying an integral mechanism to the alliance chain technology, so that the scale and the value of data sharing are improved.
In order to achieve the above object, an aspect of the present invention provides a data sharing method based on a federation chain storage checksum and integral incentive mechanism, including:
step S1, the member organizations set up the corresponding service nodes and the first network nodes for storing the data information, the first network nodes to which the member organizations belong are sequentially accessed into the first alliance network to establish a first alliance chain, meanwhile, the service nodes extract the characteristic information of the data, and the data and the characteristic information are sent to the middleware layer;
step S2, the middleware layer checks the characteristic information, after the check is passed, the file is sent to the BT node to carry out synchronous operation, and a second network node for storing integral information is generated according to the first network node, each second network node is sequentially connected to a second alliance network to construct a second alliance chain, and after the synchronous operation is completed, the middleware layer writes the characteristic information into the second alliance chain node;
step S3, after the writing is finished, the middleware layer attaches the uplink mark to the file synchronized to the BT node, sends the service request to the respective first network node through the service node for whole network broadcasting, and correspondingly adjusts the point information in the second network node associated with the service request type according to the whole network consensus result and/or the sent service request type;
the service request types comprise a data uploading request, a data deleting request, a data inquiring request and a member complaint request.
Specifically, the method for constructing the first alliance chain by building the corresponding service node and the first network node storing the data information by the member enterprises in step S1 and sequentially accessing the first network node to which each member enterprise belongs to the first alliance network includes:
generating first digital authentication certificates corresponding to the member organizations one by one, and returning the first digital authentication certificates to the corresponding member organizations;
respectively building a first network node and a service node according to the first digital authentication certificate, and sequentially accessing the first network node to which each member institution belongs to a first alliance network to build a first alliance chain;
the data information is divided into organization information and shared data information, wherein the organization information comprises organization ID and complaint identification, and the shared data information comprises an index value, a main key and a detail ciphertext. Further, the method for sequentially accessing each second network node to the second alliance network to construct the second alliance chain according to the second network node which generates the storage score corresponding to the first network node in the step S2 includes;
generating a second digital authentication certificate receipt to a corresponding member organization according to the mapping of the first digital authentication certificate, building second network nodes according to the second digital authentication certificate, and sequentially connecting each second network node to a second federation network to build a second federation chain; wherein,
the point information includes a point address and a point score.
Preferably, a step S21 is further included between the step S2 and the step S3:
the new member mechanism applies for joining the first alliance chain and broadcasts mechanism information to each network node of the whole network;
each member organization audits the organization information and broadcasts audit results to each first network node of the whole network;
after the auditing results of all member organizations reach consensus agreement, generating a first digital authentication certificate, mapping a second digital authentication certificate according to the first digital authentication certificate, and respectively returning the certificate to a new member organization;
the new member institution correspondingly builds a first network node and a second network node according to the first digital authentication certificate and the second digital authentication certificate, sequentially accesses the first network node to the first alliance chain, and sequentially accesses the second network node to the second alliance chain;
and respectively updating the data information in each first network node of the whole network and the integral information in each second network node.
Optionally, in step S3, the method for sending, by the service node, the service request to the respective first network node for network-wide broadcasting, and correspondingly adjusting the point information in the second network node associated with the service request type according to the network-wide consensus result and/or the sent service request type includes:
when the service request type is a data uploading request, packaging the integral address and the uploading data of a data uploading party into shared data, wherein the uploading data comprises a main key, an index value and data details;
the sharing data is input to a service node of a data uploading party by adopting an uploading method of an intelligent contract, and is broadcasted to the whole first alliance chain network;
after the first alliance chain is agreed by the whole network consensus, updating the shared data in each first network node;
broadcasting the index value of the shared data to a second alliance chain whole network through a corresponding second network node;
and after the second alliance chain is agreed by the whole network, inputting n points into the point address of the data uploading party.
Preferably, the method for packaging the credit address of the data uploading party and the uploading data into the shared data comprises the following steps:
desensitizing the primary key of the uploaded data to obtain a primary key ciphertext;
encrypting the data details by using a public key of a data uploading party to obtain a detail ciphertext;
and packaging the master key ciphertext, the detail ciphertext and the integral address of the data uploading party to form shared data.
Optionally, in step S3, the method for sending the service request to the respective first network node through the service node for network-wide broadcasting, and correspondingly adjusting the point information in the second network node associated with the service request type according to the network-wide consensus result and/or the sent service request type includes:
when the service request type is a data deletion request, a data uploading party acquires an index value of deleted data;
signing the deleted data by using a private key of a data uploading party to obtain signed data;
signature data and an index value are input through a service node of a data uploading party by a deleting method of an intelligent contract, and are broadcasted to the whole first alliance chain network;
each first network node verifies the signature data, deletes the data corresponding to the signature data in the first network node after the global consensus agrees, and completes the data update of each first network node;
broadcasting the index value of the deleted data to the second alliance chain whole network through a second network node of a data uploading party;
and after the second alliance chain is agreed by the whole network, outputting n points from the point address of the data uploading party.
Optionally, in step S3, the method for sending the service request to the respective first network node through the service node for network-wide broadcasting, and correspondingly adjusting the point information in the second network node associated with the service request type according to the network-wide consensus result and/or the sent service request type includes:
when the service request type is a data query request, a data query party desensitizes a main key of query data to form a main key ciphertext;
inputting the main key ciphertext through a service node of a data inquiry party, and acquiring an inquiry result from the first alliance chain by adopting an intelligent contract inquiry method;
when the query result is non-empty, returning the shared data corresponding to the query data;
and extracting the detail ciphertext and the point address of the data uploading party in the shared data, and paying n points by the data inquiry party to the point address to obtain a decryption mode of the detail ciphertext to obtain the data detail.
Specifically, the method for extracting the detail ciphertext and the point address of the data uploading party from the shared data and obtaining the decryption mode of the detail ciphertext by paying n points to the point address by the data inquiring party includes:
paying n points to a point address of a data uploading party through the point address of the data inquiring party, and broadcasting payment information to the first alliance link whole network through a service node of the data inquiring party, wherein the payment information comprises the point address of the data inquiring party, a detail ciphertext and the point address of the data uploading party;
after the data uploading party receives the broadcast of the payment information, the data uploading party decrypts the detail ciphertext by using a private key of the data uploading party, and the data details are restored;
encrypting the restored detailed ciphertext by using a public key of the data inquiring party to obtain a returned ciphertext, and signing the returned ciphertext by using a private key of the data uploading party to generate returned signature information;
packaging the returned ciphertext and the returned signature information into returned information, and broadcasting the returned information to the first alliance link whole network through a service node of a data uploading party;
and after the data inquiry party receives the returned information, the returned signature information is decrypted by adopting the public key of the data uploading party, and the returned ciphertext and the private key of the data inquiry party are used for decryption to obtain the data details after passing verification.
Preferably, the method for decrypting the returned signature information by using the public key of the data uploading party and obtaining the data details by using the private key of the data querying party after passing verification of the returned ciphertext comprises the following steps:
decrypting the returned signature information by adopting a public key of a data uploading party, and restoring a returned ciphertext before signature;
comparing the returned ciphertext before signing with the returned ciphertext without signing for verification, and when the returned ciphertext before signing is consistent with the returned ciphertext without signing, the verification is passed;
and decrypting the returned ciphertext by using a private key of the data inquiry party to obtain the data details.
Optionally, in step S3, the method for sending the service request to the respective first network node through the service node for network-wide broadcasting, and correspondingly adjusting the point information in the second network node associated with the service request type according to the network-wide consensus result and/or the sent service request type includes:
when the service request type is a member complaint request, a complaint method of an intelligent contract is adopted to initiate the complaint request to the illegal member mechanism, and meanwhile, the complaint request is broadcasted to the whole first alliance chain network;
after the consensus agreement of the whole network, recording the complaint times of one time in the complaint identification of the complaint member institution;
when the number of complained times of the complained member institution reaches a threshold value, triggering a trigger punishment mechanism for the complained member institution;
the trigger penalty mechanism includes taking masking measures for the complaint member authorities.
Compared with the prior art, the data sharing method based on the alliance chain storage check and integral excitation mechanism has the following beneficial effects:
in the data sharing method based on the alliance chain storage check and integral excitation mechanism, the first network node in the first alliance chain is used for storing data information, the second network node in the second alliance chain is used for storing integral information, and the service node, the first network node and the second network node of each member institution are in one-to-one correspondence, so that the integral information adjustment of the associated member institution can be completed on the corresponding second network node after the corresponding service request is completed through the first network node. Illustratively, when any member institution broadcasts a service request to the first alliance chain through each service node, corresponding service request operation is executed in the first alliance chain according to the consensus result, if the executed service request is any one of a data uploading request, a data deleting request and a data inquiring request, a certain credit reward or deduction is given to a relevant party executing the operation through the second alliance chain, a 'paid' mode for replacing credit with shared data is created, each member institution is further prompted to timely and actively share valuable data in the first alliance chain based on the credit incentive policy, and the scale and the value of data sharing are improved.
In addition, the method can help enterprise business parties needing to store a large amount of file information on the premise that the files are not stored in a alliance chain, and the data files are stored by means of the non-tampering property of the block chain technology, so that the use and running cost is reduced, and the efficiency and the recovery capability of the stored files are improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic flowchart of a data sharing method based on a federation chain storage checksum integral incentive mechanism according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of a method for a new member enterprise to join a federation chain;
FIG. 3 is a schematic flow chart of a method for uploading data to a federation chain;
FIG. 4 is a flow diagram illustrating a method for deleting data in a federation chain;
FIG. 5 is a schematic flow chart of a method for obtaining query data from a federation chain;
FIG. 6 is a schematic flow chart of a method for a member facility in a complaint union chain.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flowchart of a data sharing method based on a federation chain storage checksum and integral incentive mechanism according to an embodiment of the present invention. Referring to fig. 1, the present embodiment provides a data sharing method based on a federation chain storage checksum and integral incentive mechanism, including:
step S1, the member organizations set up the corresponding service nodes and the first network nodes for storing the data information, the first network nodes to which the member organizations belong are sequentially accessed into the first alliance network to establish a first alliance chain, meanwhile, the service nodes extract the characteristic information of the data, and the data and the characteristic information are sent to the middleware layer;
step S2, the middleware layer checks the characteristic information, after the check is passed, the file is sent to the BT node to carry out synchronous operation, and a second network node for storing integral information is generated according to the first network node, each second network node is sequentially connected to a second alliance network to construct a second alliance chain, and after the synchronous operation is completed, the middleware layer writes the characteristic information into the second alliance chain node;
step S3, after the writing is finished, the middleware layer attaches the uplink mark to the file synchronized to the BT node, sends the service request to the respective first network node through the service node for whole network broadcasting, and correspondingly adjusts the point information in the second network node associated with the service request type according to the whole network consensus result and/or the sent service request type;
the service request types comprise a data uploading request, a data deleting request, a data inquiring request and a member complaint request.
When the specific implementation is carried out, the service platform consists of service nodes of all member organizations, the alliance chain platform consists of a first alliance chain and a second alliance chain, the member organizations initiate service requests through the respective service nodes and broadcast the service requests to the whole network of the first alliance chain through the respective first network nodes, after receiving the relevant requests, all the first network nodes can judge whether consensus is needed to be achieved in the first alliance chain and then execute the consensus on the basis of the initiated service request types, wherein when the initiated service request types are data uploading requests, data deleting requests and member complaint requests, the requests can be executed in the first alliance chain after the consensus agreement is needed to be achieved, and when the initiated service request types are data query requests, the requests can be directly executed without the consensus; in addition, after the initiated service request is executed in the first alliance chain, whether the executed service request type is a paid request is continuously judged, if yes, a certain integral reward or deduction needs to be given to a relevant party executing the operation at this time through the second alliance chain, wherein the data uploading request, the data inquiring request and the data deleting request are paid requests.
Through the implementation process, the first network node in the first alliance chain is used for storing the data information, the second network node in the second alliance chain is used for storing the point information, and the service node of each member mechanism, the first network node and the second network node are in one-to-one correspondence, so that the point information adjustment of the related member mechanism can be completed on the corresponding second network node after the corresponding service request is completed through the first network node. And then a 'paid' mode of utilizing shared data to replace points is created, each member organization is prompted to actively share valuable data in time, and the scale and the value of data sharing are improved.
Furthermore, it should be understood by those skilled in the art that the service request in the above embodiments is not limited to the four manners of the data upload request, the data delete request, the data query request and the member complaint request, but also includes other service requests that can be implemented, such as a data download request, a data change request, and the like.
It can be understood that, in this embodiment, the first federation chain is built by using a super ledger Fabric framework, and the second federation chain is built by using an Irppre framework having a point recording function, because the super ledger Fabric uses a modular framework technology, and an algorithm used by the super ledger Fabric is a Kafka consensus ranking method, the first federation chain has good extensibility and data processing efficiency. To facilitate an understanding of the Kafka consensus ordering method, the Kafka consensus ordering method is described below in connection with the first federation chain: the first network node correspondingly collects service requests (mainly indicating data uploading requests and data deleting requests) broadcast by other first network nodes, and identifies the validity and the sequence of the service requests. And packaging the corresponding service request into a block according to the consensus result, and returning the new block to the tail part of the block connected to the existing first network node by each first network node, thereby ensuring the data consistency of each first network node.
Specifically, the method for establishing the first alliance chain by establishing the service node and the first network node storing the data information corresponding to each member authority by the member authority and sequentially accessing the first network node to which each member authority belongs to the first alliance network includes:
generating first digital authentication certificates corresponding to the member organizations one by one, and returning the first digital authentication certificates to the corresponding member organizations; respectively building a first network node and a service node according to the first digital authentication certificate, and sequentially accessing the first network node to which each member institution belongs to a first alliance network to build a first alliance chain; the data information is divided into mechanism information and shared data information, wherein the data information is divided into the mechanism information and the shared data information, the mechanism information comprises a mechanism ID and a complaint identification, and the shared data information comprises an index value, a main key and a detail ciphertext.
Further, the method for sequentially accessing each second network node to the second alliance network to construct the second alliance chain according to the second network node which generates the storage integral corresponding to the first network node in the above embodiment;
generating a second digital authentication certificate receipt to a corresponding member organization according to the mapping of the first digital authentication certificate, building second network nodes according to the second digital authentication certificate, and sequentially connecting each second network node to a second federation network to build a second federation chain; wherein the integration information comprises an integration address and an integration fraction. It is readily understood that the initial integral of each member organization is zero.
In consideration of the fact that a new member organization is added, referring to fig. 2, the above embodiment further includes a step S21 between the step S2 and the step S3:
the new member mechanism applies for joining the first alliance chain and broadcasts mechanism information to each network node of the whole network; each member organization audits the organization information and broadcasts audit results to each first network node of the whole network; after the auditing results of all member organizations reach consensus agreement, generating a first digital authentication certificate, mapping a second digital authentication certificate according to the first digital authentication certificate, and respectively returning the certificate to a new member organization; the new member institution correspondingly builds a first network node and a second network node according to the first digital authentication certificate and the second digital authentication certificate, sequentially accesses the first network node to the first alliance chain, and sequentially accesses the second network node to the second alliance chain; and respectively updating the data information in each first network node of the whole network and the integral information in each second network node.
In specific implementation, a first network node of a new member institution is configured with a first digital authentication certificate, and a second network node of the new member institution is configured with a second digital authentication certificate, wherein the first digital authentication certificate and the second digital authentication certificate have the same record content, so that a public and private key pair in the first digital authentication certificate/the second digital authentication certificate is also the same, and the new member institution only needs to store any one pair of public and private keys.
Referring to fig. 3, when the service request type is a data upload request, the method in step S3 includes:
packaging the integral address and the uploaded data of the data uploading party into shared data, wherein the uploaded data comprises a main key, an index value and data details; the sharing data is input to a service node of a data uploading party by adopting an uploading method of an intelligent contract, and is broadcasted to the whole first alliance chain network; after the first alliance chain is agreed by the whole network consensus, updating the shared data in each first network node; broadcasting the index value of the shared data to a second alliance chain whole network through a corresponding second network node; and after the second alliance chain is agreed by the whole network, inputting n points into the point address of the data uploading party.
The method for packaging the credit address of the data uploading party and the uploading data into the shared data comprises the following steps:
desensitizing the primary key of the uploaded data to obtain a primary key ciphertext; encrypting the data details by using a public key of a data uploading party to obtain a detail ciphertext; and packaging the master key ciphertext, the detail ciphertext and the integral address of the data uploading party to form shared data.
In a specific implementation process, when any member mechanism finishes packaging shared data and initiates a data uploading request through a corresponding service node, the first alliance chain searches for duplicate checking in the database according to a primary key in the shared data, and broadcasts to the first alliance chain in the whole network after the duplicate checking is passed (the shared data is not stored in the database), so that the shared data is prevented from being repeatedly uploaded and further limited resources of the database are avoided.
Referring to fig. 4, when the service request type is a data deletion request, the method in step S3 includes:
a data uploading party acquires an index value of deleted data; signing the deleted data by using a private key of a data uploading party to obtain signed data; signature data and an index value are input through a service node of a data uploading party by a deleting method of an intelligent contract, and are broadcasted to the whole first alliance chain network; each first network node verifies the signature data, deletes the data corresponding to the signature data in the first network node after the global consensus agrees, and completes the data update of each first network node; broadcasting the index value of the deleted data to the second alliance chain whole network through a second network node of a data uploading party; and after the second alliance chain is agreed by the whole network, outputting n points from the point address of the data uploading party.
When the method is implemented specifically, data uploading and data deleting are a relative process, the reward points of the system can be obtained when the data are uploaded, and similarly, when a data uploading party needs to delete the originally uploaded data, the equivalent points are correspondingly consumed; in addition, in order to encourage the member institutions to upload high-value shared data, different levels of credit remuneration can be set according to the value of the shared data so as to guide the member institutions to reduce the uploading of low-value shared data.
Further, referring to fig. 5, when the service request type is a data query request, the method in step S3 includes:
the data inquiring party desensitizes the main key of the inquired data to form a main key ciphertext; inputting the main key ciphertext through a service node of a data inquiry party, and acquiring an inquiry result from the first alliance chain by adopting an intelligent contract inquiry method; when the query result is non-empty, returning the shared data corresponding to the query data; and extracting the detail ciphertext and the point address of the data uploading party in the shared data, and paying n points by the data inquiry party to the point address to obtain a decryption mode of the detail ciphertext to obtain the data detail.
It should be noted that the data query request includes free query and paid query, when the data querying party only obtains the shared data and does not obtain the decryption manner for the detail ciphertext in the shared data, at this time, it is not necessary to pay the point (free data query) to the data uploading party, and only when the data querying party obtains the detail ciphertext in the shared data, and further requests the decryption manner to the data uploading party to restore the data detail corresponding to the detail ciphertext, it is necessary to pay a certain point (paid data query) to the data uploading party.
The method for extracting the detail ciphertext and the point address of the data uploading party from the shared data, paying n points by the point address from the data inquiry party to obtain the decryption mode of the detail ciphertext and obtaining the data detail comprises the following steps:
paying n points to the point address of the data uploading party through the point address of the data inquiring party, and broadcasting payment information to the first alliance chain whole network through the service node of the data inquiring party, wherein the payment information comprises the point address of the data inquiring party, a detail ciphertext and the point address of the data uploading party; after the data uploading party receives the broadcast of the payment information, the data uploading party decrypts the detail ciphertext by using a private key of the data uploading party, and the data details are restored; encrypting the restored detailed ciphertext by using a public key of the data inquiring party to obtain a returned ciphertext, and signing the returned ciphertext by using a private key of the data uploading party to generate returned signature information; packaging the returned ciphertext and the returned signature information into returned information, and broadcasting the returned information to the first alliance link whole network through a service node of a data uploading party; and after the data inquiry party receives the returned information, the returned signature information is decrypted by adopting the public key of the data uploading party, and the returned ciphertext and the private key of the data inquiry party are decrypted to obtain the data details after passing verification.
The method for decrypting the returned signature information by using the public key of the data uploading party and obtaining the data details by using the private key of the data inquiring party after passing the verification of the returned ciphertext comprises the following steps:
decrypting the returned signature information by adopting a public key of a data uploading party, and restoring a returned ciphertext before signature; comparing the returned ciphertext before signing with the returned ciphertext without signing for verification, and when the returned ciphertext before signing is consistent with the returned ciphertext without signing, the verification is passed; and decrypting the returned ciphertext by using a private key of the data inquiry party to obtain the data details.
Further, referring to fig. 6, when the service request type is a member complaint request, the method in step S3 includes:
a complaint method of an intelligent contract is adopted to initiate a complaint request to a violation member organization, and the complaint request is broadcast to the whole first alliance chain; after the consensus agreement of the whole network, recording the complaint times of one time in the complaint identification of the complaint member institution; when the number of complained times of the complained member institution reaches a threshold value, triggering a trigger punishment mechanism for the complained member institution; triggering the penalty mechanism includes taking masking measures against the complaint member authorities. When the complaint times of the complaint member institutions reach a threshold value, the shielding identifier of the member institution is automatically marked as 1 to limit the data read-write right and the transaction right of the complaint member institution in the alliance chain platform, so that the malicious behaviors of the member institution are effectively monitored.
It is easy to understand that, the data sharing method based on the alliance chain storage verification and integral excitation mechanism adopts an intelligent contract mode to realize the business operation of each member mechanism, the intelligent contract maps the business operation into the read-write operation of the database, and the read-write operation is uniformly executed on the network nodes of the whole network according to the consensus result so as to ensure the consistency of the database of each network node. An intelligent contract is a set of commitments defined in digital form, including agreements on which contract participants can enforce the commitments.
Example two
The DHT is called a Distributed Hash Table (Distributed Hash Table) and is a Distributed storage method. Each client is responsible for a small range of routing without the need for a server and for storing a small portion of data, thereby enabling addressing and storage of the entire DHT network. The new version of BitComet allows to connect the DHT network and the Tracker in the same row, that is to say to download well without connecting the Tracker server at all, since it can look for other users who download the same file in the DHT network. The DHT network protocol of BitComet is fully compatible with the protocol of BitTorrent test version, that is, a network can be connected to share data with the DHT network. In addition, the DHT algorithm used herein is called Kademlia (also used in eMule, often called KAD, with different implementation protocols).
In the BitComet, the DHT network can be automatically connected and used without any setting, and user intervention is completely unnecessary. The BitComet uses a UDP port with the same port number as the TCP port number to carry out DHT network connection. If the DHT network is to be disabled completely, the DHT network may be disabled in an option-advanced-network connection. For the seed producer, reference may be made to: and (5) seed file making. UDP forwarding, which opens a desired port on the router if possible, will contribute even more to the robustness of the overall DHT network.
The average user is completely oblivious to this particular process. This can be briefly described as follows: the users connected to the DHT network are called nodes (nodes), and the nodes have route records with each other, so that the client can find more nodes to connect to the network as long as connecting with any one node already in the DHT network.
Briefly: DHT technology is able to make any machine in the network implement part of the functions of the server, so that the user's download is no longer dependent on the server. The user does not need to intervene in this function. It is not obvious or relevant for the average user.
What does the DHT network in BT return N peers?
The DHT returns N peers, which can only say that the file downloads with the same MD5 codes are found through the network, and as for how much the other party downloads, the other party does not know at all, and perhaps the other party also wants to ask the question. Probably the opposite party also wants to download, but has no source seed, and all waits for the seed to appear. Without a seed, it cannot be downloaded. If the seeds can not be obtained, the search is carried out all the time. That is, there is no complete seed on the network, and you return n peers means that only those parts of the seed you download on the network are in an infinite loop, in effect a dead loop, so n peers are returned.
Based on the alliance chain storage verification, extracting the characteristic information of the file based on the alliance chain storage verification service system, and sending the file and the characteristic information to a middleware layer; the middleware layer is arranged at the rear end of the service system and is simultaneously connected with the alliance link node and the BT node;
the method comprises the steps of extracting characteristic information of a stored file, and sending the extracted characteristic information to a middleware layer. The middleware layer is a service system independently existing in the prior art, is arranged at the back end of the service system, and is simultaneously connected with the alliance link node and the BT node at the back end of the middleware layer.
The BT node is a network node in a BitComet network that uses DHT network protocol.
The alliance node stores the characteristic information of the stored file in the alliance through a series of operations, and synchronizes the complete stored file after a series of verification to the BT network, so as to achieve the purpose of the application in combination with the subsequent steps, namely, the alliance node helps a business party needing to store a large amount of file information to store the large-volume file through the non-tamper-resistance property of the alliance without storing the large-volume file in the alliance.
The feature information is a general name of various types of files having the features of the stored file, and may include: the summary information of the stored file, the feature value of the stored file, the uplink information generated according to the stored file, the signature information generated by combining the local private key, and the like, should be considered comprehensively to make differentiated selection according to various factors such as the need of the process step, the setting mode, and the like in the actual situation, and are not limited specifically here.
The BT node determines that a plurality of BT nodes can be set according to actual requirements due to the point-to-point characteristic of the BT network, so that redundant storage of data files is facilitated, and the phenomenon that the data files are lost due to abnormal conditions is further prevented.
The middleware layer checks the characteristic information, and after the checking is passed, the file is sent to the BT node for synchronous operation;
the method comprises the steps that the middleware layer extracts characteristic information according to a received stored file and conducts secondary verification on the extracted characteristic information and the received characteristic information, whether the stored file is falsified due to an abnormal condition is verified in the transmission process that a business system sends the stored file to the middleware layer or not is verified through the secondary verification step, and once falsification occurs, the characteristic information of the stored file is changed certainly. Once the verification is passed, the stored file is not tampered when the stored file is at the service system end and in the processes of sending and receiving, the identity of the stored file is kept, and the complete stored file can be sent to the BT node by the middleware layer for synchronization. The synchronous operation is determined by the point-to-point property of the BT network, and needs a process to be completed, wherein the process is mainly determined by the volume size of a file.
The method includes the steps that a plurality of BT nodes are specifically set according to an application scene to achieve redundant storage of stored files, and the method mainly faces enterprise-level users, so that the files required to be stored by the enterprise-level users are generally rich in value and dispersed.
The characteristic value of the data file means that the same data file can obtain a unique value corresponding to the unique data file according to the same algorithm, and once the data file is tampered or processed, the value corresponding to the unique value is changed, so that the uniqueness of the data file is highlighted.
There are many algorithms for selecting the feature value, and this embodiment does not limit this, and the user can select the feature value according to the actual hardware computing power and requirement. A hash algorithm may be generally used to calculate the feature value, although more than one hash algorithm may be used to calculate the feature value. The algorithm principle is that a hash operation is carried out on a data file to obtain a value uniquely corresponding to the data file, the value corresponding to the data file is changed as long as the data file is changed, and the MD5 algorithm is the most commonly used algorithm in the hash algorithm and is widely used for verifying the integrity of the data file by using the MD5 characteristic value and whether secondary modification is carried out.
Of course, there is not only a way to perform verification using the feature value, but also other ways to represent the uniqueness of the stored file, and this is not limited in detail here.
Judging whether the synchronous operation is finished or not;
the step aims at judging whether the synchronous operation is finished or not, and how to correctly judge the synchronous operation is various, for example, the synchronous operation can be displayed in real time in a progress bar mode; the completion of the synchronization operation can also be prompted by sending a synchronization completion notification; the dynamic mark may also be placed at a completed position to display the completion of the synchronization operation, and the like, which is not specifically limited herein, and only needs to be able to determine whether the synchronization operation is completed according to certain feedback information.
The middleware layer writes the characteristic information into the alliance link node;
the step is established by judging that the synchronous operation has finished the synchronous operation of the BT node on the stored file, and at this time, the middleware layer sends the previously obtained feature information of the stored file to the alliance link node to execute the write-in operation.
Further, after the synchronization operation is completed, before the feature information is written into the alliance link node, the stored file is in a state where the stored file is synchronized to the BT node, but the feature information is not yet written into the alliance link, that is, the stored file is in a state where the uplink is about to be uplink but the uplink acknowledgement is not received, so that even though the synchronization of the BT node is completed, the stored file is still set to be in an invisible state in the BT network, and after the feedback information that the uplink is completed is indeed received in the subsequent step, the stored file synchronized to the BT node is set to be in a state where the uplink can be read. Therefore, a flag identified as unacknowledged in the uplink may be appended to the stored file synchronized to the BT node before the feature information is written in this step.
Of course, the mark should not only represent a conventional mark, but also be a generic name of a type of identification information capable of identifying the file state, and the specific implementation manner may be various, and is not limited herein.
The middleware layer attaches a ul flag to files synchronized to the BT node.
After the write operation is judged to be completed, the BT node completes synchronization and the alliance link point completes the writing of the characteristic information, and only the middleware layer adds a mark for completing the uplink operation to the stored file synchronized to the BT node.
Further, according to the unacknowledged mark in the additional uplink, an uplink mark can be added again to enable the two marks to exist simultaneously, and the subsequent identification algorithm is set to identify that the uplink operation is finished only when the two marks are monitored to exist simultaneously; it is also possible to modify the unacknowledged flag in the uplink into the uplink flag in this step, so that only one flag representing the file status always exists, and the identification algorithm needs to be modified accordingly, or other ways, which are various and not specifically limited herein.
Based on the technical scheme, the method for storing and checking the large files in the alliance chain provided by the embodiment of the application checks the feature information extracted from the stored files, only stores the feature information in the nodes in the alliance chain after the check is passed, and synchronizes the complete files to the BT node. On the premise that the file is not stored in the alliance chain, the enterprise-level business side needing to store a large amount of file information can be helped, the data file is stored by means of the non-tampering property of the block chain technology, the redundant storage is realized by utilizing the characteristic of the BT node, the loss phenomenon of the file information caused by abnormal conditions is further prevented, the use and operation cost is reduced, and the efficiency and the recovery capability of storing the file are improved.
Based on the technical scheme, the method for storing and checking the large files in the alliance chain comprises the steps of extracting the feature information of the stored files, wherein the feature information comprises a file abstract, a chaining request and a file signature, checking the file abstract again after the file abstract reaches a middleware layer in a transmission process, only storing the feature information in the alliance chain node after the check is passed, and synchronizing the complete files into the BT node to achieve the final storage operation. On the premise that the file is not stored in the alliance chain, the enterprise-level business side needing to store a large amount of file information can be helped, the data file is stored by means of the non-tampering property of the block chain technology, the redundant storage is realized by utilizing the characteristic of the BT node, the loss phenomenon of the file information caused by abnormal conditions is further prevented, the use and operation cost is reduced, and the efficiency and the recovery capability of storing the file are improved.
It will be understood by those skilled in the art that all or part of the steps in the method for implementing the invention may be implemented by hardware instructions related to a program, the program may be stored in a computer-readable storage medium, and when executed, the program includes the steps of the method of the embodiment, and the storage medium may be: ROM/RAM, magnetic disks, optical disks, memory cards, and the like.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. A data sharing method based on a federation chain storage checksum and integral incentive mechanism is characterized by comprising the following steps:
step S1, the member organizations set up the corresponding service nodes and the first network nodes for storing the data information, the first network nodes to which the member organizations belong are sequentially accessed into the first alliance network to establish a first alliance chain, meanwhile, the service nodes extract the characteristic information of the data, and the data and the characteristic information are sent to the middleware layer;
step S2, the middleware layer checks the characteristic information, after the check is passed, the file is sent to the BT node to carry out synchronous operation, and a second network node for storing integral information is generated according to the first network node, each second network node is sequentially connected to a second alliance network to construct a second alliance chain, and after the synchronous operation is completed, the middleware layer writes the characteristic information into the second alliance chain node;
step S3, after the writing is finished, the middleware layer attaches the uplink mark to the file synchronized to the BT node, sends the service request to the respective first network node through the service node for whole network broadcasting, and correspondingly adjusts the point information in the second network node associated with the service request type according to the whole network consensus result and/or the sent service request type;
the service request types comprise a data uploading request, a data deleting request, a data inquiring request and a member complaint request.
2. The data sharing method according to claim 1, wherein in step S1, the member enterprises build respective corresponding service nodes and first network nodes storing data information, and the method for sequentially accessing the first network nodes to which the member enterprises belong to the first alliance network to build the first alliance chain comprises:
generating first digital authentication certificates corresponding to the member organizations one by one, and returning the first digital authentication certificates to the corresponding member organizations;
respectively building a first network node and a service node according to the first digital authentication certificate, and sequentially accessing the first network node to which each member institution belongs to a first alliance network to build a first alliance chain;
the data information is divided into organization information and shared data information, wherein the organization information comprises organization ID and complaint identification, and the shared data information comprises an index value, a main key and a detail ciphertext.
3. The data sharing method according to claim 2, wherein the step S2 includes the steps of generating, according to the first network node, the second network nodes storing the points, and sequentially accessing the second network nodes to the second federation network to construct the second federation chain;
generating a second digital authentication certificate receipt to a corresponding member organization according to the mapping of the first digital authentication certificate, building second network nodes according to the second digital authentication certificate, and sequentially connecting each second network node to a second federation network to build a second federation chain; wherein,
the point information includes a point address and a point score.
4. The data sharing method according to claim 3, further comprising, between the step S2 and the step S3, the step S21:
the new member mechanism applies for joining the first alliance chain and broadcasts mechanism information to each network node of the whole network;
each member organization audits the organization information and broadcasts audit results to each first network node of the whole network;
after the auditing results of all member organizations reach consensus agreement, generating a first digital authentication certificate, mapping a second digital authentication certificate according to the first digital authentication certificate, and respectively returning the certificate to a new member organization;
the new member institution correspondingly builds a first network node and a second network node according to the first digital authentication certificate and the second digital authentication certificate, sequentially accesses the first network node to the first alliance chain, and sequentially accesses the second network node to the second alliance chain;
and respectively updating the data information in each first network node of the whole network and the integral information in each second network node.
5. The data sharing method according to claim 2, wherein the step S3, in which the method for sending the service request to the respective first network node through the service node for network-wide broadcasting, and correspondingly adjusting the point information in the second network node associated with the service request type according to the network-wide consensus result and/or the sent service request type, includes:
when the service request type is a data uploading request, packaging the integral address and the uploading data of a data uploading party into shared data, wherein the uploading data comprises a main key, an index value and data details;
the sharing data is input to a service node of a data uploading party by adopting an uploading method of an intelligent contract, and is broadcasted to the whole first alliance chain network;
after the first alliance chain is agreed by the whole network consensus, updating the shared data in each first network node;
broadcasting the index value of the shared data to a second alliance chain whole network through a corresponding second network node;
and after the second alliance chain is agreed by the whole network, inputting n points into the point address of the data uploading party.
6. The data sharing method according to claim 5, wherein the method of packaging the credit address of the data uploading party and the uploading data into shared data comprises:
desensitizing the primary key of the uploaded data to obtain a primary key ciphertext;
encrypting the data details by using a public key of a data uploading party to obtain a detail ciphertext;
and packaging the master key ciphertext, the detail ciphertext and the integral address of the data uploading party to form shared data.
7. The data sharing method according to claim 2, wherein the step S3, in which the method for sending the service request to the respective first network node through the service node for network-wide broadcasting and correspondingly adjusting the point information in the second network node associated with the service request type according to the network-wide consensus result and/or the sent service request type, includes:
when the service request type is a data deletion request, a data uploading party acquires an index value of deleted data;
signing the deleted data by using a private key of a data uploading party to obtain signed data;
signature data and an index value are input through a service node of a data uploading party by a deleting method of an intelligent contract, and are broadcasted to the whole first alliance chain network;
each first network node verifies the signature data, deletes the data corresponding to the signature data in the first network node after the global consensus agrees, and completes the data update of each first network node;
broadcasting the index value of the deleted data to the second alliance chain whole network through a second network node of a data uploading party;
and after the second alliance chain is agreed by the whole network, outputting n points from the point address of the data uploading party.
8. The data sharing method according to claim 1, wherein the step S3, in which the method for sending the service request to the respective first network node through the service node for network-wide broadcasting and correspondingly adjusting the point information in the second network node associated with the service request type according to the network-wide consensus result and/or the sent service request type, includes:
when the service request type is a data query request, a data query party desensitizes a main key of query data to form a main key ciphertext;
inputting the main key ciphertext through a service node of a data inquiry party, and acquiring an inquiry result from the first alliance chain by adopting an intelligent contract inquiry method;
when the query result is non-empty, returning the shared data corresponding to the query data;
and extracting the detail ciphertext and the point address of the data uploading party in the shared data, and paying n points by the data inquiry party to the point address to obtain a decryption mode of the detail ciphertext to obtain the data detail.
9. The data sharing method according to claim 8, wherein the method for extracting the detail ciphertext and the point address of the data uploading party from the shared data, and paying n points to the point address by the data inquiring party to obtain the decryption mode of the detail ciphertext to obtain the data details comprises:
paying n points to a point address of a data uploading party through the point address of the data inquiring party, and broadcasting payment information to the first alliance link whole network through a service node of the data inquiring party, wherein the payment information comprises the point address of the data inquiring party, a detail ciphertext and the point address of the data uploading party;
after the data uploading party receives the broadcast of the payment information, the data uploading party decrypts the detail ciphertext by using a private key of the data uploading party, and the data details are restored;
encrypting the restored detailed ciphertext by using a public key of the data inquiring party to obtain a returned ciphertext, and signing the returned ciphertext by using a private key of the data uploading party to generate returned signature information;
packaging the returned ciphertext and the returned signature information into returned information, and broadcasting the returned information to the first alliance link whole network through a service node of a data uploading party;
and after the data inquiry party receives the returned information, the returned signature information is decrypted by adopting the public key of the data uploading party, and the returned ciphertext and the private key of the data inquiry party are used for decryption to obtain the data details after passing verification.
10. The data sharing method according to claim 9, wherein the method for decrypting the returned signature information by using the public key of the data uploading party and obtaining the data details by using the private key of the data querying party after the returned ciphertext verification is passed comprises:
decrypting the returned signature information by adopting a public key of a data uploading party, and restoring a returned ciphertext before signature;
comparing the returned ciphertext before signing with the returned ciphertext without signing for verification, and when the returned ciphertext before signing is consistent with the returned ciphertext without signing, the verification is passed;
and decrypting the returned ciphertext by using a private key of the data inquiry party to obtain the data details.
CN201810555897.2A 2018-06-01 2018-06-01 The data sharing method of verification and integral incentive mechanism is stored based on alliance's chain Withdrawn CN108848081A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810555897.2A CN108848081A (en) 2018-06-01 2018-06-01 The data sharing method of verification and integral incentive mechanism is stored based on alliance's chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810555897.2A CN108848081A (en) 2018-06-01 2018-06-01 The data sharing method of verification and integral incentive mechanism is stored based on alliance's chain

Publications (1)

Publication Number Publication Date
CN108848081A true CN108848081A (en) 2018-11-20

Family

ID=64211171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810555897.2A Withdrawn CN108848081A (en) 2018-06-01 2018-06-01 The data sharing method of verification and integral incentive mechanism is stored based on alliance's chain

Country Status (1)

Country Link
CN (1) CN108848081A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109510713A (en) * 2018-12-29 2019-03-22 杭州趣链科技有限公司 A kind of shared motivational techniques of the flow based on block chain
CN109558744A (en) * 2018-11-29 2019-04-02 咪咕文化科技有限公司 Data processing method and system
CN109587131A (en) * 2018-11-29 2019-04-05 浙江超脑时空科技有限公司 A method and device for data communication between blockchain networks
CN109685556A (en) * 2018-12-13 2019-04-26 东莞市盟大塑化科技有限公司 A kind of trade integration method based on block chain technology
CN109785139A (en) * 2019-03-14 2019-05-21 哈尔滨工程大学 A data sharing incentive method based on smart contracts
CN109978615A (en) * 2019-03-20 2019-07-05 广州美术学院 A kind of motivational techniques, device and the storage medium of knowledge based data sharing
CN109978623A (en) * 2019-03-27 2019-07-05 杭州师范大学 A kind of car networking information sharing motivational techniques based on block chain
CN110012068A (en) * 2019-03-01 2019-07-12 北京奇艺世纪科技有限公司 A kind of download control method, device and storage medium
CN111526180A (en) * 2020-03-30 2020-08-11 中国建设银行股份有限公司 Data sharing method and device
CN111585751A (en) * 2020-04-10 2020-08-25 四川大学 Blockchain-based data sharing method
CN111614739A (en) * 2020-05-08 2020-09-01 中国信息通信研究院 Network measurement data storage method, device and system
WO2020186726A1 (en) * 2019-03-18 2020-09-24 苏宁云计算有限公司 Block chain-based blacklist data sharing method and system
CN112036945A (en) * 2020-08-28 2020-12-04 中国建设银行股份有限公司 Incentive method and device based on alliance chain, electronic equipment and storage medium
CN113709122A (en) * 2019-09-24 2021-11-26 支付宝(杭州)信息技术有限公司 Service verification method of alliance chain and alliance chain system
CN113836569A (en) * 2020-06-08 2021-12-24 中国移动通信有限公司研究院 Data query method and related equipment
CN114565326A (en) * 2022-04-29 2022-05-31 深圳市誉兴通科技股份有限公司 Medicine management method and system based on Internet of things
CN114971896A (en) * 2022-03-31 2022-08-30 华润网络(深圳)有限公司 Integral management method of alliance chain
CN116258521A (en) * 2022-12-02 2023-06-13 东莞盟大集团有限公司 Secondary node identification application points management method based on blockchain technology
CN116346830A (en) * 2023-02-23 2023-06-27 浙江环玛信息科技有限公司 Data sharing method and computer equipment based on cooperative game

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109558744B (en) * 2018-11-29 2021-11-02 咪咕文化科技有限公司 A data processing method and system
CN109558744A (en) * 2018-11-29 2019-04-02 咪咕文化科技有限公司 Data processing method and system
CN109587131A (en) * 2018-11-29 2019-04-05 浙江超脑时空科技有限公司 A method and device for data communication between blockchain networks
CN109685556A (en) * 2018-12-13 2019-04-26 东莞市盟大塑化科技有限公司 A kind of trade integration method based on block chain technology
CN109685556B (en) * 2018-12-13 2021-04-20 东莞市盟大塑化科技有限公司 Trade integration method based on block chain technology
CN109510713A (en) * 2018-12-29 2019-03-22 杭州趣链科技有限公司 A kind of shared motivational techniques of the flow based on block chain
CN110012068A (en) * 2019-03-01 2019-07-12 北京奇艺世纪科技有限公司 A kind of download control method, device and storage medium
CN109785139A (en) * 2019-03-14 2019-05-21 哈尔滨工程大学 A data sharing incentive method based on smart contracts
WO2020186726A1 (en) * 2019-03-18 2020-09-24 苏宁云计算有限公司 Block chain-based blacklist data sharing method and system
CN109978615A (en) * 2019-03-20 2019-07-05 广州美术学院 A kind of motivational techniques, device and the storage medium of knowledge based data sharing
CN109978623A (en) * 2019-03-27 2019-07-05 杭州师范大学 A kind of car networking information sharing motivational techniques based on block chain
CN109978623B (en) * 2019-03-27 2021-11-16 杭州师范大学 Vehicle networking information sharing excitation method based on block chain
CN113709122B (en) * 2019-09-24 2023-08-22 支付宝(杭州)信息技术有限公司 Service verification method of alliance chain and alliance chain system
CN113709122A (en) * 2019-09-24 2021-11-26 支付宝(杭州)信息技术有限公司 Service verification method of alliance chain and alliance chain system
CN111526180B (en) * 2020-03-30 2022-05-24 中国建设银行股份有限公司 Data sharing method and device
CN111526180A (en) * 2020-03-30 2020-08-11 中国建设银行股份有限公司 Data sharing method and device
CN111585751A (en) * 2020-04-10 2020-08-25 四川大学 Blockchain-based data sharing method
CN111614739A (en) * 2020-05-08 2020-09-01 中国信息通信研究院 Network measurement data storage method, device and system
CN113836569A (en) * 2020-06-08 2021-12-24 中国移动通信有限公司研究院 Data query method and related equipment
CN113836569B (en) * 2020-06-08 2024-08-02 中国移动通信有限公司研究院 Data query method and related equipment
CN112036945A (en) * 2020-08-28 2020-12-04 中国建设银行股份有限公司 Incentive method and device based on alliance chain, electronic equipment and storage medium
CN114971896A (en) * 2022-03-31 2022-08-30 华润网络(深圳)有限公司 Integral management method of alliance chain
CN114565326A (en) * 2022-04-29 2022-05-31 深圳市誉兴通科技股份有限公司 Medicine management method and system based on Internet of things
CN114565326B (en) * 2022-04-29 2022-08-30 深圳市誉兴通科技股份有限公司 Medicine management method and system based on Internet of things
CN116258521A (en) * 2022-12-02 2023-06-13 东莞盟大集团有限公司 Secondary node identification application points management method based on blockchain technology
CN116346830A (en) * 2023-02-23 2023-06-27 浙江环玛信息科技有限公司 Data sharing method and computer equipment based on cooperative game

Similar Documents

Publication Publication Date Title
CN108848081A (en) The data sharing method of verification and integral incentive mechanism is stored based on alliance's chain
CN108848080A (en) Data-sharing systems based on the storage verification of alliance's chain
CN108650270B (en) Data sharing method and system based on alliance chain and incentive mechanism
US10708060B2 (en) System and method for blockchain-based notification
US11038670B2 (en) System and method for blockchain-based cross-entity authentication
US11025435B2 (en) System and method for blockchain-based cross-entity authentication
US11126458B2 (en) Method, apparatus, and electronic device for resource allocation based on blockchain
CN109409122B (en) File storage method, electronic device and storage medium
Khovratovich et al. Sovrin: digital identities in the blockchain era
KR20200106000A (en) System and method for implementing blockchain-based digital certificate
CN111444550A (en) Block chain-based service data verification method and device and readable storage medium
CN109472164A (en) The verification method and its network and electronic equipment of contract dataset
CN110599069A (en) Application evaluation method and device based on block chain network
CN113065961A (en) A power block chain data management system
CN113901505B (en) Data sharing method and device, electronic equipment and storage medium
CN109491996A (en) For the block generation method of block chain network, block data access method, calculate equipment, storage medium
KR102326460B1 (en) Trust Point Management in Ledger Systems
CN109491965A (en) The storage method and its network and electronic equipment of purchase sale of electricity contract
CN113255014B (en) Data processing method based on block chain and related equipment
CN112801778B (en) Alliance type bad asset block chain system
CN114666060B (en) Hyperledger Fabric-based electronic data security method and system
US20250175457A1 (en) Secure Authorization and Transmission of Data Between Trustless Actors
CN110493011A (en) Certificate authority management method and device based on block chain
CN116418546A (en) Data processing method based on block chain and related device
CN118094633A (en) Block chain-based data processing method and device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20181120

WW01 Invention patent application withdrawn after publication